Download PDFOpen PDF in browserDecoy Traffic GenerationEasyChair Preprint 1414810 pages•Date: July 25, 2024AbstractDecoy traffic generation is a crucial technique in the realm of cybersecurity and privacy preservation. By creating synthetic network traffic that mimics real user behavior, decoy traffic generation serves to obfuscate and obscure the true activities of a system or user, making it more challenging for attackers, eavesdroppers, and other adversaries to distinguish genuine traffic from deceptive elements. This abstract outlines the key aspects of decoy traffic generation, including its definition, purpose, and the various techniques employed. Among the techniques discussed are IP address spoofing, browser fingerprint obfuscation, sending fake HTTP requests, and generating synthetic network packets that emulate different protocols. Keyphrases: Cybersecurity, Honeypot systems, anomaly detection, malware analysis, privacy protection
|