ITEA is the Eureka Cluster on software innovation
ITEA is the Eureka Cluster on software innovation
ITEA 4 page header azure circular

Deception Toolkit

Project
17005 SCRATCh
Description
  • Can be installed without modification of proxied host
  • Fine-grained control over deception strategies
  • Easy deployment and configuration with containers and dashboard
Contact
Daniel Reti, DFKI
Email
Daniel.reti@dfki.de
Technical features

Input(s):

  • HTTP or SSH Service to Proxy

Main feature(s):

  • Inject lures into application traffic
  • Conceal critical information

Output(s):

  • Alerts in dashboard
  • High detection rate
Integration constraints
  • Need to set the firewall to only accept messages from the proxy
  • Need to direct incoming requests through the proxy, e.g., by pointing the DNS domain to the proxies IP
  • The SSH proxy needs the SSH keys or credentials for the SSH service that is being proxied
Targeted customer(s)

SMEs with HTTP or SSH service to protect.

Conditions for reuse

None

Confidentiality
Public
Publication date
18-03-2022
Involved partners
DFKI (DEU)