Deception Technology
The Art of Recording Cyber Attacks
P r e s e n t e d B y -
Name – Rutuja Babasaheb Salunkhe
Branch – Second Year Information
Technology
PRN No. – 2030331246057
College Name – Dr. Babasaheb Ambedkar
Technological University , Lonere
Under the guidance of –
Prof. Ekta Meshram
CONTENT
What is Deception Technology?
Importance of Deception Technology
Evolution of Deception Technology
Defining a Honeypot
Working Principle of Deception Technology
Applicable Methods of Deception
Technology
Benefits of Deception Technology
Conclusion
What is Deception Technology?
Deception technology is a cybersecurity
defense practice that aims to deceive
attackers by distributing a collection of
traps and decoys across a system's
infrastructure to imitate genuine assets. If
an intruder triggers a decoy, then the
server will log and monitor the attack
vectors utilized throughout the duration of
the engagement.
Importance of Deception Technology
As attack vectors become increasingly complex,
organizations need to be able to detect suspicious
activity earlier in the attack chain and respond
accordingly. Deception technology provides
security teams with a number of tactics and
resulting benefits to help:
Decrease attacker dwell time
on their network.
Reduce alert fatigue.
Expedite average time to
detect and remediate
threats.
Evolution of Deception Technology
Defining a Honeypot
The basic concept of honeypots are decoy
systems with desired fake data, isolated and
monitored for activity to divert and detect attackers
with no risk to real data, operations or users.
Traditionally, honeypots were created to bait
attackers with fake credit card data and access
credentials on stand-alone systems to learn who
enters, their methods and what they desire.
Honeypots have evolved to automated deception
technology, which is more dynamic and acts as a
smart-alarm system.
Working Principle of Deception
Technology
The Deception Technology is for
MILDEC or military deception. The
Deception Technology’s working
principle is much simpler to
understand, a false decoy network will
run on-existing infrastructure, but not
visible by genuine staff. When any
hacker or intruder visits that
infrastructure they will be able to see
the decoy as an opportunity to hack the
infrastructure and they will fall for
that.
Applicable Methods of Deception Technology
1 . Piggybacking :
2 . Impersonation :
3 . Web-Based Deception :
4 . Hoaxes :
Benefits of Deception Technology
Conclusion
Deception technology, such as those being offered by
Illusive Networks, an Israel based company, has been very
well received by financial institutions, banks, insurance,
and healthcare companies, which rely heavily on keeping
their customer and transactional data safe. This
technology holds promise for the future of cybersecurity,
wherein it is poised to expose bad actors and actual
hackers trying to breach networks actively, and not just
with passive tools like malware and phishing tools. This
new and exciting technology brings about a new
dimension in companies’ cybersecurity arsenals to
protect data and expose actual threats and malicious
actors.