In cybersecurity, a decoy refers to a purposely created digital asset created to confuse, detect, and analyze illegitimate behavior on some part of a network. Decoys are confusing because it looks identical to the actual asset, and serves as a trap designed to watch, log, and record a threat actor’s actions, allowing an organization to identify a threat and trigger a response.
Deception decoys are, by definition, a subset of deception technology. Decoys pretend to be any legitimate system, network, application, or data asset to attract cyber attackers. The threat actor creates an interaction through the decoy that records their actions and the system can provide insights into their methods and intentions, early threat detection, and minimally impact any damage by mitigating the threat actor’s access to critical information whilst engaging with the decoy(s).
The meaning of a decoy in cybersecurity extends beyond mere distraction, which means that they are strategically deployed to study, analyze, and understand attempts at unauthorized access. When examining attacker’s interaction with a decoy, a security team can create a timeline of events that can reveal vulnerabilities, access routes, and strength of a security posture.
The definition of a decoy encompasses various forms, including:
- Network Decoys: simulated network services or servers that it is hoped will attract unauthorized scans or access attempts.
- Data Decoys: simulated data centres that appear real or have legitimate structures that it hopes will entice the attacker into some engagement.
- Application Decoys: fake or simulated applications that appear to be real.
- Endpoint Decoys: Devices configured to seem tempting, luring attackers to take action on endpoints.
In summary, decoys in cybersecurity are proactive defenses. They both detect and analyze threats, but are actively redirecting malicious activity, protecting valuable assets, and preserving digital foundations.
When compared to traditional security solutions, deception decoys provide:
- Early Detection: When attackers are attracted to decoys, they are often not found on critical systems; meaning the threat can be identified before it negatively impacts the organization.
- Fewer False Positives: When an attacker interacts with decoys it is suspicious activity, allowing for better alerts and less noise for the security team.
- Threat Intelligence: When documenting the attacker's interaction with decoys, organizations gain useful insights into their tactics, techniques, and procedures.
- Business Continuity: Decoys provide silent protection in the background. No disruption to business processes.