Microbial Bioactives | Online ISSN 2209-2161
REVIEWS   (Open Access)

Unmasking Nature’s Deceit: A Systematic Review of Biological Deception Across Pathogens, Viruses, and Genetic Systems

Marjan Ganjali Dashti 1*, Md Kawsar Mustofa 2

+ Author Affiliations

Microbial Bioactives 8 (1) 1-8 https://doi.org/10.25163/microbbioacts.8110417

Submitted: 04 February 2025 Revised: 09 April 2025  Accepted: 13 April 2025  Published: 14 April 2025 


Abstract

Deception, though often viewed as a human trait, is deeply woven into the fabric of biology. From microscopic pathogens to complex genetic systems, life itself has evolved remarkable ways to mislead, conceal, and outmaneuver. This systematic review explores how deception serves as a survival strategy in diverse biological contexts—particularly within microbes, viruses, and cellular genetics. By synthesizing evidence from microbiology, virology, oncology, and molecular genetics, the review reveals how organisms manipulate host defenses, alter molecular signatures, and reshape genetic pathways to persist and thrive. Pathogens such as Mycobacterium tuberculosis and Plasmodium falciparum employ antigenic variation and immune evasion to prolong infection, while viruses like HIV and influenza rely on mutation, latency, and mimicry to stay undetected. Within human genetics, similar deceptive mechanisms emerge: cancer cells mask themselves through epigenetic silencing and genetic instability, mirroring the evasive tactics of infectious agents. Together, these patterns expose deception as a unifying biological theme that blurs the line between infection, mutation, and adaptation.
Recognizing and decoding these hidden strategies is essential for the next generation of diagnostics, vaccines, and targeted therapies. By unmasking how life deceives, we move closer to transforming biological trickery into tools for healing—turning deception itself into a guide for innovation in global health and precision medicine.

Keywords: Biological deception, Pathogens, Viruses, Genetic mutation, Immune evasion, Molecular mimicry, Precision medicine

References

Acosta, J. C., Basak, A., Kiekintveld, C., Leslie, N., & Kamhoua, C. (2020, September 28–30). Cybersecurity deception experimentation system. In Proceedings of the 2020 IEEE Secure Development (SecDev) (pp. 34–40). IEEE. https://doi.org/10.1109/SecDev45635.2020.00012

Aggarwal, P., Du, Y., Singh, K., & Gonzalez, C. (2021). Decoys in cybersecurity: An exploratory study to test the effectiveness of two-sided deception. arXiv:2108.11037. https://arxiv.org/abs/2108.11037

Anwar, A. H., Kamhoua, C. A., Leslie, N. O., & Kiekintveld, C. (2022). Honeypot allocation for cyber deception under uncertainty. IEEE Transactions on Network and Service Management, 19(4), 3438–3452. https://doi.org/10.1109/TNSM.2022.3186840

Anwar, A., Chen, Y. H., Hodgman, R., Sellers, T., Kirda, E., & Oprea, A. (2022, December 5–9). A recent year on the Internet: Measuring and understanding the threats to everyday Internet devices. In Proceedings of the 38th Annual Computer Security Applications Conference (pp. 251–266). ACM. https://doi.org/10.1145/3564625.3564630

Baykara, M., & Das, R. (2019). SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks. Turkish Journal of Electrical Engineering and Computer Sciences, 27(5), 3309–3325. https://doi.org/10.3906/elk-1807-244

Benedict, S. (2022). EA-POT: An explainable AI-assisted blockchain framework for honeypot IP predictions. Acta Cybernetica, 26(1), 149–173. https://doi.org/10.14232/actacyb.292861

DePaulo, B. M. (1994). Spotting lies: Can humans learn to do better? Current Directions in Psychological Science, 3(3), 83–86. https://doi.org/10.1111/1467-8721.ep10770693

Dowling, S., Schukat, M., & Barrett, E. (2019). Using reinforcement learning to conceal honeypot functionality. In Machine Learning and Knowledge Discovery in Databases: European Conference (ECML PKDD 2018) (pp. 341–355). Springer. https://doi.org/10.1007/978-3-030-10925-7_21

Draghicescu, D., Caranica, A., & Fratu, O. (2021). Honeypot technologies for malware detection and analysis. Strategica XXI_CSC, 17, 265–271.

