[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 14, Issue 1 (9-2025) ::
منادی 2025, 14(1): 97-119 Back to browse issues page
A comprehensive review of cyber deception concepts, comparative analysis of deception platforms, and proposal of three exemplary implementations for deceiving attackers
Seyed Ali Samouti *1 , Sajad Tarhani1 , Mohsen Babakhani1
1- Kashef Company, Tehran, Iran
Abstract:   (581 Views)

Cyber deception, as a groundbreaking and transformative strategy in cyber defense, holds an unparalleled position in countering advanced and complex threats within the cyberspace. By designing deceptive and simulated environments, it prevents attackers from achieving their primary objectives while providing defenders with unique opportunities for monitoring, detecting, and neutralizing attacks. Beyond being a mere defensive tool, this technology serves as a strategic lever in safeguarding critical infrastructure and sensitive information, significantly increasing the operational costs for adversaries and elevating cyber deterrence to an unprecedented level.

This paper aims to present a comprehensive and in-depth conceptual framework by meticulously elucidating the foundational concepts of cyber deception and its structured taxonomy, while critically analyzing the lifecycle of this strategy. Existing methodologies proposed in the scientific literature are reviewed, and diverse classifications of techniques, tools, and deception architectures are provided. In this context, several leading platforms, recognized as effective tools for simulating vulnerable services and precisely logging malicious activities, are introduced. Furthermore, three practical implementations of deception technologies are proposed, with a detailed explanation of their technical and operational aspects.

Finally, by precisely identifying current needs and research gaps, future research directions are outlined, including the development of automated systems based on artificial intelligence and integration with modern security architectures. These directions aim to pave the way for a fundamental transformation in enhancing cybersecurity against emerging threats.

Keywords: Cyber Deception, Cyber Defence, Cyber attack, Cyber kill chain, Cyber Security
Full-Text [PDF 1748 kb]   (597 Downloads)    
Type of Study: Research Article | Subject: Special
Received: 2025/07/13 | Accepted: 2025/10/13 | Published: 2025/10/28
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Samouti S A, Tarhani S, Babakhani M. A comprehensive review of cyber deception concepts, comparative analysis of deception platforms, and proposal of three exemplary implementations for deceiving attackers. منادی 2025; 14 (1) :97-119
URL: http://monadi.isc.org.ir/article-1-313-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 14, Issue 1 (9-2025) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.2 seconds with 39 queries by YEKTAWEB 4732