Threat Defense Cyber Deception Approach
Threat Defense Cyber Deception Approach
Article
Threat Defense: Cyber Deception Approach and Education for
Resilience in Hybrid Threats Model
William Steingartner 1, * , Darko Galinec 2 and Andrija Kozina 3
Abstract: This paper aims to explore the cyber-deception-based approach and to design a novel
conceptual model of hybrid threats that includes deception methods. Security programs primarily
focus on prevention-based strategies aimed at stopping attackers from getting into the network. These
programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking
malicious activities to detect and stop attackers before they can get in. Most organizations implement
such a strategy by fortifying their networks with defense-in-depth through layered prevention
controls. Detection controls are usually placed to augment prevention at the perimeter, and not as
consistently deployed for in-network threat detection. This architecture leaves detection gaps that
are difficult to fill with existing security controls not specifically designed for that role. Rather than
using prevention alone, a strategy that attackers have consistently succeeded against, defenders
are adopting a more balanced strategy that includes detection and response. Most organizations
Citation: Steingartner, W.; Galinec,
deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks
D.; Kozina, A. Threat Defense: Cyber or attempts to pattern match for identification. Other detection tools use monitoring, traffic, or
Deception Approach and Education behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often
for Resilience in Hybrid Threats fail. They also have some limitations because they are not designed to catch credential harvesting or
Model. Symmetry 2021, 1, 0. attacks based on what appears as authorized access. They are also often seen as complex and prone
https://doi.org/ to false positives, adding to analyst alert fatigue. The security industry has focused recent innovation
on finding more accurate ways to recognize malicious activity with technologies such as user and
Academic Editor: Kuo-Hui Yeh entity behavioral analytics (UEBA), big data, artificial intelligence (AI), and deception.
the cybersecurity risk is creating reference architecture models that integrate regulatory
and company policy requirements. Infrastructure diagrams including security items such
as firewalls should be designed providing guidelines for their implementations. It is also
imperative to track vulnerabilities of each IT asset using online libraries that list all possible
weaknesses [1].
Technology is an indispensable and integral part of today’s business in helping to
drive growth and improve operations. It is now commonplace to think of corporate
strategies and digital strategies in the same way. The current COVID-19 crisis has made
this viewpoint more urgent than ever as executive leadership moves beyond just seeing
technology as a cost-saving vehicle. In a 2020 McKinsey study, more than half of executives
say they are investing in technology for competitive advantage or refocusing their entire
business around digital technologies. These mindset shifts regarding digital technology are
even more apparent at companies with declining revenues as they acknowledge they were
behind their peers in the use of digital technology. COVID-19 pushed companies over the
technology tipping point and transformed business forever. Organizations must now build
a flexible digital organization that can withstand disruption, with an architecture resilient-
by-design, embedded in technologies and processes [2]. An efficient, high-performing,
and adaptable information technology (IT) ecosystem becomes a real business asset [1].
Deception should not be viewed as a“rip and replacement" of existing security controls;
it complements and enhances them. The decision to add deception should be based on
a need for early and simplified threat detection, closing in-network detection gaps, and
strengthening security programs across multiple environments and threat vectors, and
a need for the ability to do things that other security solutions cannot do. Additionally,
deception provides visibility into exposed attack paths, attacker activity, and captured
threat intelligence. This, paired with forensic recording, enhances and elevates a security
team’s ability to prevent an attack and to respond decisively when under attack. Adding
a new capability to a security stack can come with complexity as security teams work
to incorporate the solution into their operations. This is generally not the case with a
deception platform. Such platforms integrate with existing systems in a way that requires
minimal effort to deploy, operate, and manage.
Security technologies must continually evolve to match transformations across digital
business landscapes. Product managers must address new security risks and threats posed
by new infrastructures, business-enabling technologies, and evolved security programs [3].
“It’s true that when distributed deception technology first emerged, honeypots were the
most analogous solution to describe the way that deception worked, in that a honeypot
also tries to trick attackers into an engagement. However, deception has come a long
way since the early heyday of honeypots, and its more lightweight, far more valuable
descendant is proving extremely versatile when it comes to use cases. Unlike honeypots
that are typically used to trap attackers to study their late-stage attack behaviors, endpoint
deceptions are false data elements meant to be encountered early in the attack lifecycle.
At first interaction with any false data, a high-fidelity notification is triggered, showing
exactly what has been attempted and where. In fact, next-generation deception technology
has emerged as the most effective and earliest way to detect and stop attacker movement
inside the environment. With all the overblown promises on the market, coupled with
the extreme and immediate need for strong cybersecurity, organizations can have a hard
time figuring out whether any particular security product or service is really going to
be effective at catching attackers before they reach critical data. Gartner notes that de-
ception technology not only ‘does well in proof of concept (POC)’ and ‘perform(s) well
during the sales cycle;’ it also ‘proved to be a worthy technology to add to security pro-
grams.’ By understanding the truths about deception technology—and clearing up the
misconceptions—organizations can start implementing a new security approach that is
easily deployed, proactive, and effective” [4].
Advanced deception platforms will not disrupt other network functions. They operate
out of the band and have the flexibility to white-list devices to avoid conflicts. They also
Symmetry 2021, 1, 0 3 of 25
uniquely carries the benefit of not only being able to disrupt and derail attacks but also,
in its power to shift the asymmetry in the direction of the defenders [6].
