Active Deception for Inside-the-network Threat Detection
Cyber-attacks are increasing in sophistication and are penetrating networks with ever-greater frequency.
A modern adaptive defense is no longer solely based solely on stopping attacks, but instead now focuses on detecting and neutralizing attacks in real-time. This paper will cover how BOTs and Advanced Persistent Threats (APT’s) work and how to using active deception to detect them once they have bypassed perimeter security systems.
Functional requirements for choosing deception-base threat detection systems and threat intelligence reporting are also explore in this brief.