=Paper=
{{Paper
|id=Vol-2040/paper13
|storemode=property
|title=None
|pdfUrl=https://ceur-ws.org/Vol-2040/paper13.pdf
|volume=Vol-2040
}}
==None==
IST-153 Workshop on Cyber Resilience Title: Cyber Resilience through Deception and Decoy Primary Author: Don Woodard Address: Attivo Networks 47697 Westinghouse Drive Fremont, CA 94539 Phone: (703)217-3550 eMail: dwoodard@attivonetworks.com Attivo Networks introduces a new paradigm in security that complements and augments your existing security infrastructure. The technology deceives, detects, engages, and analyses malware that has bypassed traditional perimeter security and is already inside the network. Attivo’s ThreatDefend suite of products help achieve network security by luring, engaging and trapping threats and malware from infected clients and servers in the user network, data center, cloud, SCADA/ICS network, and in the Internet of Things. The ThreatDefend platform provides a new network security technology with real-time advanced malware detection that targets Advance Persistent Threats (APTs) and BOTs enabling cyber experts to eliminate threats that would previously go undetected. The solution addresses a full array of attacks, including reconnaissance, stolen credentials, ransomware, phishing, man- in-the-middle as well as insider threats. The ThreatDefend product suite consists of the BOTsink appliance and its embedded software, which includes ThreatStrike, ThreatPath and ThreatOps. Physical and virtual BOTsink appliances are available for on premise and cloud based deployments. Multiple BOTsinks are managed by the Attivo Central Manager (ACM) appliance in a single GUI. Attivo BOTsink systems are malware detection security tools that complement existing security systems. The ThreatDefend solution securely captures BOTs as they begin scanning the network, client, servers, and services and then tracks all their activity securely. It provides zero false-positive alerts and captures and records all of the malicious communication and propagation activity for future forensic analysis using Attivo’s patented Multi-Dimensional Correlation Engine (MDCE). The Challenge: Today’s cyber-attacks come in a variety of threat vectors, which can include attacks that start with reconnaissance, stolen credentials, phishing or ransomware attacks. Attackers are generally either scanning a network to find hosts with services or applications to compromise or seeking to exfiltrate employee credentials or data. Either way, attackers and their automation tools rely on the responses they receive throughout the attack process. The traditional incident response up to this point has been manual in nature, based on the known threats, but does not address the unknown types of attacks. Resilient technologies are the only platforms that address the ever-changing adversarial threat, remain flexible, easily integrate into other technologies, and recover quickly from adversary engagement. Today’s cyber technologies must dynamically change as the threat in the network builds knowledge of the network assets so the adversary cannot complete their mission. Response: The Attivo deception and response platform is designed to make the entire network a trap, forcing the attacker to be right 100% of the time or risk being discovered. The solution combines distributed, high-interaction deception lures and decoys designed to provide early visibility into in-network threats, efficient continuous threat management, and accelerated incident response. The solution is based on six pillars, which include visibility, real-time detection, malware and phishing analysis, forensic reporting, incident handling, and response. Recognized as the industry’s most comprehensive deception platform, the Attivo solution provides network and endpoint deceptions and is highly effective in detecting threats from all vectors. These attacks may include advanced persistent threats, stolen credential, Man-in-the- Middle, ransomware, and phishing. Attivo’s deception platform allows you to locate threats that are lurking within all types of networks including server, data center, user networks, ROBO, cloud, and specialty environments such as IoT, SCADA, and POS. The Attivo Deception Platform is comprised of Attivo BOTsink engagement servers, decoys, and deceptions, the ThreatStrike end-point deception suite, ThreatPath for attack path visibility, ThreatOps threat orchestration playbooks, and the Attivo Central Manager (ACM), which together create a comprehensive early detection and continuous threat management defense against cyber threats. Deception technology is a unique and modern approach that solves the problems organizations are facing in the current cyber climate. These platforms offer the capability to exercise deception-based detection throughout every layer of the network stack, enabling efficient detection for every threat vector. Utilizing high-interaction decoys and lures, deception solutions effectively trick attackers into revealing themselves, thereby closing the “detection deficit”. The Attivo platform uses dynamic deception to camouflage itself by changing in an autonomous way which does not allow the attacker to build lists of targets to either avoid or ignore. Attivo dynamic deception also performs transformations on the endpoint using a light weight technology that is not intrusive and does not interrupt daily actions performed by the users of the enterprise. The dynamic deception capability monitors networks for indicators of compromise and automatically deploys more decoys and deception in those segments of the network. Adopting new methods of visibility into potential threat pathways will help agencies proactively deter threats by identifying areas of weaknesses that an attacker can use to maneuver within the network. Attivo Networks embraces this change by enabling the endpoint technology to perform predictive vulnerability analysis of user credentials, SMB shares, and other misconfigured components of the endpoints. Attivo Networks provides early visibility into threats and the evidence based alerts that are required to expedite incident handling. Real-time detection bundled with attack forensic analysis play a critical role changing the playing field against attackers. The hunters now become the hunted, putting the power of control back into an organization’s hands. The industry has been challenged