Ekman, P., & O’Sullivan, M. (1991). Who can catch a liar? American Psychologist, 46(9), 913–920. https://doi.org/10.1037/0003-066X.46.9.913

Elstein, A. S. (1988). Cognitive processes in clinical inference and decision making. In D. C. Turk & P. Salovey (Eds.), Reasoning, inference, and judgment in clinical psychology (pp. 17–50). Free Press.

Faust, D., & Guilmette, T. J. (1990). To say it’s not so doesn’t prove that it isn’t: Research on the detection of malingering—Reply to Bigler. Journal of Consulting and Clinical Psychology, 58(2), 248–250. https://doi.org/10.1037/0022-006X.58.2.248

Faust, D., Hart, K., & Guilmette, T. J. (1988a). Pediatric malingering: The capacity of children to fake believable deficits on neuropsychological testing. Journal of Consulting and Clinical Psychology, 56(4), 578–582. https://doi.org/10.1037/0022-006X.56.4.578

Faust, D., Hart, K., & Guilmette, T. J. (1988b). Neuropsychologists’ capacity to detect adolescent malingerers. Professional Psychology: Research and Practice, 19(5), 508–515. https://doi.org/10.1037/0735-7028.19.5.508

Florea, R., & Craus, M. (2022). A game-theoretic approach for network security using honeypots. Future Internet, 14(12), 362. https://doi.org/10.3390/fi14120362

Heaton, R. K., Smith, H. H., & Lehman, R. A. Jr. (1978). Prospects for faking believable deficits on neuropsychological testing. Journal of Consulting and Clinical Psychology, 46(4), 892–900. https://doi.org/10.1037/0022-006X.46.4.892

Hiscock, M., & Hiscock, C. K. (1989). Refining the forced-choice method for the detection of malingering. Journal of Clinical and Experimental Neuropsychology, 11(6), 967–974. https://doi.org/10.1080/01688638908400931

Javadpour, A., Ja’fari, F., Taleb, T., & Benzaïd, C. (2023, June 14–16). A mathematical model for analyzing honeynets and their cyber deception techniques. In Proceedings of the 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS) (pp. 81–88). IEEE. https://doi.org/10.1109/ICECCS57965.2023.10191825

Kahneman, D., Slovic, P., & Tversky, A. (1982). Judgment under uncertainty: Heuristics and biases. Cambridge University Press. https://doi.org/10.1017/CBO9780511809477

Katakwar, H., Aggarwal, P., & Dutt, V. (2023). Modeling the effects of different honeypot proportions in a deception-based security game. AHFE International, 91, 132–145.

Mocanu, F., & Scripcariu, L. (2023, July 13–14). Intrusion detection platform with virtual honeypots. In Proceedings of the 2023 International Symposium on Signals, Circuits and Systems (ISSCS) (pp. 1–4). IEEE. https://doi.org/10.1109/ISSCS57954.2023.10214186

Naik, N., Shang, C., Jenkins, P., & Shen, Q. (2020). D-FRI-Honeypot: A secure sting operation for hacking the hackers using dynamic fuzzy rule interpolation. IEEE Transactions on Emerging Topics in Computational Intelligence, 5(6), 893–907. https://doi.org/10.1109/TETCI.2020.2968832

Nila, C., Preda, M., Apostol, I., & Patriciu, V.-V. (2021, July 1–3). Reactive Wi-Fi honeypot. In Proceedings of the 2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (pp. 1–6). IEEE. https://doi.org/10.1109/ECAI52376.2021.9515108

Nintsiou, M., Grigoriou, E., Karypidis, P. A., Saoulidis, T., Fountoukidis, E., & Sarigiannidis, P. (2023, July 31–August 2). Threat intelligence using digital twin honeypots in cybersecurity. In Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 530–537). IEEE. https://doi.org/10.1109/CSR57506.2023.10250414

Osman, M., Nadeem, T., Hemida, A., & Kamhoua, C. (2023, December 8). Optimizing honeypot placement strategies with graph neural networks for enhanced resilience via cyber deception. In Proceedings of the 2nd Graph Neural Netwo rking Workshop (pp. 37–43). ACM. https://doi.org/10.1145/3626793.3626812

Pankratz, L. (1979). Symptom validity testing and symptom retraining: Procedures for the assessment and treatment of functional sensory deficits. Journal of Consulting and Clinical Psychology, 47(2), 409–410. https://doi.org/10.1037/0022-006X.47.2.409

