Authors:
Surya Lokesh Bhargav Pentakota
Addresses:
Department of Research and Development, Ginger Labs, Texas, United States of America.
In this work, a framework for an autonomous Deception Native CZTR Deception-based zero-trust perimeter operator is introduced. Traditional Zero Trust architectures rely on static policy enforcement points that are vulnerable to bypass by advanced attackers who have already achieved persistence. By placing deception logic at the routing layer, researchers turn the network into a dynamic minefield where illegitimate lateral movements are not simply rejected but guided toward high-interaction decoys. The work uses a synthetic subset of the UNSW-NB15 dataset, filtering to 42,000 traffic flows, which in turn serves as a reduced core sample for this case study. The experimental proof-of-concept was implemented in the Mininet network emulator and used the Ryu Software-Defined Networking controller to run the dynamic routing protocols. The main performance indexes are containment time, false-positive rate, and route-reshaping latency. The results of this study show that inserting deception primitives in the forwarding plane decreases the isolation time of a compromised endpoint by an order of magnitude compared to conventional segmentation. This forces attackers to show their hand earlier in the kill chain, enabling automated adversarial responses without human intervention. The paper describes the structure, routing control, and statistical efficiency of this attack-prevention approach.
Keywords: Deception Technology; Autonomous Containment; Attack Prevention; Lateral Movement; Containment Time; Software Defined Networking; Zero Trust Architecture.
Received on: 09/03/2025, Revised on: 18/05/2025, Accepted on: 26/07/2025, Published on: 03/01/2026
DOI: 10.69888/FTSIN.2026.000604
FMDB Transactions on Sustainable Intelligent Networks, 2026 Vol. 3 No. 1, Pages: 45–53