Q: 4
Dynamic network scanning logs from a Cloud-based environment show an adversary
utilizing an automated ML-driven classifier to distinguish between production assets and
high-interaction traps. The attacker's script analyzes latency variations and TCP stack
fingerprinting consistency to avoid engagement with deception systems.
Which of the following describes the specific challenge posed by AI-driven automated
attack generation in this context?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.