For millennia, deception has been used to effectively confuse and outmaneuver op-
ponents in warfare, sports, and gambling. Now, deception is being applied to the cyber
realm to create uncertainty in the attackers’ mind, to trick them into making mistakes that
reveal their presence, and to make the overall attack economics unfavorable. With decep-
tion technology, security teams do not need to wait and react to an attack. Instead, they
can deploy bait, lures, and decoys designed to derail attacks early and throughout the
attack life-cycle. Attackers typically harvest credentials, conduct reconnaissance, and move
laterally to complete their attack. With a deception fabric, organizations create a virtual
minefield consisting of credential bait and decoys that mirror the production environment’s
operating systems, applications, and data. As soon as an attacker interacts with a deceptive
asset, the security team receives a high-fidelity, engagement-based alert with the informa-
tion required to not only stop the threat’s actors but also understand them. Unlike other
detection tools, a high-interaction deception environment provides defenders with the
option to safely study their opponent while gathering adversary intelligence. By gaining
insight into the attacker’s tools, methods, and intent, the defender is armed with deeper
knowledge for strengthening overall defense strategies, leveling the playing field with
their opponent [6].
Attackers have remained undetected in networks for much too long after the initial
compromise. Dwell time ranges from 79 days to over 200 days, depending on the region
and source of the report. These numbers reinforce that an attacker is afforded far too
much time in an enterprise while remaining undetected. Conversely, even when defenders
successfully disrupt and remediate attacks, too often, little useful information is gathered
about the adversary. This lack of information makes verifying the removal of the attacker’s
foothold and preventing a successful return extremely challenging. Unlike attackers,
who gain knowledge about the environment each time they attack, defenders do not
acquire additional insight, putting them at a distinct disadvantage. As in physical attacks,
understanding potential adversaries is critical to countering their next move [6].
Figure 1. Information Systems’ Open Systems Interconnection Model (OSI-Model) layers and types
of attack mapping.
“Advanced cyber threats are already here, 2020 has been an outlier in countless
categories, including cyber threat trends. The year has taught us many things the hard
way, including the importance of preparing for known threats. Yet, as we all adjusted
to the new realities of the pandemic, the world kept turning. Technology continued to
advance. Markets continued to grow. Cyber threats continued to evolve. Today importance
of preparing for known threats exists. In the span of a few weeks, the economy, education
systems, and lifestyles are altered by a scenario that experts had long been warning about.
Cyber threats are increasing in both scope and frequency.
"Much of that evolution is related, at least somewhat, to the pandemic. From ran-
somware operators refining and polishing their business models, to the rapid adoption of
cloud as organizations seek to gain operational efficiencies, threat actors are evolving and
attack surfaces are expanding. In a time of change and adaptation, upcoming cybersecurity
challenges, and guidance on how to prepare for them are to be explored.” [20]
The report [20] covers eight key cyber threat trends anticipated for 2021:
1. Next-Generation Extortion and Evolution in Malware Business Models
2. Supply Chain Attacks via Cloud-Hosted Development Environments
3. AI, Evasion, and Theft
4. Parcel and Shipping as Critical Infrastructure
5. Mandated Contact Tracing Apps May Open Doors for Large-Scale Cyber Attacks
6. Cybercriminals Will Likely Capitalize on Rapid U.S. Telehealth Adoption
7. Fifth Generation Network (5G) to Expand the Attack Surface for Industrial Internet of
Things (IoT)
8. 5G to Increase Security Pressure on Mobile Hotspots.
Symmetry 2021, 1, 0 6 of 25
Figure 2. Interdependent societal sectors and vital services vulnerable to a major disruption in the
case of a hybrid attack.
Hybrid threats (particularly recent cyber attacks) continue to target the civil population
and critical infrastructures, owned largely by the private sector. These developments have
had a profound effect, bringing into sharp focus the need to boost resilience through civil
preparedness. Today, Allies are pursuing a step-by-step approach to this end—an effort
that complements NATO’s military modernization and its overall deterrence and defense
posture [22].
would still be subject to international laws that predominantly prohibit this type of activity.
Law and ethics aside, attribution is typically not easy, and most organizations simply
do not have the skills or tools to do this successfully. Hacking back also presents a high
risk that could result in unintended consequences. This may stem from attacking the
innocent or bringing on heightened attacker retaliation, which organizations may find
themselves ill-prepared for. Threat deception is a much better option than retaliation.
Instead, organizations can use the rich forensic, threat, and adversary intelligence gathered
in a deception environment to take pre-emptive measures to fortify their defenses. By better
understanding the attacker, an organization can confuse, slow down, and stop an attacker
while gathering information on how they are attacking and what they may be targeting.
In addition to threat and adversary intelligence, the use of decoy document beaconing
functionality provides counterintelligence on what an attacker is seeking and geo-location
of where the document is accessed, inside and outside the network. This capability can
be invaluable in understanding what and whether something is stolen and for protecting
research, intellectual property, or case files.
“Two major variables affect the utility of cyber technologies in war: the timing and
operational complexity of cyber operations. Timing refers to questions of when and how
long to engage in cyber operations to maximize effects. Operational complexity describes
how hard it is to pull off the entire operation. Operational complexity includes various
aspects such as the number of targets (one system vs. hundreds of systems to be hit at the
same time), the defense level of the targets (multiple open attack surfaces vs. air-gapped
systems), the availability of resources (intelligence and malware stockpile) as well as the
size and internal organization and coordination of attacker teams” [27].
Within the non-hierarchical Hybrid Threats Model, military and nonmilitary activities
using conventional and unconventional tools and tactics are combined. Interactions be-
tween some individual layers of the model by means of cybersecurity and cyber defense
are being achieved in cyberspace as the common denominator of particular components of
the model, enabling multiple threats to be realized through systems’ (states’) vulnerabili-
ties [29].
