Cyber Deception
Cyber deception is a defensive technique that involves the deployment of decoys (such as artifacts, configurations, or scenarios) with which an attacker can interact unknowingly. By doing so, it reveals pertinent information about the attacker's Tactics, Techniques, and Procedures (TTPs), thereby granting the defender a strategic advantage and a valuable source of data for cyber threat intelligence.
Our focus:
- Explore relevant scenarios and requirements for the application of cyber deception
- Formalisation and implementation of optimal and sub-optimal algorithms for the selection of the most appropriate decoys to deploy
- Development of automated and cloud-native cyber deception tools
Related Tools
- Decepto (A Decoy-Based Framework for Cyber Deception) [documentation]
Related Publications
-
Marco Zambianco, Claudio Facchinetti, Domenico Siracusa
A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
In: Computers & Security (DOI) -
Marco Zambianco, Claudio Facchinetti, Roberto Doriguzzi Corin, Domenico Siracusa
Resource-aware Cyber Deception for Microservice-based Applications
In: IEEE Transactions on Services Computing (DOI)