Leading attackers through attack graphs with deceptions

This paper describes a series of experiments in which specific deceptions were created in order to induce red teams attacking computer networks to attack network elements in sequence. It demonstrates the ability to control the path of an attacker through the use of deceptions and allows us to associate metrics with paths and their traversal.

[1]  Fred Cohen,et al.  A Framework for Deception , 2001 .