“These nonmilitary actions will help lessen and remove military hazards and threats
by the opponents entering into peace treaties and taking other amicable steps. nonmilitary
measures serve to reduce the possibility for the aggressor to engage in hostile activities
against other countries, give it an unflattering image in public opinion, make sensational de-
nunciations of its aggressive plans, and so on. Beyond a shadow of a doubt, the aggressive
side will be first to use nonmilitary actions and measures as it plans to attack its victim in a
new-generation war. With powerful information technologies at its disposal, the aggressor
will make an effort to involve all public institutions in the country it intends to attack, pri-
Symmetry 2021, 1, 0 10 of 25
marily the mass media and religious organizations, cultural institutions, non-governmental
organizations, public movements financed from abroad, and scholars engaged in research
on foreign grants. All these institutions and individuals may be involved in a distributed
attack and strike damaging point blows at the country’s social system with the purported
aims of promoting democracy and respect for human rights” [34,35].
motivation is in the fidelity of the detection or in the desire to gather adversary intelligence
and forensics, deception is providing a unique offering and one that the adversary is not
often expecting or prepared for. There are clear benefits to adding a synthetic deception
environment to an organization’s network. As soon as a would-be predator interacts with
the decoy, they immediately reveal their presence and their activities can then be monitored
and recorded. This is a unique advantage to defenders that can only be achieved within
a deceptive environment. The actions taken by the attacker within the decoy system are
immediately gathered and analyzed to reveal indicators of compromise and their tactics,
techniques, and procedures, as well as highlighting what they might be looking to access.
Such intelligence empowers IT security teams to not only deal with the present danger
but also to eradicate and defend against future threats. There is also the benefit that the
cybercriminal will be wasting time and resources trying to infiltrate further and further
into a system that will ultimately offer up no reward. When the attacker eventually realizes
they are in a fake network, they will either have to start their infiltration all over again or,
not wanting to deal with the complexity a deception network adds, will move on and look
for other, easier targets. For maximum adversary intelligence, it is useful for the attacker
to believe for as long as possible that they are in the actual production network. This
requires a deception environment that looks and behaves like the real thing and includes
a safe ‘sandboxed’ environment so that the actions can be studied without risk to their
organization. Typically, an attacker has the benefit of gathering intelligence with every
attack. With deception’s ability to engage the adversary, the playing field is leveled and
the defender can now gain critical information to proactively fight back. The use of cyber
deception has grown rapidly based on its ability to trick predators and accurately detect
their presence” [38].
By projecting decoys that appear and operate like production assets on the network
and at the endpoint, the organization obfuscates the attack surface, making it increasingly
difficult for an attacker to distinguish what is real and what is fake, inevitably causing them
to make a mistake during early reconnaissance. Deception credentials and ransomware
bait placed on endpoints will serve to direct an attacker attempting to harvest credentials
or access shared drives to a deception engagement server where attempted credential
use or access immediately raises an engagement-based alert. By injecting deception into
the network, the attack surface becomes exponentially more complex for an attacker to
penetrate. This can be used to the Blue Team’s advantage to prove network resiliency for
network reconnaissance, credential theft, man-in-the-middle, and Active Directory Attacks.
Additionally, advanced deception platforms will offer built-in attack analysis that can be
used to substantiate attacks, create documentation containing the full TTPs of the attackers
and Indicators of Compromise (IOC), and provide forensic reports to help attribute of the
attack [39].
of the supranational NATO and EU alliances. All adjustments have been made in such a
way as to achieve a balanced education in military schools that are in the European Union
or NATO members.
To make military education recognizable for the needs of anti-cyber threats, it is
necessary to take into account how education is defined in NATO’s: “(. . . ) systematic
implementation of teaching individuals that will improve their knowledge and skills and
develop competencies.” It is a developmental activity that enables individuals to make a
reasonable response to an unpredictable situation [43]. It is clear from the above definition
that in NATO, education is associated only with the individual. Military education is
a systematic implementation of designed and organized training of military personnel,
which will improve their knowledge and skills, abilities, independence, and responsibility
and develop their competencies for making the right decisions in different situations.
Figure 4, adapted from [44], presents a model of military education in the armed
forces; we can see that it consists of four domains: operational, professional, institutional
and self-development.
Military education for anti-cyber threats consists of four basic pillars (foundations):
individual training, education, team training, and experience that supports these domains.
In the institutional domain (formal schooling), education comes first and is comple-
mented by team training, experience gained and various forms of education and individual
training provided. Formal knowledge is acquired in military educational institutions,
supplemented by experience, expertise, and team and individual training. In this domain,
knowledge is gained about the key concepts of cybersecurity and the principle of their
operation, how to analyze hardware, software, network components and their relationships
to achieve system security.
The professional domain is implemented through team training, military knowledge,
and skills that are necessary for the work and professional development of each officer and
are developed and supplemented by acquired education and experience so far, as well as
individual training actions and procedures. In the professional domain, knowledge and
Symmetry 2021, 1, 0 14 of 25
skills are developed in the use of the necessary steps for the development of a cybersecurity
management system. The officers learn to distinguish the roles and responsibilities of each
individual that are related to cybersecurity.
In the operational domain, the first priority is individual training with members of
the armed forces who are trained to perform dedicated tasks (safe operation of information
systems at different levels of command), which is complemented by experience gained
in team training and education. In the operational domain of military education, skills
and abilities to respond to any threat promptly are developed, using best practices that
facilitate the implementation of recovery from a possible threat.
The self-developmental domain as the highest level of education. In this domain,
active military personnel independently establish control over the learning process, as well
as responsibility for learning outcomes. In the self-developmental domain, the most im-
portant is the will (intrinsic motivation) for learning and learning experience. Everything
is based on acquired experience, team training, expertise, education, and ultimately, indi-
vidual training. In this domain, employees independently study various security models
(some of them are presented in [45]) that provide solutions for networking and addressing
security challenges. They compare the quality of different security models that can be used
with minimal modifications.
