It's not technically hacking back, but it's definitely a more aggressive way to defend your network. A wave of startups and established security firms are offering deception-based security technologies, a sort of next-generation, proactive honeypot approach for enterprises.
Gartner calls this emerging sector "threat deception," and predicts that 10% of all enterprises by 2018 will employ some form of deception tools and tactics against attackers. These virtual machine or appliance-based tools basically pose as legitimate members of the network--file servers, routers, switches, database servers, and even Internet of Things devices-- typically near critical assets such as a point-of-sale system or a server as another layer of defense. They mimic the real system but also detect, analyze and disrupt an attack from getting to a real target.
Traditional honeypots long have been the domain of security researchers and analysts--and law enforcement--for studying or entrapping malware or other cyberattack activity. They are labor-intensive, and require expertise. But the more automated threat deception technology isn't your father's honeypot, and it's still not a widely deployed approach. Financial services, healthcare, technology, and government organizations are among the early adopters.
"Traditional honeypots were never designed to be deployed at scale within enterprise IT environments," says Carl Wright, general manager of TrapX, which sells a next-generation honeypot-type solution called DeceptionGrid. "Honeypots really don't do emulations of other than pretty standard PCs, workstations and servers … Deception technology can emulate the IoT or non-standard devices complete with spin data."
Lawrence Pingree, research director/analyst for Gartner's security group, says deception is a key component to detecting attacks. "What we do today is detect and block," he says. "But if you were to start lying to an attacker, for example, you can make them experience pain. You can create a deception zone within the network" so the attacker believes he is interacting with a real node, but instead it's the deceptive device emulating a real one, he says.
"Misdirecting them is a very effective defense," Pingree says. It can divert the attacker from the real target, such as a desktop.
Creating a phony device or system is relatively simple to configure, and threat deception devices also are typically integrated with other security systems; many come with graphical views of the attack across multiple sensors that give a snapshot of what the attacker might be up to, for example.
Ken Baylor, former CSO at Pivotal Software, which runs Attivo Networks' BOTsink, recommends placing the device logically close to the data it's protecting. "Attackers know critical data will be on the same subnets, so placing it in a likely subnet will aid with deception," Baylor says. And give the devices "enticing" names such as HRRecords, or creditcards, so they catch the attacker's eye, he says.
The Attivo systems at Pivotal caught mostly users trying to access devices to which they weren't authorized, malware from user's BYOD devices, unauthorized vulnerability scanners, and other insider threat issues, says Baylor.
Threat deception technology helps minimize the number of false positives, notes Christopher Ensey, chief operating officer at Dunbar Cybersecurity, a managed security services provider that runs TrapX's threat deception appliance in-house as well as offers it as part of its managed service.
Ensey says IDS and event logs have a high rate of false positives, so adding the threat deception layer helps filter out the real threats. "It's almost like an intelligent honeypot," he says. But unlike a honeypot, his TrapX systems are sampling malware and analyzing traffic patterns.
"You can quickly make a judgment. It's not like a false positive from an IDS, with multiple hours of packet analysis," he says.
But there some concerns about the risk of messing with the bad guys. What if they figure out they've hit a decoy? Pingree says these threat deception tools often are set up in a distributed way, and unlike classic honeypots, can respond so they appear real. "You can integrate deceptions at the endpoint … on my computer, it could inject fake credentials or fake drive maps" to throw off the attacker, he says.
In addition to TrapX, which specifically offers endpoint, application and some/partial data deception, there are several other vendors in the threat deception sspace that perform different types of deception, including: Allure Security Technology (data deception); Attivo Networks (endpoint, application and partial data); CyberTrap (endpoint, application and partial data); Cymmetria (endpoint, application and partial data); ForeScout (network ); Guardicore (network, endpoint, application and partial data); Hexis Cyber Solutions (network); Illusive Networks (endpoint and partial data); LogRhythm (endpoint); Percipient Networks (network); Rapid7 (endpoint); Shape Security (application); Specter (endpoint, application and partial data); and TopSpin Security (endpoint, application and data).
Some of today's firewall, IPS, endpoint, and Web application firewall products, could also deploy deceptive technology, according to Gartner. Juniper Networks, with its Mykonos Software acquisition for Web "deception," could fall into the threat deception technology category, according to Gartner.