Esc
Decoy Environment
Definition
A Decoy Environment comprises hosts and networks for the purposes of deceiving an attacker.
Synonyms: Honeypot .Technique Overview
Systems in a decoy environment are typically configured so that some detectable means of communication does not have any legitimate business purpose. Any communication via these means should be logged and analyzed to find potential indicators of compromise for a possible past or future attack against other systems.
loading...
Technique Subclasses
There are 4 techniques in this category, Decoy Environment.
Name | ID | Definition | Synonyms |
---|---|---|---|
Decoy Environment | D3-DE | A Decoy Environment comprises hosts and networks for the purposes of deceiving an attacker. | Honeypot |
- Standalone Honeynet | D3-SHN | An environment created for the purpose of attracting attackers and eliciting their behaviors that is not connected to any production enterprise systems. | |
- Connected Honeynet | D3-CHN | A decoy service, system, or environment, that is connected to the enterprise network, and simulates or emulates certain functionality to the network, without exposing full access to a production system. | |
- Integrated Honeynet | D3-IHN | The practice of setting decoys in a production environment to entice interaction from attackers. |
loading...
D3FEND™
A knowledge graph of cybersecurity countermeasures