Likewise, education for civilian structures can also be identified with four domains
and four basic pillars as mentioned above. There is no difference in the education for
military experts and civilian experts because the threat is identical. The only thing is
that education for anti-cyber threats in civilian life is not unified in one institution, rather,
knowledge is acquired in different institutions.
When developing military education for the needs of cybersecurity, the basic concept
of military education, which is guided by the following criteria, must not be neglected:
a. There must be a sequence of training that enables the individual to perform a higher
level of responsibility and ensures the acquisition of an optimal level of knowledge
for a specific higher duty.
b. There must be cooperation with the university community to synergistically use the
knowledge developed by the latest research and implementation practice.
c. There must be a guarantee of the quality achieved through the evaluation of educa-
tional programs and institutions, internal evaluation, and external audits.
d. Diploma mobility and transferability of ECTS (European Credit Transfer and Ac-
cumulation System) credits earned in different educational institutions, even in
different countries, must be ensured. Prerequisites for mobility include the develop-
ment of procedures for the recognition of higher education qualifications following
the requirements of the Bologna Process.
Every school, including the military, is constantly looking for successful and easily
measurable ways of training (methods and procedures). Military schools must be efficient
and satisfy the needs of all participants, including the principal, students, teachers, and
other participants in military education. The authors of[46] point out “(. . . ) that the purpose
of any organization, public or private, is to produce a quality product or to perform a
quality service.” Military education is under the care of the state and officers and non-
commissioned officers are educated at the expense of the budget. “One of the major
challenges is to link civilian and military training—joint training of civilian and military
personnel based on a comprehensive approach” [47].
In military education for cybersecurity, two basic types can be identified: general
education and special education. General military education encompasses all the necessary
knowledge and skills necessary for all military personnel dealing with cybersecurity,
knowledge related to mass media and information technology, and text analysis and
processing skills [48]. Specialist education is the narrow education needed only by military
personnel working on special sophisticated systems or in specific conditions. Participants
in all forms of military education should acquire military knowledge, skills, independence,
and responsibility—in one word, competence—that will help them in their work and
Symmetry 2021, 1, 0 15 of 25
further professional development. Fountain [49] states that they are as follows: cooperation
and joint action to achieve a common goal, collaborative way of working, ability to analyze
phenomena and their consequences, recognizing prejudices, stereotypes and egocentric
attitudes, critical reflection on available information, ability to understand other people’s
attitudes, ways life and beliefs, taking responsibility for one’s actions, etc.
The current system of education in military schools provides officers and non-commissioned
officers (NCOs) with the necessary level of knowledge, abilities, skills, and responsibilities
depending on the level of training. Based on the acquired knowledge, officers perform
their tasks in various duties in the armed forces. Military education for cybersecurity is
greatly affected by the reduction of the armed forces, as well as the introduction of modern
systems that are increasingly complex, all of which require greater competence of officers
who must make quality decisions in a shorter time.
5. Case Study
“Security investments are typically made in preventing an attack and ex-filtration.
This leaves a giant blind spot for organizations as attackers that bypass the perimeter
can then move laterally and steal credentials as they quietly establish a foothold, gain
privileges, and recon the network in search of their targets. Deception closes the in-network
detection gap by placing attractive endpoint lures, data deceptions, and traps throughout
the network. Organizations will immediately gain the visibility needed to derail these
attacks and remediate compromised devices” [50].
In this section, we describe cyber deception approach to cyber threats in more detail.
Once attackers compromise a host inside the network and establish a foothold, they
must ensure that they can always return to continue their attacks. They install back doors
and remote access tools to establish persistence mechanisms, using covert communications
channels to remain hidden. They must then break out from this initially compromised
system to move around. In the next stage of the attack, they conduct discovery activities to
identify subsequent targets. They search the local system for data and credentials they can
steal to progress their attacks. They also query Active Directory (AD) from a domain-joined
system and extract sensitive information, such as domain administrator accounts, domain
controller addresses, service principal names, or Kerberos tickets. They can use this data to
find targets, compromise systems, and elevate privileges. Many recent attacks involved
Symmetry 2021, 1, 0 16 of 25
attackers compromising Active Directory for lateral movement. Once they identify their
next targets, they fingerprint the systems for any open ports or services to exploit or use
the data they gathered from AD to compromise them. They then move laterally to the
target and install their persistence mechanisms. Next, they look for sensitive or critical
data to either use to further their attacks or exploit for gain. They repeat this cycle of
discovery, credential theft, privilege escalation, lateral movement, and data collection until
they complete their mission. These steps can occur in any order and often do.
a deception environment. Plus, exposed credential mapping provides for visibility into
lateral attack paths.
• Credentials. Comprehensive endpoint deceptions cover a wide variety of application
and memory credential lures, browser credentials, history, and items such as identity
and access management (IAM) access accounts, access keys and tokens, S3 buckets,
serverless functions, and Domain Name Service (DNS) entries for cloud environments.
Customization of these credentials as well as timestamping keeps them attractive.
For authenticity, credentials should be able to validate within AD. Additional AD
deceptions can hide high-value objects such as administrator or service accounts
and present decoy credentials in their place without altering the production AD
environment.
• Deployment. Agentless deployment models are generally preferred, as they require less
overhead to operate and maintain. Integration with existing endpoint management
systems can also provide deployment and management flexibility.
