Active Cyber Defence 2.0: Digital traps to guard the UK's systems Подробнее:

Friend

Professional
Messages
2,653
Reaction score
850
Points
113
Britain is turning the Internet into a maze for hackers.

The UK's National Cyber Security Centre (NCSC) has called on organizations across the country to implement cyber fraud technologies on a large scale in order to assess their effectiveness as part of the national cyber defense strategy.

The NCSC initiative is based on the belief that cyber fraud technologies can significantly improve the effectiveness of cyber defense in certain situations. The Agency aims to create an evidence base that will confirm the effectiveness of such technologies and allow them to scale their use at the national level within the framework of the Active Cyber Defense 2.0 program.

Two key areas of application of cyber fraud technologies:
  1. Low-level interaction solutions such as digital traps and honeytokens, which allow you to detect unauthorized access to systems and are especially effective when they are used by all organizations.
  2. Low-level and high-level interaction solutions: Honeypots, which collect intelligence about cyber threats both on the Internet and at the level of individual instances. Such solutions are intended for organizations with a developed security system, as well as for MSP vendors in the field of cybersecurity.

The key tools in this context are:
  • Tripwires are systems that interact with an attacker and reveal their presence on the network.
  • Honeypots are traps designed to allow hackers to interact with them, which allows them to monitor the actions of a cybercriminal and collect intelligence.
  • Breadcrumbs are digital artifacts distributed in the system that attract an attacker to interact with traps.

The prospects of using synthetic methods that can reduce the effectiveness of enemy actions were also discussed. However, such approaches go beyond the current challenges of NCSC cyber defense.

In the near future, it is planned to deploy thousands of cyber fraud solutions on the British Internet and in cloud environments:
  • 5,000 low-and high-connectivity solutions for IPv4 and IPv6;
  • 20,000 instances within internal networks for low-connectivity solutions;
  • 20,0000 assets in cloud environments for low-connectivity solutions;
  • 2,000,000 tokens for threat detection.

The main goal of the research is to answer several key questions. How effective are cyber fraud technologies in detecting hidden and new violations? Does knowing about the presence of such technologies affect the behavior of attackers? These and other issues are planned to be explored as part of the new initiative.

In addition, the goal of Active Cyber Defense 2.0. is to transfer the management of a new generation of tools to government agencies or private organizations, which ultimately will create a more stable and reliable system of protection against cyber threats.

Source
 
Top