Download PDFOpen PDF in browser

Decoy Traffic Generation

EasyChair Preprint 14148

10 pagesDate: July 25, 2024

Abstract

Decoy traffic generation is a crucial technique in the realm of cybersecurity and privacy preservation. By creating synthetic network traffic that mimics real user behavior, decoy traffic generation serves to obfuscate and obscure the true activities of a system or user, making it more challenging for attackers, eavesdroppers, and other adversaries to distinguish genuine traffic from deceptive elements.

This abstract outlines the key aspects of decoy traffic generation, including its definition, purpose, and the various techniques employed. Among the techniques discussed are IP address spoofing, browser fingerprint obfuscation, sending fake HTTP requests, and generating synthetic network packets that emulate different protocols.

Keyphrases: Cybersecurity, Honeypot systems, anomaly detection, malware analysis, privacy protection

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@booklet{EasyChair:14148,
  author    = {Elizabeth Henry},
  title     = {Decoy Traffic Generation},
  howpublished = {EasyChair Preprint 14148},
  year      = {EasyChair, 2024}}
Download PDFOpen PDF in browser