• Deflection. Endpoint scan deflection and obfuscation of Active Directory information
deflects attacker activities to decoys for engagement and reduces the risk of lateral
movement Attack Path Visibility. Exposed, orphaned, or misused credentials stored
at the endpoints for attack surface risk reduction ar identified. This also identifies
misconfigurations that attackers can leverage to move between systems.
value, while the defenders gather information on the attacker’s tools, techniques, and meth-
ods. Deception puts the burden on the attacker to discern real from fake. Network decoys,
endpoint breadcrumbs, deceptive applications, and decoy data disrupt the attacker’s ad-
vantage of stealth by detecting them early in the attack cycle. When attackers attempt to
use deceptive credentials or engage with a network decoy, they spend precious time and
resources interacting with an asset that does not advance their attack. Conversely, the de-
fender gains valuable threat and adversary intelligence. With deception, the attacker cannot
gain an accurate picture of the network. Network decoys appear as regular systems and
respond to discovery scans, causing uncertainty and polluting the attacker’s information
with inaccurate data. Endpoints deflect port and service scans to decoys for engagement,
making it appear to attackers that they are engaging with a production system instead of a
decoy. This misinformation alters attackers’ understanding of the network, slows them
down, and causes them to make mistakes. Introducing deception adds uncertainty to the
environment that attackers must now factor into their activities. Attackers that suspect or
are aware of deception in the environment must now question their discovery scans and
whether the system they are targeting is a valid production asset or a decoy that alerts on
malicious activities. The attackers can no longer trust their tools or target a system with
confidence, increasing their costs as they slow their activities in an attempt to validate
information, avoid the decoy systems, and identify real targets. The known deployment of
deception can be a strong deterrent. As attack processes become more complex, there is a
higher likelihood that attackers must repeatedly restart their attacks, and the economics are
no longer favorable. Collectively, these challenges motivate attackers to seek easier targets.
the attacker drops an unknown binary onto a decoy that contacts a previously unknown C2
server through an encrypted channel to download a malicious payload. This set of actions
provides the security team with information that can be used during and after the incident
response process. The security team can add the C2 Internet IP address to the firewall and
external DNS blocks to increase defenses. This prevents malware from communicating
out and discovers other potential C2 servers’ IP addresses through malware connection
attempts. Additionally, through native integrations and APIs, response actions can be
automated. This often starts by augmenting detection with known threat intelligence,
which can include malware identification and domain reputation information. Examples
of solutions that integrate with deception platforms include McAfee DXL, ThreatConnect,
ReversingLabs, VirusTotal, and Webroot. In addition to expediting attack analysis and
correlation, integrations are available for automated incident response actions such as
blocking, isolation, and threat hunting. Advanced deception solutions will offer native
integrations with most major firewalls, NAC, SIEM, endpoint, and orchestration offerings.
Some go as far as automating with ticketing systems to expedite remediation. In particular,
the deflection function and Active Directory obfuscation combined with an EDR solution
essentially locks down the endpoint, preventing the attacker from moving laterally while
remaining undetected. Companies such as Attivo Networks have expanded beyond simple
automation and also offer extensive native integrations and incident response playbooks.
These accelerate response, either automatically based on policy or with user intervention.
For example, data can be sent to a range of tools to automate forensics, reporting, incident
response, isolation at the endpoint, or blocking on the network, and it can handle it in any
combination. Incident response analysts can identify other potential victims by searching
the SIEM for systems that had communicated with the C2 IP address or by matching
the SHA1 hash of the malicious payload to find infected endpoints. Responders can
then expand the scope of their remediation efforts to include these systems. The security
team can subsequently check if they have found and remediated all potential victims.
The information captured by the deception platform is added intelligence for defenders to
use and share as needed to elevate the security posture across multiple organizations.
for a bank, or a deceptive gift card web portal with a fake database backend server. If the
security team operates a device network, such as IoT cameras or multifunction printers,
they can deploy deception assets that match those as well. Security teams can also create
decoy documents that beacon home when ex-filtrated, providing information on what
attackers are targeting and where the data are accessed.
6. Conclusions
The future of warfare will be in a digitalized multi-domain environment, which
needs new doctrines [57,58] for the conduct of operations. To ensure the readiness of the
capacities needed for this new environment, research in all relevant domain-specific cyber
capabilities is needed. Each military domain has its own cyber requirements as different
sensors are used and different procedures and different tactics for automated responses
are needed. The cyber research requirements for the military cyber domain are often
underestimated, as the research requirements are twofold. First, the military cyber domain
needs to develop its protection and attack capabilities, which are often not available on the
market. Second, the military cyber domain needs to develop protection techniques, sensors,
and procedures to protect the military cyberinfrastructure of all other military domains.
Moreover, the military cyber domain needs to be prepared for attacks on the national
cyberinfrastructure, including infrastructure for civilian use, in case, commercial cyber
protection measures are not working. This range of military cyber responsibilities is often
underestimated. However, the main result of the cyber threat assessment showed clearly
that the existing cyber defense strategies need improvement to counteract the existing
cyber threats [26].
In comparison with the newest related work in the area related to security operations
technologies and services innovations aiming to help security and risk management leaders
enhance their strategy [33,59], our paper’s originality lays in the investigation of the
cyberattack cycle and deception technology model for threat detection using deception-
based methods, within the Hybrid Threats Model.
“As many organizations look to test their network resiliency, penetration tests are
playing an increasingly integral role in understanding a network’s vulnerabilities through
the simulation of a real attack. Deception provides early and efficient warning of attacks,
whether they be from malicious internal or external threat actors or a Red Team penetration
Symmetry 2021, 1, 0 22 of 25
tester. The outcome of these tests illustrates how deception can be used to validate network
resiliency, demonstrates the power of in-network deception-based threat detection, and ex-
hibits how attack information gathered can be used to accelerate incident response and
strengthen network defenses. These tests are also an impactful way to show the instant
value of deception and how easy it is to deploy and operationalize” [39].
