Through Cyber Trapper platform, we will collect information on ongoing live IIoT attacks at hundreds of locations worldwide. We will collect data from our IIoT clones – traps as well as productions systems, analyse them in real time (in less than 10 milliseconds) and create dynamic threat feed lists with malicious compromise indicators used to prevent attacks at customer premises. This approach achieves the effect of “Crowd Immunity” – after the first attempt of an attacker to interact with the CyberTrapper at one of the group members, the entire group acquires immunity to that attacker and its attack vector.
A hardware platform was chosen for execution based on defined technical requirements. After that system development started, first with architecture design and UI drafts. Then the device arrived and integration could begin, which was the most interesting part for technical team. Successful integration of edge device and traps led the project team to testing part that showed really good results. The team is looking forward to working on optimizing the execution as well as integrating the system with central server.