Skip to main navigation Skip to search Skip to main content

Project Details

Layman's description

When Hackers Knock, Who Answers?

Imagine a burglar sneaking into a house, only to find that every room is a carefully staged illusion - doors that lead nowhere, safes filled with fake money, and even family photos that look real but hide secret cameras. By the time the burglar realizes, it is too late: the police already know who they are.

This is the idea behind cyber deception, a proactive way of defending digital systems by tricking attackers instead of just blocking them. Today’s internet criminals often target smart devices - like connected cameras, sensors, and voice assistants. But most of the decoys we use to protect them are too easy to spot. Hackers can quickly tell that a fake system is not real, and then the trap fails.

My research is about trying to fix this weakness by building digital blueprints of real devices. Using artificial intelligence, I try to create models that replicate how a device communicates on a network. Just like a digital twin in engineering, these blueprints should behave so convincingly that even advanced attackers should struggle to tell the difference.

But devices are only the start. I will later also design deceptive digital content - documents, images and even sound files - that look valuable to hackers but are traps. Some carry hidden alarms that quietly report back if stolen, helping defenders trace attacks and understand intruders.

By combining device blueprints and adaptive decoys, the project aims to flip the script: instead of attackers exploiting our technology, we use technology to exploit their overconfidence. The result is a defense system that does not just stand guard, but actively misleads, frustrates, and exposes hackers -a new kind of cybersecurity for a world where every device can be a target.

So, when hackers knock, the answer will not just be a locked door. It will be an illusion that leads them exactly where we want them to go.
StatusActive
Effective start/end date01/06/202531/05/2028

Fingerprint

Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.