Organizations need to consider and prepare for the impact of potentially disruptive
events such as natural disasters, cyber-attacks, pandemics, global warming, and political
unrest. Business resiliency is an organization’s ability to withstand failure so it can deal
with potential threats and survive and thrive. Being business-resilient means having
the ability to scale quickly and adjust operations to meet new market changes. In the
immediate term, organizations need to understand how to ensure the business continues.
When turmoil occurs, organizations need to know the following:
• Which systems can be powered down and which systems are critical to maintaining?
• What can be scaled back or done without?
• Which parts of the business are going to be strained or at risk of failing? To strengthen
business resilience, an organization needs to focus on critical applications and acceler-
ate cloud migration to support the digitization of the business [1].
In this paper, we made an introduction to deception technology and an overview
of detection to creating an active defense. We showed how deception fits within overall
security architecture and designed the conceptual Hybrid Threats Model and military
education for cybersecurity indispensable to achieve as well as the role it plays in detecting,
identifying, and responding to threats. Besides the basics of the cyberattacks cycle and
deception technology, we emphasize that deception should be used strategically to stop
advanced attackers.
In future research, NCDL researchers, suppliers, and customers will be brought
together to address problems, explore opportunities and advance capabilities in a space not
previously explored, to support collective understanding in the space of cyber deception to
aid the development of capabilities and strategies as well as in the provision of advice and
guidance on cyber deception in proactive defense more broadly [12].
Author Contributions: Conceptualization, W.S. and D.G.; methodology, D.G.; software, W.S.; valida-
tion, W.S., A.K., and D.G.; formal analysis, D.G.; investigation, W.S.; resources, A.K.; data curation,
D.G.; writing—original draft preparation, W.S.; writing—review and editing, W.S.; visualization,
A.K.; supervision, A.K.; project administration, W.S.; funding acquisition, W.S. All authors have read
and agreed to the published version of the manuscript.
Funding: This work was supported by the Project KEGA 011TUKE4/2020: ‘A development of the
new semantic technologies in educating of young IT experts.’
Institutional Review Board Statement: please add.
Informed Consent Statement: please add.
Data Availability Statement: please add.
Conflicts of Interest: The authors declare no conflict of interest. The funder had no role in the design
of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript,
or in the decision to publish the results.
Symmetry 2021, 1, 0 23 of 25
Abbreviations
The following abbreviations are used in this manuscript:
References
1. MEGA International. Business Resilience, How Strategic Planning and Enterprise Architecture Help Companies Successfully Rebound
from a Crisis; White paper; MEGA International: Raynham MA, USA, 2021.
2. How COVID-19 Has Pushed Companies over the Technology Tipping Point—And Transformed Business Forever. 2020. Available
online: https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/how-COVID-19-has-
pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever (accessed on 22 March 2021).
3. Contu, R.; Driver, M.; Kim, E.; Wheeler, J.A.; Smith, N.; Pingree, L.; Rakheja, S. Emerging Technologies and Trends Impact Radar:
Security. G00724138. 2020. Available online: https://www.gartner.com/en/documents/3991219/emerging-technologies-and-
trends-impact-radar-security (accessed on 22 March 2021).
4. Pingree, L.; Smith, N.; Kim, E.; Wheeler, J.A.; Contu, R.; Ahlm, E.; Driver, M. Emerging Technologies and Trends Impact Radar:
Security. G00450798. 2019. Available online: https://www.gartner.com/en/documents/3975191/emerging-technologies-and-
trends-impact-radar-security (accessed on 22 March 2021).
5. What Is XDR? Available online: https://www.paloaltonetworks.com/cyberpedia/what-is-xdr (accessed on 22 March 2021).
6. Crandall, C.; Salazar, J. Deception Based Threat Deception: Shifting Power to the Defenders; Attivo Networks, Inc.: Fremont, CA,
USA, 2019.
7. NATO Communications and Information Agency (NCIA) and AFCEA TechNet. In Proceedings of the International: NITEC
’16 - The NCI Agency Industry Conference and AFCEA TechNet International, Tallinn, Estonia, 7–9 June 2020. Available online:
https://docplayer.net/55237431-Ncia-business-opportunities-cyber-security.html (accessed on 24 August 2020).
8. Kambow, N.; Passi, L.K. Honeypots: The Need of Network Security. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 2014, 5, 6098–6101.
9. Scottberg, B.; Yurcik, W.; Doss, D. Internet honeypots: Protection or entrapment? In Proceedings of the IEEE 2002 Interna-
tional Symposium on Technology and Society (ISTAS’02). Social Implications of Information and Communication Technology,
Raleigh, NC, USA, 6–8 June 2002; pp. 387–391.
10. Almeshekah, M.H.; Spafford, E.H. Planning and Integrating Deception into Computer Security Defenses. In Proceedings of the
2014 New Security Paradigms Workshop, Victoria, BC, Canada, 15–18 September 2014; NSPW ’14; Association for Computing
Machinery: New York, NY, USA, 2014; pp. 127–138, doi:10.1145/2683467.2683482.
11. Virvilis, N.; Vanautgaerden, B.; Serrano, O.S. Changing the game: The art of deceiving sophisticated attackers. In Proceedings of
the 2014 6th International Conference On Cyber Conflict (CyCon 2014), Tallinn, Estonia, 3–6 June 2014; pp. 87–97.