Rogers, R., Harrell, E. H., & Liff, C. D. (1993). Feigning neuropsychological impairment: A critical review of methodological and clinical considerations. Clinical Psychology Review, 13(3), 255–274. https://doi.org/10.1016/0272-7358(93)90033-3

Rosenhan, D. L. (1973). On being sane in insane places. Science, 179(4070), 250–258. https://doi.org/10.1126/science.179.4070.250

Rothke, S. E., Dahlstrom, W. G., & Greene, R. L. (1994). MMPI-2 normative data for the F–K Index: Implications for clinical, neuropsychological, and forensic practice. Assessment, 1(1), 1–8. https://doi.org/10.1177/107319119400100101

Sayed, M. A., Anwar, A. H., Kiekintveld, C., & Kamhoua, C. (2023, October 18–20). Honeypot allocation for cyber deception in dynamic tactical networks: A game-theoretic approach. In Proceedings of the International Conference on Decision and Game Theory for Security. Springer. https://doi.org/10.1007/978-3-031-47248-7_15

Schuba, M., Hofken, H., & Linzbach, S. (2021, December 9–10). An ICS honeynet for detecting and analyzing cyberattacks in industrial plants. In Proceedings of the 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (pp. 1–6). IEEE. https://doi.org/10.1109/ICECET52533.2021.9698502

Sehgal, R., Majithia, N., Singh, S., Sharma, S., Mukhopadhyay, S., Handa, A., & Shukla, S. K. (2020). Honeypot deployment experience at IIT Kanpur. IITK Directorate Reports, 49–63.

Šimon, M., Huraj, L., & Hrinkino, D. (2023, October 26–27). Using a honeypot to improve student cybersecurity awareness. In Proceedings of the 2023 21st International Conference on Emerging eLearning Technologies and Applications (ICETA) (pp. 440–445). IEEE. https://doi.org/10.1109/ICETA60238.2023.10340958

Sladic, M., Valeros, V., Catania, C., & Garcia, S. (2023). LLM in the shell: Generative honeypots. arXiv:2309.00155. https://arxiv.org/abs/2309.00155

Subhan, D., & Lim, C. (2023, August 22–24). Unveiling attack patterns: A study of adversary behavior from honeypot data. In Proceedings of the 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) (pp. 178–183). IEEE. https://doi.org/10.1109/ICoCICs58413.2023.10289219 

Subhan, D., & Lim, C. (2023, August 23–24). Analyzing adversary’s attack on Ethereum collected from honeypots. In Proceedings of the 2023 11th International Conference on Information and Communication Technology (ICoICT) (pp. 313–318). IEEE. https://doi.org/10.1109/ICoICT57864.2023.10188123

Touch, S., & Colin, J.-N. (2021, October 26–28). Asguard: Adaptive self-guarded honeypot. In Proceedings of the 17th International Conference on Web Information Systems and Technologies (pp. 565–574). SciTePress. https://doi.org/10.5220/0010715500003064

Valeros, V., Rigaki, M., & Garcia, S. (2023). Attacker profiling through analysis of attack patterns in geographically distributed honeypots. arXiv:2305.01346. https://arxiv.org/abs/2305.01346

Veluchamy, S., & Kathavarayan, R. S. (2021). Deep reinforcement learning for building honeypots against runtime DoS attack. International Journal of Intelligent Systems, 37(6), 3981–4007. https://doi.org/10.1002/int.22628

Wang, C., & Lu, Z. (2018). Cyber deception: Overview and the road ahead. IEEE Security & Privacy, 16(3), 80–85. https://doi.org/10.1109/MSP.2018.2701150

Wiggins, E. C., & Brandt, J. (1988). The detection of simulated amnesia. Law and Human Behavior, 12(1), 57–62. https://doi.org/10.1007/BF01064274

Zhou, Z., & Shen, W. (2024). HoneyPot: Enhancing cybersecurity through a computer simulation technology. Highlights in Science, Engineering and Technology, 105, 97–101.

Ziaie Tabari, A., & Ou, X. (2020, November 9–13). A multi-phased multifaceted IoT honeypot ecosystem. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM. https://doi.org/10.1145/3372297.3423368

Zobal, L., Kolar, D., & Fujdiak, R. (2019, October 28–30). Current state of honeypots and deception strategies in cybersecurity. In Proceedings of the 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (pp. 1–9). IEEE. https://doi.org/10.1109/ICUMT48472.2019.8970877


View Dimensions


View Plumx


View Altmetric



0
Save
0
Citation
49
View
0
Share