Active Deception Through Cyber Maneuver The concept of dynamic identity can play a significant role in deception and adaptive defenses. Static mappings of identities create vulnerabilities that undermine protections and facilitate asset theft. For example, static passwords, static credit card numbers, static asset tags, and static IP addresses simplify the tasks of a malicious adversary […]
Deception, Detection & Delay
Cyber deception, detection and delay techniques can be effective tools for defending computer systems and offer a third line of defense when access controls and intrusion-prevention systems fail. Discover the large variety of specific tactics that can delay, confuse, scare away, or tie up an attacker so that your assets stay protected. Determine what products and services can be adapted to address your cyber deception needs. Learn about the latest developments in deception tactics from our research section. This ACD capability area brings together the leading commercial and open source offerings and news for this highly innovative area of active cyber defenses.



Active cyber defense offers deception, delay and persistent detection approaches to disrupt cyber attacks while also increasing the work factor for the attacker. By camouflaging defenses, deception can provide real-time insight to a threat actor’s TTPs while delaying an attacker’s ability to launch a successful attack. Adaptive and persistent detective capabilities can expose stealthy malware […]


Choose Your Deception Active Cyber Defense can enable a large variety of specific deception tactics that can delay, confuse, scare away, or tie up an attacker depending on the circumstances and the methods. The following examples highlight this variety of tactics. Enabling specific abuse detection points in web application code using a library of vulnerability deception […]