Symmetry 2021, 1, 0 24 of 25
12. Cranfield University. The National Cyber Deception Symposium, hosted by the UK MoD’s Defence Academy and Defence Cyber
School, Nov 6th, 2019, Shrivenham, Swindon, UK. Available online: https://www.cranfield.ac.uk/events/symposia/cyber-d
(accessed on 24 August 2020).
13. Crandall, C. The Evolution Of Cybersecurity. 2019. Available online: https://www.healthcareinfosecurity.com/whitepapers/
deception-based-threat-detection-shifting-power-to-defenders-w-5780?highlight=true (accessed on 22 March 2021).
14. European External Action Service (EEAS): Food-for-thought Paper “Countering Hybrid Threats”. 2015. Available online:
http://www.statewatch.org/news/2015/may/eeas-csdp-hybrid-threats-8887-15.pdf (accessed on 25 February 2021).
15. Cen ková, R. The content and the form in public relations. Managerial Trends in the Development of Enterprises in Globalization
Era. In Proceedings of the 7th International Scientific Conference on Managerial Trends in the Development of Enterprises in
Globalization Era (ICoM), Nitra, Slovakia, 1–2 June 2017; Košičiarová, I., Kádeková, Z., Eds.; Slovak University of Agriculture:
Nitra, Slovakia, 2017; pp. 544–551.
16. The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE): EU Policy on Fighting Hybrid Threats. Available online:
https://ccdcoe.org/incyder-articles/eu-policy-on-fighting-hybrid-threats (accessed on 25 February 2021).
17. The Cyber Security Hub™: Information Technology and Services, London, UK, 2021.
18. Siedlecka-Lamch, O.; Szymoniak, S.; Kurkowski, M.; Fray, I.E. Towards Most Efficient Method for Untimed Security Protocols
Verification. In Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future –
PACIS 2020, Dubai, UAE, 22–24 June 2020.
19. Szymoniak, S. How to be on time with security protocol? In Societal Challenges in the Smart Society; ETHICOMP Book Series;
Universidad de La Rioja: La Rioja, Spain, 2020, pp. 225–237.
20. Booz, A. 8 Cyber Threat Trends to Watch Out for in 2021. McLean, VA, USA, 2021. Available online: https://www.boozallen.com
(accessed on 25 February 2021).
21. Yang, S.; Wu, C.; Zhang, Y.; Wang, W.; Xie, W. Attack-Defense Utility Quantification Furthermore, Security Risk Assess-
ment. In Proceedings of the 2019 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing,
Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (Smart-
World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Leicester, UK, 19–23 August 2019; pp. 1456–1461, doi:10.1109/SmartWorld-
UIC-ATC-SCALCOM-IOP-SCI.2019.00263.
22. Roepke, W.; Thankey, H. Resilience: The First Line of Defence. 2019. Available online: https://www.nato.int/docu/review/2019
/Also-in-2019/resilience-the-first-line-of-defence/EN/index.htm (accessed on 28 February 2021).
23. Kossecki, P.; Wachowicz, J. Economic Crisis, Trust and Socio-Economic Aspects of Sustainable Development. Probl. Ekorozwoju
Probl. Sustain. Dev. 2013, 8, 65–71. Available online: https://ssrn.com/abstract=2236094.
24. Tokarčíková, E.; Malichová, E.; Kucharčíková, A.; Ďurišová, M. Importance of Technical and Business Skills for Future IT
Professionals. Amfiteatru Econ. 2020, 22, 567, doi:10.24818/EA/2020/54/567.
25. Tokarčíková, E.; Ďurišová, M.; Bartošová, V. Corporate social responsibility of public administration employees. In Pro-
ceedings of the 25th International Business Information Management Association Conference—Innovation Vision 2020: From
Regional Development Sustainability to Global Economic Growth, IBIMA 2015, Amsterdam, The Netherlands, 7–8 May 2015;
pp. 1437–1445.
26. European Defence Agency (EDA). Strategic Research Agenda On Cyberdefence; EDA: Brussels, Belgium, 2020.
27. Schulze, M. Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations. In Proceedings
of the 12th International Conference on Cyber Conflict 20/20 Vision: The Next Decade, Tallinn, Estonia, 26–29 May 2020;
pp. 183–197, doi:10.23919/CyCon49761.2020.9131733.
28. Attivo Networks. Threatdefend Platform Solution Overview; Attivo Networks: Fremont, CA, USA, 2020.
29. Galinec, D.; Steingartner, W.; Zebić, V. Cyber Rapid Response Team: An Option within Hybrid Threats. In Proceedings of
the 2019 IEEE 15th International Scientific Conference on Informatics, Poprad, Slovakia, 20–22 November 2019; pp. 43–50,
doi:10.1109/Informatics47936.2019.9119292.
30. Tang, M.; Alazab, M.; Luo, Y. Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies. IEEE Trans. Big Data
2019, 5, 317–329.
31. Galinec, D.; Luić, L. Digital Security Perspectives and Engagement for Resilience in Information-Communication Environment.
In Proceedings of the 2019 3rd European Conference on Electrical Engineering and Computer Science (EECS), Athens, Greece,
28–30 December 2019; pp. 106–112, doi:10.1109/EECS49779.2019.00032.
32. Galinec, D. Resilience Is Key. Per Concordiam 2018, 9, 14–21.
33. Counter Craft: Am I Ready for Cyber Deception? Gartner Hype Cycle for Security Operations. Available online: https:
//www.countercraftsec.com/blog/post/am-i-ready-for-deception-technology (accessed on 24 August 2020).
34. Attivo Networks. Attivo Networks Named as a Sample Vendor in Gartner Hype Cycle for Security Operations 2020; Attivo Networks,
Inc.: Fremont, CA, USA, 2020.
