2009
DOI: 10.1007/978-3-642-05284-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Baiting Inside Attackers Using Decoy Documents

Abstract: Abstract-The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
78
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
1
1

Relationship

4
4

Authors

Journals

citations
Cited by 135 publications
(78 citation statements)
references
References 9 publications
0
78
0
Order By: Relevance
“…A thorough evaluation of the right model checking and alerting frequency in light of average search times on a file system inter alia is the subject of ongoing research. Another focus of ongoing research is the correlation of search behavior anomaly detection with trap-based decoy files such as [2]. This should provide stronger evidence of malfeasance, and therefore improve the detector's accuracy.…”
Section: Accuracy Results Discussionmentioning
confidence: 99%
“…A thorough evaluation of the right model checking and alerting frequency in light of average search times on a file system inter alia is the subject of ongoing research. Another focus of ongoing research is the correlation of search behavior anomaly detection with trap-based decoy files such as [2]. This should provide stronger evidence of malfeasance, and therefore improve the detector's accuracy.…”
Section: Accuracy Results Discussionmentioning
confidence: 99%
“…The inputs will contain automatically generated enticing and believable deceptive information (DI) whose misuse by an adversary can be subsequently detected. Examples of such enticing bait information include documents with built-in "beacons" [9], URLs and username/passwords to honeypots or sites whose access can be directly or indirectly monitored [10], credit card and bank account numbers with triggers [11], etc. Other types of DI that we plan to use include deceptive documents in the filesystem and entries in database tables (or entire databases).…”
Section: Digit: Deceptive Information Generation Injection and Tmentioning
confidence: 99%
“…These credentials could be exposed to Tor exits via canned protocol interactions. Combined with decoy information generation services [8], this infrastructure could be used as a composable eavesdrop detection system [27].…”
Section: Eavesdropping Detection As a Network Servicementioning
confidence: 99%
“…The decoy credentials used in our approach can thus be viewed as particular instance of honeytokens. Bowen et al [8] proposed the use of decoy documents to detect misbehaving entities within the perimeter of an organization. The decoy documents contain embedded "beacons," such as scripts or macros, which are executed when the document is opened.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation