TalksAWS re:Invent 2025 - Make Attackers Cry: Outsmart Them With Deception (SEC326)
AWS re:Invent 2025 - Make Attackers Cry: Outsmart Them With Deception (SEC326)
Outsmarting Attackers with Deception: Leveraging Behavioral Science for Cybersecurity
Leveling the Playing Field: Deception as a Defensive Strategy
The presentation draws parallels between sports and cybersecurity, highlighting how the "playing field" can be evened out through strategic approaches.
Just as a blind golfer was able to compete against the world's best golfer, the presenters aim to empower defenders to gain an advantage over attackers.
The presenters emphasize the importance of understanding attackers as human decision-makers, rather than just focusing on the attacks themselves.
They introduce two key behavioral science concepts:
Nudge: Positively influencing decision-making by making it easier and more straightforward.
Sludge: Adding friction and complexity to decision-making processes, making them more difficult.
Deception as a Defensive Tactic
The presenters explain how deception has been used throughout history, from the Trojan Horse to animal camouflage in nature.
In the cybersecurity context, deception is about leveraging what is known about attacker tactics to the defender's advantage, rather than playing "dirty."
Deception can impose various costs on attackers, including:
Quantitative costs (money and effort)
Qualitative costs (reputational damage, difficulty recruiting, and informational challenges)
Psychological costs (frustration, shame, and confusion)
Fastly's Deception-Based Defense Approach
Fastly is introducing deception-based defense strategies into their cybersecurity products, starting with account takeover protection.
The key features of Fastly's deception-based defense include:
Configurable triggers to activate the deception, based on signals like bad bots or suspicious activity.
Scrambling usernames and passwords to frustrate attackers, without blocking them outright.
Integrating the deception functionality directly into the normal workflow, rather than requiring a separate honeypot infrastructure.
Providing a user-friendly interface for security teams to easily enable, log, and test the deception capabilities.
Deception as Part of a Comprehensive Defense-in-Depth Strategy
Fastly's deception-based defense is just one component of a broader defense-in-depth approach, which also includes:
Rate limiting
DDoS protection
Secure-by-design architecture within the CDN and WAF
The entire solution is designed to be API-driven, Terraform-managed, and easily iterated upon to keep up with evolving threats.
Real-World Impact and Examples
The presenters emphasize that deception is not about "playing dirty" but rather about leveraging behavioral science to gain an advantage over attackers.
By frustrating and confusing attackers, the deception-based defense aims to make them give up or move on to easier targets, ultimately reducing the overall risk and impact of attacks.
These cookies are used to collect information about how you interact with this website and allow us to remember you. We use this information to improve and customize your browsing experience, as well as for analytics.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference.