International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
The journal follows the UGC Guidelines and is evaluated for inclusion in the Web of Science
ISSN: 2583-6129

Impact Factor: 7.839

Decoy Shield: Leveraging AI and Decoy Strategies for Enhanced Protection Against Data Exfiltration and Automated Cyberattacks

  • Version
  • Download 3
  • File Size 550.60 KB
  • File Count 1
  • Create Date 7 June 2025
  • Last Updated 7 June 2025

Decoy Shield: Leveraging AI and Decoy Strategies for Enhanced Protection Against Data Exfiltration and Automated Cyberattacks

Authors:

1st Mr. V. Udhayakumar, 2ndG.Susidaran

1Professor, Department of Computer Applications, Sri Manakula Vinayagar Engineering College (Autonomous),

Puducherry 605008, India udhayakumar.mca@smvec.ac.in

2Post Graduate student, Department of computer Applications, Sri Manakula Vinayagar Engineering College (Autonomous), Puducherry 605008, India

susidaran246@gmail.com

 

Abstract: Intellectual Property (IP) is a critical asset for organizations, containing valuable innovations and proprietary knowledge that must be protected to maintain a competitive edge. Cyberattacks on IP have become more prevalent, with adversaries using automated systems to exfiltration and classify large volumes of documents to extract sensitive information like trade secrets. However, traditional IP protection methods, such as encryption and firewalls, are often ineffective against these advanced, automated threats. This project introduces the DARD (Decoy Approaches for Robust Protection against IP Theft) system, designed to disrupt automated classification methods by employing misleading techniques. To detect adversarial behavior, the system uses a Variational Autoencoder (VAE) to identify anomalous patterns in access and activity logs.

This project introduces the DARD (Decoy Approaches for Robust Protection against IP Theft) system, a novel defense framework designed to proactively disrupt automated IP theft mechanisms by embedding deceptive and misleading information.

DARD focuses on confusing machine learning-based document classifiers and topic modeling algorithms, thereby reducing the efficacy of adversarial reconnaissance and data mining.Once adversaries are detected, the DARD system generates a modified document repository that manipulates document clustering and topic modeling outcomes, making it difficult for adversaries to identify topics of interest.

The system uses four manipulation operations—Basic Shuffle, Shuffle Increment, Shuffle Reduction, and Change Topic—which replace original keywords with decoy ones, creating misleading clusters.

The proposed approach incorporates techniques such as text preprocessing using Natural Language Processing (NLP), feature extraction with Term FrequencyInverse Document Frequency (TF-IDF), document clustering with K-Means, and topic modeling using Latent Dirichlet Allocation (LDA). These methods ensure that even when adversaries attempt to analyze the documents, the results will be deceptive. This system effectively protects against the initial phase of IP theft and provides secure access for legitimate users through a secure enclave-based architecture.

Objectives:

  1. To detect adversarial behavior using Variational Autoencoder (VAE) for anomaly detection in access and activity logs.
  2. To identify suspicious document access patterns and unauthorized high-volume data extraction
  3. To disrupt automated document clustering and topic modeling used by adversaries for IP theft.
  4. To implement decoy-based techniques such as Basic Shuffle, Shuffle Increment, Shuffle Reduction, and Change Topic to mislead
  5. To ensure legitimate users retain seamless access to original documents through a secure enclave- based architecture.

Keywords: Insurance IP Repository, End User, Adversary Model, Adversary Detection, Document Manipulation, Document Repository Modification, Alert Generator, Notification


Download

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics....
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More