Welcome!

Related Topics: FinTech Journal, @CloudExpo, Cloud Security, @BigDataExpo

FinTech Journal: Article

Intelligent Deception and #CyberSecurity | @CloudExpo #AI #ML #DL #Analytics

In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks

Top 5 Reasons Why Security Teams Love Intelligent Deception

Cyberattacks are relentless. The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling short, and security professionals are scrambling for new paradigms that can more effectively detect attacks and mitigate the growing levels of damage.

In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks. Why? Because instead of sitting back and waiting to be the victim, detection technologies let organizations be proactive and take the attack to the attacker. We've compiled a list of top five reasons why more security teams are opting for deception:

1. Malware Agnostic
Today's cyber defenses are centered around prevention. Yet next-generation firewalls, DLPs and antivirus solutions all rely on signatures and reputation to accomplish (or not accomplish) their task. This means that if they don't recognize the threat, they can't stop it. This is why we see so many data breaches at companies that have invested heavily in security - because threats are always changing and organizations are being hit with new attacks never seen before.

Deception, on the other hand, is a defense paradigm that's completely attack-agnostic. There's no need to define which specifically "irregular" attack is underway. Operating under the assumption that attackers have already breached the network, deception solutions set traps, lures and fake data to detect and stop human and machine attackers.

With intelligent deception technologies, the malicious nature of a particular software or user is determined when they trigger a trap. Once an intruder is detected, the deception layer sends an alert to the security team while profiling the threat. Using this approach, organizations can significantly shorten breach-to-resolution time and get a higher ROI dealing with accurate incidents.

2. Attack Interference
Intelligent deception not only lures attackers to decoys, it also serves to slow down attacks and keep the attackers engaged with decoy systems instead of roaming and causing harm to the network. Decoys engage attackers and keep them occupied in a number of ways, such as:

  • Adjusting the decoy's TCP stream as necessary to enable a slower or faster interaction
  • Allowing password-guessing in order to continue engaging the attacker. For instance, a decoy can be preset to decline the first six attempts, and allow the seventh to come through, regardless of the string that was typed in.
  • Feeding the attacker large files even when those are not requested by the attacker.

3. Enriched Threat Intelligence
The deception approach allows security teams to take the initiative - proactively developing intelligence that helps find the attacker's communication channels, understand how the connection was established, find out what protocols were used, and more. Some of the more advanced deception solutions employ traffic analysis engines in order to both place their traps strategically as well as to gather additional information about network threats.

By combining data from decoys, traps, traffic analysis and other active detection tools, deception platforms can feed and enrich SIEM/SOC systems to help organizations build comprehensive threat maps using real data in real time. The threat intelligence and visibility generated by drawing the attacker in rather than simply repulsing the attack enables an understanding of the attacker's goals - preventing not only this attack, but also future attacks. This is how organizations can take the attack to the attacker.

4. Minimizes False Positives
Alert fatigue and frustration from tedious analysis of false-positive are two of the biggest challenges facing cyber defenders. The former can lead to a "boy who cried wolf" mentality, which puts the organization at risk when security teams start ignoring alarms and can't begin to address the wave of alerts. The latter creates frustration because to be classified as false positives, numerous events demand considerable analysis and collection of data from a wider pool of sources for corroboration.

Deception solutions offer relief from this labor-intensive paradigm. Decoys trigger a low number of false positives because legitimate traffic shouldn't go near them in the first place. False positives are further reduced via higher levels of interaction between the decoy and the attacker and by correlating findings with other sensors in the network. Furthermore, advanced intelligent deception platforms that have integrated traffic analysis capabilities run internal correlation of data from both the deception and monitoring layers to ensure even higher alert accuracy. With far fewer false alarms, the security team can avoid configuration and management distractions and concentrate on real incidents.

5. Easy to Deploy & Manage
Current deception solutions are light years more advanced than the old, clunky honeypots of 10 and 20 years ago. Deploying deception is simple and fast. Intelligent deception is based on decoys and mini-traps - otherwise known as breadcrumbs or lures. These are placed on endpoints and servers and lead back to the decoys. In advanced deception-based solutions, deception components are deployed using point-and-click configuration, which largely automates the rollout of phantom decoys and networks. Deception solutions that have integrated traffic analysis capabilities use those in order to strategically place traps and decoys where they can be most effective - and dynamically adjust the deception layer as the network and threat environments evolve. Coupled with deception's accuracy and low (often no) false positives, this ease of configuration and management allows organizations to benefit from the technology without having to increase headcount.

The Bottom Line
The rising tide of cyber threats and the failure of traditional security paradigms to address them have created a perfect storm of cyberattacks. Deception is one of the few solutions that can break this cycle in an effective and cost-effective way - shutting down attacks before they cause damage, and letting network security professionals go on the offensive against attackers.

More Stories By Doron Kolton

Doron Kolton, founder and CEO of TopSpin, is a 25 year veteran of the data security market. Prior to founding TopSpin Security in 2013, he was in charge of web application firewall (WAF) development as VP of Product & Engineering of Breach Security, a position he continued to hold after the company was acquired by Trustwave.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source – without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It’s no longer a “nice-to-have” but an important differentiator that drives competitive advantages. It’s the new “must have” in the hybrid era. Users want capabilities that give them a unified view of the data to get closer to customers and grow business. The...
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
In this presentation, Striim CTO and founder Steve Wilkes will discuss practical strategies for counteracting fraud and cyberattacks by leveraging real-time streaming analytics. In his session at @ThingsExpo, Steve Wilkes, Founder and Chief Technology Officer at Striim, will provide a detailed look into leveraging streaming data management to correlate events in real time, and identify potential breaches across IoT and non-IoT systems throughout the enterprise. Strategies for processing massive ...
SYS-CON Events announced today that Cloud Academy named "Bronze Sponsor" of 21st International Cloud Expo which will take place October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara, CA. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud com...
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo Silicon Valley which will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is at the intersection of technology and business-optimizing tools, organizations and processes to bring measurable improvements in productivity and profitability," said Aruna Ravichandran, vice president, DevOps product and solutions marketing...
In his session at Cloud Expo, Alan Winters, an entertainment executive/TV producer turned serial entrepreneur, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to ma...
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 21st Int\ernational Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their ...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists discussed...
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists looked at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deliver...