Welcome!

FinTech Journal Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Elizabeth White, Flint Brenton

Related Topics: FinTech Journal, @CloudExpo, Cloud Security, @DXWorldExpo

FinTech Journal: Article

Intelligent Deception and #CyberSecurity | @CloudExpo #AI #ML #DL #Analytics

In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks

Top 5 Reasons Why Security Teams Love Intelligent Deception

Cyberattacks are relentless. The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling short, and security professionals are scrambling for new paradigms that can more effectively detect attacks and mitigate the growing levels of damage.

In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks. Why? Because instead of sitting back and waiting to be the victim, detection technologies let organizations be proactive and take the attack to the attacker. We've compiled a list of top five reasons why more security teams are opting for deception:

1. Malware Agnostic
Today's cyber defenses are centered around prevention. Yet next-generation firewalls, DLPs and antivirus solutions all rely on signatures and reputation to accomplish (or not accomplish) their task. This means that if they don't recognize the threat, they can't stop it. This is why we see so many data breaches at companies that have invested heavily in security - because threats are always changing and organizations are being hit with new attacks never seen before.

Deception, on the other hand, is a defense paradigm that's completely attack-agnostic. There's no need to define which specifically "irregular" attack is underway. Operating under the assumption that attackers have already breached the network, deception solutions set traps, lures and fake data to detect and stop human and machine attackers.

With intelligent deception technologies, the malicious nature of a particular software or user is determined when they trigger a trap. Once an intruder is detected, the deception layer sends an alert to the security team while profiling the threat. Using this approach, organizations can significantly shorten breach-to-resolution time and get a higher ROI dealing with accurate incidents.

2. Attack Interference
Intelligent deception not only lures attackers to decoys, it also serves to slow down attacks and keep the attackers engaged with decoy systems instead of roaming and causing harm to the network. Decoys engage attackers and keep them occupied in a number of ways, such as:

  • Adjusting the decoy's TCP stream as necessary to enable a slower or faster interaction
  • Allowing password-guessing in order to continue engaging the attacker. For instance, a decoy can be preset to decline the first six attempts, and allow the seventh to come through, regardless of the string that was typed in.
  • Feeding the attacker large files even when those are not requested by the attacker.

3. Enriched Threat Intelligence
The deception approach allows security teams to take the initiative - proactively developing intelligence that helps find the attacker's communication channels, understand how the connection was established, find out what protocols were used, and more. Some of the more advanced deception solutions employ traffic analysis engines in order to both place their traps strategically as well as to gather additional information about network threats.

By combining data from decoys, traps, traffic analysis and other active detection tools, deception platforms can feed and enrich SIEM/SOC systems to help organizations build comprehensive threat maps using real data in real time. The threat intelligence and visibility generated by drawing the attacker in rather than simply repulsing the attack enables an understanding of the attacker's goals - preventing not only this attack, but also future attacks. This is how organizations can take the attack to the attacker.

4. Minimizes False Positives
Alert fatigue and frustration from tedious analysis of false-positive are two of the biggest challenges facing cyber defenders. The former can lead to a "boy who cried wolf" mentality, which puts the organization at risk when security teams start ignoring alarms and can't begin to address the wave of alerts. The latter creates frustration because to be classified as false positives, numerous events demand considerable analysis and collection of data from a wider pool of sources for corroboration.

Deception solutions offer relief from this labor-intensive paradigm. Decoys trigger a low number of false positives because legitimate traffic shouldn't go near them in the first place. False positives are further reduced via higher levels of interaction between the decoy and the attacker and by correlating findings with other sensors in the network. Furthermore, advanced intelligent deception platforms that have integrated traffic analysis capabilities run internal correlation of data from both the deception and monitoring layers to ensure even higher alert accuracy. With far fewer false alarms, the security team can avoid configuration and management distractions and concentrate on real incidents.

5. Easy to Deploy & Manage
Current deception solutions are light years more advanced than the old, clunky honeypots of 10 and 20 years ago. Deploying deception is simple and fast. Intelligent deception is based on decoys and mini-traps - otherwise known as breadcrumbs or lures. These are placed on endpoints and servers and lead back to the decoys. In advanced deception-based solutions, deception components are deployed using point-and-click configuration, which largely automates the rollout of phantom decoys and networks. Deception solutions that have integrated traffic analysis capabilities use those in order to strategically place traps and decoys where they can be most effective - and dynamically adjust the deception layer as the network and threat environments evolve. Coupled with deception's accuracy and low (often no) false positives, this ease of configuration and management allows organizations to benefit from the technology without having to increase headcount.

The Bottom Line
The rising tide of cyber threats and the failure of traditional security paradigms to address them have created a perfect storm of cyberattacks. Deception is one of the few solutions that can break this cycle in an effective and cost-effective way - shutting down attacks before they cause damage, and letting network security professionals go on the offensive against attackers.

More Stories By Doron Kolton

Doron Kolton, founder and CEO of TopSpin, is a 25 year veteran of the data security market. Prior to founding TopSpin Security in 2013, he was in charge of web application firewall (WAF) development as VP of Product & Engineering of Breach Security, a position he continued to hold after the company was acquired by Trustwave.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
Michael Maximilien, better known as max or Dr. Max, is a computer scientist with IBM. At IBM Research Triangle Park, he was a principal engineer for the worldwide industry point-of-sale standard: JavaPOS. At IBM Research, some highlights include pioneering research on semantic Web services, mashups, and cloud computing, and platform-as-a-service. He joined the IBM Cloud Labs in 2014 and works closely with Pivotal Inc., to help make the Cloud Found the best PaaS.