Strengthening cyber deception strategies through simulated user behavior
Keywords:
cyber deception, user behavior, deception technologiesAbstract
Cyber deception is a key defensive strategy for detecting and countering advanced persistent threats and sophisticated attacks. However, the implementation of traditional activities, such as decoy services, often lacks credible support to bolster their effectiveness. In general, honeypots and honeytokens have limitations such as a lack of realism due to static configurations and the absence of human activity traces. Simulating actions is costly, and creating and maintaining profiles is difficult to scale, as is automation and integration. In this paper, we present a tool designed to automate the generation of realistic activities and behaviors for decoy users, seeking to integrate customized and consistent patterns of human interaction into cyber deception scenarios to improve the credibility of the operation. Based on the MITRE Engage framework, the tool contributes to strengthening defensive operations by addressing a key challenge of cyber deception strategies.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Federico Pacheco, Diego Staino

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Acorde a estos términos, el material se puede compartir (copiar y redistribuir en cualquier medio o formato) y adaptar (remezclar, transformar y crear a partir del material otra obra), siempre que a) se cite la autoría y la fuente original de su publicación (revista y URL de la obra), b) no se use para fines comerciales y c) se mantengan los mismos términos de la licencia.











