Mohammed H. Almeshekah and Eugene H. Spafford
In Cyber Deception, S. Jajodia et al. (eds.), Springer International Publishing Switzerland 2016.
Book Chapter (full text)
ABSTRACT: Most data is digitized and stored in organizations’ servers, making them a valuable target. Advanced persistent threats (APT), corporate espionage, and other forms of attacks are continuously increasing. Companies reported 142 million unsuccessful attacks in the first half of 2013, as reported by Fortinet. In addition, a recent Verizon Data Breach Investigation Report (DBIR) points out that currently deployed protection mechanisms are not adequate to address current threats. The report states that 66 % of the breaches took months or years to discover, rising from 56 % in 2012. Furthermore, 84 % of these attacks only took hours or less to infiltrate computer systems. Moreover, the report states that only 5 % of these breaches were detected using traditional intrusion detection systems (IDSs) while 69 % were detected by external parties.