Securing IoT through deception

Carolyn Crandall of Attivo Networks

The momentum of IoT adoption is showing no signs of slowing, and with it comes increasingly material risk for both businesses and households. The quest for innovation has allowed for security to fall behind, and as a result, these devices have infiltrated our lives while creating an environment where attackers can exploit these solutions for anything from ransomware to extensive denial of service attacks, says Carolyn Crandall, chief deception officer at Attivo Networks.

Statistics from Gartner show that the number of connected devices in use will hit 14.2 billion in 2019, and grow to 25 billion by 2021, which means there will be at least 25 billion potential entry points for security breaches.

The UK government took notice and recently launched a consultation on a raft of new IoT security laws and standards. Proposals include mandatory labelling telling consumers how secure a particular connected device is and making it compulsory to include several elements of the “Secure by Design” code of practice. The code offers guidelines about what is considered good practice in IoT security, including monitoring device data for security anomalies, using encryption, and ensuring software is updated. These are all steps in the right direction but should only be used as a baseline and not as a guarantee.

Businesses will need to adopt more sophisticated protection strategies than simply relying on device-based security. Security measures on any device can be worked around, meaning that the attempts to attack an organisation’s network through the IoT can be as varied and numerous as those on more conventional connected devices, such as mobiles, tablets and PCs. In fact, IoT devices can often offer even more opportunities for attackers by simply seeking out and exploiting well known vulnerabilities. They can also go after a large number of targets with the same exploit, increasing their probability of success and potential payout.

Traditional perimeter defences – firewalls, network filtering, etc – are falling short in defending enterprises from sophisticated cyber-attacks using the IoT. The vast number of entry points creates unprecedented levels of complexity in identifying and maintaining the security of these devices, and as we have seen, even the most rigorous perimeter security can eventually be compromised.

These breaches often occur through cyber criminals convincing a network they are someone or something they are not. However, enterprises can beat attackers at their own game by using deception technology as a key weapon in their own defensive arsenal.

Protection through deception

Deception is now recognised as one of the most effective methods for detecting threats across all attack surfaces, including difficult-to-secure IoT. The key is to convince cyber criminals that they are in an organisation’s IT network, when in fact they are engaging with decoys and lures designed to derail their efforts. By establishing a deception network that blends in with production connected devices, organisations can divert attackers away from their real IoT infrastructure without any disruption to availability or operations.

Using a deception solution has numerous advantages, in addition to slowing and derailing the efforts of an attacker. The most notable is that a cybercriminal immediately makes themselves known when with the lightest touch of a deception lure or decoy, their activity can be monitored and recorded. By observing what the attacker is trying to access as well as their Tactics, Techniques and Procedures (TTP), security teams can respond decisively and bolster system defences in these target areas.

There is also the benefit that the intruder wastes time and resources trying to get further and further into systems that will yield nothing in the way of a reward. In the event that they realise the game is up, a cybercriminal will either have to start all over again or move on to an easier target.

Modern deception uses the latest in machine-learning to maintain authenticity and attractiveness to an attacker. It is now easy to create and manage a deception fabric that blends seamlessly in with the environment and is based on the same operating systems, services, ports, and system characteristics, as what is being used in production. The combination of attractive decoys and enticing lures will efficiently derail everything from automated attacks to advanced attacks on IoT and other Internet-connected devices.

While IoT will continue to gain traction with businesses and consumers alike, attackers will increasingly use these difficult-to-secure devices as an entry point into organisations’ networks. Deception technology reduces an organisation’s risk by effectively fooling attackers, while allowing businesses to reap the full value of the Internet of Things and the new enabling services that they bring.

The author is Carolyn Crandall, chief deception officer at Attivo Networks

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow


Army’s new next generation squad weapon programme to launch ARC’s weapons intelligence platform

Posted on: August 12, 2022

Washington – Armaments Research Company, Inc, a technology and data company serving national security and public safety customers, announced their Internet-of-Things (IoT) full-stack technology will be introduced in the Next Generation Squad Weapon (NGSW) programme of record, in partnership with Sig Sauer. For the first time in 65 years, the U.S. Army’s initiative will replace

Read more

Connected logistics market to hit $47.6bn valuation by 2029 backed by MaaS for fleet management

Posted on: August 12, 2022

The global connected logistics market stands at a valuation of US$22.2 billion (€21.61 billion) in 2022 and is projected to reach $47.6 billion (€46.34 billion) by the end of 2029. Demand for connected logistics is estimated to increase at a compound annual growth rate (CAGR) of 11.5% over the forecast period (2022-2029).

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more

What is IoT?

Posted on: July 7, 2019

What is IoT Data as a new oil IoT connectivity What is IoT video So what’s IoT? The phrase ‘Internet of Things’ (IoT) is officially everywhere. It constantly shows up in my Google news feed, the weekend tech supplements are waxing lyrical about it and the volume of marketing emails I receive advertising ‘smart, connected

Read more
IoT Newsletter

Join the IoT Now online community for FREE, to receive: Exclusive offers for entry to all the IoT events that matter, round the world

Free access to a huge selection of the latest IoT analyst reports and industry whitepapers

The latest IoT news, as it breaks, to your inbox