Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:00 PM
Connect Directly

Deceit As A Defense Against Cyberattacks

A new generation of 'threat deception' technology takes the honeypot to a new, enterprise level.

It's not technically hacking back, but it's definitely a more aggressive way to defend your network. A wave of startups and established security firms are offering deception-based security technologies, a sort of next-generation, proactive honeypot approach for enterprises.

Gartner calls this emerging sector "threat deception," and predicts that 10% of all enterprises by 2018 will employ some form of deception tools and tactics against attackers. These virtual machine or appliance-based tools basically pose as legitimate members of the network--file servers, routers, switches, database servers, and even Internet of Things devices-- typically near critical assets such as a point-of-sale system or a server as another layer of defense. They mimic the real system but also detect, analyze and disrupt an attack from getting to a real target.

Traditional honeypots long have been the domain of security researchers and analysts--and law enforcement--for studying or entrapping malware or other cyberattack activity. They are labor-intensive, and require expertise. But the more automated threat deception technology isn't your father's honeypot, and it's still not a widely deployed approach. Financial services, healthcare, technology, and government organizations are among the early adopters.

"Traditional honeypots were never designed to be deployed at scale within enterprise IT environments," says Carl Wright, general manager of TrapX, which sells a next-generation honeypot-type solution called DeceptionGrid. "Honeypots really don't do emulations of other than pretty standard PCs, workstations and servers … Deception technology can emulate the IoT or non-standard devices complete with spin data."

Lawrence Pingree, research director/analyst for Gartner's security group, says deception is a key component to detecting attacks. "What we do today is detect and block," he says. "But if you were to start lying to an attacker, for example, you can make them experience pain. You can create a deception zone within the network" so the attacker believes he is interacting with a real node, but instead it's the deceptive device emulating a real one, he says.

"Misdirecting them is a very effective defense," Pingree says. It can divert the attacker from the real target, such as a desktop.

Creating a phony device or system is relatively simple to configure, and threat deception devices also are typically integrated with other security systems; many come with graphical views of the attack across multiple sensors that give a snapshot of what the attacker might be up to, for example.

Ken Baylor, former CSO at Pivotal Software, which runs Attivo Networks' BOTsink, recommends placing the device logically close to the data it's protecting. "Attackers know critical data will be on the same subnets, so placing it in a likely subnet will aid with deception," Baylor says. And give the devices "enticing" names such as HRRecords, or creditcards, so they catch the attacker's eye, he says.

The Attivo systems at Pivotal caught mostly users trying to access devices to which they weren't authorized, malware from user's BYOD devices, unauthorized vulnerability scanners, and other insider threat issues, says Baylor.

Threat deception technology helps minimize the number of false positives, notes Christopher Ensey, chief operating officer at Dunbar Cybersecurity, a managed security services provider that runs TrapX's threat deception appliance in-house as well as offers it as part of its managed service.

Ensey says IDS and event logs have a high rate of false positives, so adding the threat deception layer helps filter out the real threats. "It's almost like an intelligent honeypot," he says. But unlike a honeypot, his TrapX systems are sampling malware and analyzing traffic patterns.

"You can quickly make a judgment. It's not like a false positive from an IDS, with multiple hours of packet analysis," he says.

But there some concerns about the risk of messing with the bad guys. What if they figure out they've hit a decoy? Pingree says these threat deception tools often are set up in a distributed way, and unlike classic honeypots, can respond so they appear real. "You can integrate deceptions at the endpoint … on my computer, it could inject fake credentials or fake drive maps" to throw off the attacker, he says.

In addition to TrapX, which specifically offers endpoint, application and some/partial data deception, there are several other vendors in the threat deception sspace that perform different types of deception, including: Allure Security Technology (data deception); Attivo Networks (endpoint, application and partial data); CyberTrap (endpoint, application and partial data); Cymmetria (endpoint, application and partial data); ForeScout (network ); Guardicore (network, endpoint, application and partial data); Hexis Cyber Solutions (network);  Illusive Networks (endpoint and partial data); LogRhythm (endpoint); Percipient Networks (network); Rapid7 (endpoint); Shape Security (application); Specter (endpoint, application and partial data); and TopSpin Security (endpoint, application and data).

Some of today's firewall, IPS, endpoint, and Web application firewall products, could also deploy deceptive technology, according to Gartner. Juniper Networks, with its Mykonos Software acquisition for Web "deception," could fall into the threat deception technology category, according to Gartner.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Author
10/2/2015 | 6:27:50 PM
Deceit for breach detection is a good start.
Easy to use honeypots are a good solution for detecting breaches more quickly. That is important because many go undetected for months. One hopes that this will be used in conjunction with tools and architectures that limit damage, contain attacks, and automate recovery (even without detection).
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
PUBLISHED: 2021-06-14
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the...