Deception techniques in active cyber defense
Deception techniques have been widely seen as a game-changer in cyber defense. In this talk, we discuss the representative techniques, and how they may be leveraged to build a holistic deception-based defense. By utilising a tailored cyber kill chain model which can reflect the current threat landscape and our proposed deception stack, a taxonomy is developed that answers which phases of a cyber-attack campaign the techniques can disrupt and which layers of the deception stack they belong to. Cyber defenders may use the taxonomy as a reference to design an organised and comprehensive deception plan or to prioritise deception efforts for a budget conscious solution.