Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.733
|View full text |Cite
|
Sign up to set email alerts
|

Automating the Generation of Enticing Text Content for High-Interaction Honeyfiles

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 24 publications
0
25
0
Order By: Relevance
“…One of challenges the previous works try to address is how to make fake files as real as possible. To address this challenge, HoneyGen is proposed, which automatically generates fake files by profiling existing real files [12]. Fake files are also utilized to detect ransomware [13].…”
Section: Related Work a Deception Technologymentioning
confidence: 99%
“…One of challenges the previous works try to address is how to make fake files as real as possible. To address this challenge, HoneyGen is proposed, which automatically generates fake files by profiling existing real files [12]. Fake files are also utilized to detect ransomware [13].…”
Section: Related Work a Deception Technologymentioning
confidence: 99%
“…The paper proposes an alternative approach that selects the honeywords from existing user passwords in the system in order to provide realistic honeywords, a perfectly flat honeyword generation method which reduce the storage cost. Ben Whitham [7]…”
Section: B Conventional Encryptionmentioning
confidence: 99%
“…They are observable by means of file-access monitoring, and more flexible than comments and DB-entries, but have the downside of interfering with usage and might be mistakenly found by legitimate users. Typically, the most effort for this decoy type is devoted to contextual adaptation [16], which is not part of this work. (g) File metadata (D 7 ): Information that is not part of the content itself is frequently of sensitive nature as well.…”
Section: Decoy Elementsmentioning
confidence: 99%
“…This can be prevented by determining suitable metadata based on the environment. Context-sensitivity is the objective of previous research work [16], [29]- [31], and not part of this work. (b) Process information: An attacker with system access may identify suspicious processes running on…”
Section: Security Analysismentioning
confidence: 99%