35. Chekinov, S.; Bogdanov, S. The Nature and Content of a New-Generation War. Mil. Thought 2013, 22.
36. Case Study: A View of Deception Technology in Security Testing. 2020. Available online: https://www.bankinfosecurity.com/
whitepapers/case-study-view-deception-technology-in-security-testing-w-5785 (accessed on 22 March 2021).
37. Permana, A. Indonesia’s Cyber Defense Strategy in mitigating the Risk of Cyber Warfare Threats. Syntax Idea 2021, 3, 1–11,
doi:10.36418/syntax-idea.v3i1.860.
Symmetry 2021, 1, 0 25 of 25
38. Crandall, C. How Security Teams are Turning to Decoy Networks. 2019. Available online: https://attivonetworks.com/how-
security-teams-are-turning-to-decoy-networks (accessed on 22 March 2021).
39. Attivo Networks. The Role of Deception Technology in Security Penetration Testing; Attivo Networks, Inc.: Fremont, CA, USA, 2018.
40. Kozina, A. Hrvatsko vojno učilište—Ustroj i uloga. Anali za Povijest Odgoja 2013, 12, 129–141.
41. Purković, D.; Bezjak, J. Kontekstualni pristup učenju i poučavanju u nastavi temeljnog tehničkog odgoja i obrazovanja. Školski
Vjesnik 2015, 64, 131–152.
42. Committee on Armed Services Subcommittee on Oversight & Investigations. Another Crossroads? Professional Military Education
Two Decades After The Goldwaternichols Act and The Skelton Panel, U. S.; House of Representatives: Washington, DC, USA, 2010.
43. North Atlantic Military Committee. Military Decision On Mc 0458/3 NATO Education, Training, Exercises Furthermore, Evaluation
(ETEE) Policy; North Atlantic Military Committee: Brussels, Belgium, 2014.
44. Headquarters Department of the Army. Army Leader Development Program, Department of the Army Pamphlet 350-5; Headquarters
Department of the Army: Washington, DC, USA, 2013.
45. Pevnev, V.; Tsuranov, M.; Zemlianko, H.; Amelina, O. Conceptual Model of Information Security. In Integrated Computer
Technologies in Mechanical Engineering – 2020. ICTM 2020. Lecture Notes in Networks and Systems; Springer, Cham, Switzerland,
2021; Volume 188, pp. 158–168, doi:10.1007/978-3-030-66717-7_14.
46. Glasser, W. Kvalitetna Škola: Škola bez Prisile; Educa: Zagreb, Croatia, 1994.
47. Kozina, A. Interkulturalne kompetencije vojnih nastavnika. Andragoški Glas. 2013, 17, 37–48.
48. Kapitzke, C. Cyber Pedagogy as Critical Social Practice in a Teacher Education Program. Teach. Educ. 2000, 11, 211–229,
doi:10.1080/713698968.
49. Fountain, S. Education for Development—A Teacher’s Resource for Global Learning; Hodder & Stoughton: London, UK, 1999.
50. Waitt, T. No Nonsense Cyber Threat Detection Made Simple with Deception. 2019. Available online: https://
americansecuritytoday.com/no-nonsense-cyber-threat-detection-made-simple-with-deception (accessed on 22 March 2021).
51. Lance, W. Debunking the Myths of Deception Technology. 2020. Available online: https://www.networkcomputing.com/
network-security/debunking-myths-deception-technology (accessed on 22 March 2021).
52. Kvet, M.; Kršák, E.; Matiaško, K. Locating and accessing large datasets using Flower Index Approach. Concurr. Comput. Pract.
Exp. 2019, 32, e5209, doi:10.1002/cpe.5209.
53. Mandiant. Red Team Operations (RTO): Test Your Ability to Protect Your Most Critical Assets from a Real-World Targeted Attack.
2019. Available online: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/pf/ms/ds-red-team-operations.
pdf (accessed on 28 March 2021).
54. Johansson, F.; Falkman, G. A testbed based on survivability for comparing threat evaluation algorithms. In Intelligent Sensing,
Situation Management, Impact Assessment, and Cyber-Sensing; Mott, S., Buford, J., Jakobson, G., Eds.; International Society for Optics
and Photonics, SPIE: Bellingham WA, USA, 2009; Volume 7352, pp. 119–129, doi:10.1117/12.816819.
55. Galinec, D.; Macanga, D. Observe, Orient, Decide and Act Cycle and Pattern-Based Strategy: Characteristics and Complementa-
tion. In Proceedings of the Central European Conference on Information and Intelligent Systems – CECIIS, 23rd International
Conference, Varaždin, Croatia, 7–9 October 2012; Faculty of Organization and Informatics: Varaždni, Croatia, 2012; pp. 371–378.
56. Galinec, D.; Steingartner, W. A Look at Observe, Orient, Decide and Act Feedback Loop, Pattern-Based Strategy and Network
Enabled Capability for Organizations Adapting to Change. Acta Electrotech. Et Inform. 2013, 13, 39–49.
57. Colarik, A.; Janczewski, L. Establishing Cyber Warfare Doctrine. In Current and Emerging Trends in Cyber Operations; Palgrave
Macmillan: London, UK, 2015; pp. 37–50.
58. Ormrod, D.; Turnbull, B. The cyber conceptual framework for developing military doctrine. Def. Stud. 2016, 16, 270–298.
59. Shoard, P. Hype Cycle for Security Operations; ID: G00467096; Gartner, Inc.: Stamford, KT, USA, 2020. Available online: https:
//www.gartner.com/en/documents/3986721/hype-cycle-for-security-operations-2020 (accessed on).