The National Cybersecurity Center of Great Britain (NCSC) is urging organizations across the country to implement Kibrobman technology on a large scale to assess its effectiveness as part of the National Cyber Protection Strategy. The NCSC believes that cyberdeception technology can significantly enhance cyber protection in certain situations. The agency aims to establish an evidence base that demonstrates the effectiveness of such technologies and promote their use nationwide under the Active Cyber Defense 2.0 program.
There are two main applications of cyberdeception technologies: low-level solutions like digital traps and HoneyTokens, which can detect unauthorized access to systems effectively when used universally, and solutions with varying levels of interaction such as Honeypots, which gather intelligence on cyber threats both online and at individual instance levels. These solutions are designed for organizations with robust security systems and MSP suppliers in the cybersecurity field.
Key tools in this context include tripwires, which interact with attackers to detect their presence on the network; Honeypots, created to lure hackers for observation and intelligence gathering; and breadcrumbs, digital artifacts scattered through systems to attract attackers to interaction points with traps.
The prospects of using synthetic methods to thwart enemy actions were also discussed, although such approaches currently fall outside the NCSC’s cyber protection objectives. Plans are underway to deploy thousands of cyberdeception solutions via cybeRCOMAN in the British internet and cloud environments in the near future, including solutions with various levels of interaction, assets for threat detection, and tokens for threat detection.
The primary goal of the research is to address key questions regarding the effectiveness of cybeRCOMAN technologies in detecting hidden and emerging threats and the impact of such technologies on attackers’ behavior. Furthermore, the Active Cyber Defense 2.0 initiative aims to transition the management of new-generation tools to governmental or private organizations to establish a more robust and secure cyber protection system.