over the years because the adversarial threat has outpaced individual vendor technologies and is forcing the need for cyber technologies to work together and integrate with a common goal to outpace this threat. Removing the “silo’s” and building solutions that work together will accomplish this goal. The lateral movement of sophisticated malware in the core of the network is a very difficult problem to address since the weapon may become polymorphic by changing and adapting to its surroundings. The adversary also builds lists or thumbprints of systems they have already visited or scanned during early reconnaissance activity. These issues cause us to rethink cyber solutions, where the threats exist, and how they act. Today’s technologies need the capacity to adapt on the fly when the adversary engages the system. The solutions must identify indicators in the network of an adversary performing early reconnaissance and dynamically push resources to that area of the network to engage the attacker. The defensive and offensive strategies need to change to overcome this challenge and remove the human decision factor within the response to these challenges. Attivo Networks’ capabilities are a necessity for your cyber solutions to be effective in addressing today’s threats. Dynamic deception solves this issue in several ways: (1) By remaining agile in design (2) By deploying exact copies of production systems (3) Being resilient upon engagement (4) Automatic deployment of decoys into suspect areas of the network (5) Reporting of forensic data to combat threats (6) Integration of disparate cyber technologies to resolve issues effectively and quickly Attivo Networks gives the flexibility to the security team to import Gold Disk or STIG images of production systems into the BOTsink to use as decoys to project into the networks being monitored. These systems remain resilient throughout their job of engaging with the threat by changing components of the systems like IP addresses and MAC address to further strengthen the defensive side of dynamic deception. The BOTsink listens to broadcast traffic on the network segments being monitored for early reconnaissance activity and will push decoys out to the network where this activity is taking place. The Attivo Networks deception and decoy product solution will engage the adversary and deliver the forensic data of the Tactics, Techniques and Procedures (TTP’s) the attacker is using. These findings are not only important for the integration into other technologies but are also imperative to the incident responder to successfully protect their network. The Attivo platform works in conjunction with the other security platforms and automatically responds immediately to the threat, removing the delay caused by the need for additional human intervention. The current need for cyber specialists to detect and react to threats based on predefined policies only slows the response time and allows the adversary more time to succeed in their mission. This integration of cyber solutions is imperative, enabling the industry to be more adaptive and agile to the ever-changing threat landscape. The effectiveness of this technology has resulted in organizations across all major industries adopting deception detection technologies for early visibility into threats, improved incident response, and mitigation of risks associated with data and employee credential exfiltration. Without a fundamental change in our defensive strategies the adversaries will continue to win. By providing a dynamic deception platform to lure attackers, we can more efficiently gain insight into threats and employ the appropriate technology to defend our critical assets. By enabling the ability to change our detection capabilities, industry and government will be able to identify threats faster and enable the SOC team to better utilize their time to respond and remediate the threat. Attivo Networks is in a unique position to offer these capabilities that have traditionally been very difficult to maintain. Previously, SOC team members have needed to sift through large amounts of data to discover an issue, the goal of this approach is to realign the human resources, help them get ahead of the threat, and respond with precision. Summary: Malware is becoming more and more sophisticated by adapting on the fly, and by living in the core of the network, where it is most vulnerable. The Attivo Networks solution and technological approach to cyber threat defense provides visibility into the actions that take place in the core of the network. The solution allows the SOC to run more efficiently through dynamic deception and decoy technologies, identifying threats in their early stages much more quickly than a human team could and provides forensic data that the incident responder needs. This allows the SOC team to concentrate on true threats and work toward understanding the threat in order to remediate it accordingly. Additionally, change to the approach in defense and offense through harmonious integrations with best of breed cyber security technologies will significantly increase the pace of discovery, response and remediation. To accomplish this, vendor technologies must work in concert to respond without the need of human interaction. Automated services of perimeter and endpoint technologies can be employed for the most immediate response to threats. To combat the cyber security challenges, the industry must adapt creative ways of addressing threats. Dynamic deception and decoy is an extremely effective way to gain visibility into adversarial activity and to integrate those findings into the technologies that provide protection to the network automatically. This revolutionary technology provides network-based decoys as well as endpoint based deception which camouflages itself to the attacker and easily adjusts itself when needed. The placement of deception within the user’s environment directly engages with the adversary causing them confusion and slowing down their mission. This wasted time gives the incident responder additional time to react by realigning critical resources to more important tasks in protecting their networks. In conclusion, Attivo’s cyber deception platform provides a new layer of security for protecting critical assets from threats that have already bypassed traditional perimeter security measures.