2012 35th IEEE Sarnoff Symposium 2012
DOI: 10.1109/sarnof.2012.6222760
|View full text |Cite
|
Sign up to set email alerts
|

Catching the Wily Hacker: A multilayer deception system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Deception has also been studied for files/documents (Yuill et al 2004;Voris, Boggs, and Stolfo 2012;Chakraborty et al 2019), software code (Park and Stolfo 2012), and at the systems level (Jajodia et al 2016(Jajodia et al , 2017Wang et al 2012). A honeypot scheme has been proposed in (Yuill et al 2004), which distributed decoy honey files throughout the system so that alerts are triggered as soon as an attacker breaks into the system and accesses a honey file.…”
Section: Related Workmentioning
confidence: 99%
“…Deception has also been studied for files/documents (Yuill et al 2004;Voris, Boggs, and Stolfo 2012;Chakraborty et al 2019), software code (Park and Stolfo 2012), and at the systems level (Jajodia et al 2016(Jajodia et al , 2017Wang et al 2012). A honeypot scheme has been proposed in (Yuill et al 2004), which distributed decoy honey files throughout the system so that alerts are triggered as soon as an attacker breaks into the system and accesses a honey file.…”
Section: Related Workmentioning
confidence: 99%
“…The files reside on a file server, and the server sends an alarm when a honeyfile is accessed [46]. In [47], Wang et. al.…”
Section: User Machine Cloud Providermentioning
confidence: 99%
“…This is a very labor intensive task". Even a recent solution proposed by Wang et al [29] requires a new software module to be developed for each topic. This approach is not scalable [25] and is at odds with the 'ease of use' security product design principle [2].…”
Section: Honeyfile Diffusionmentioning
confidence: 99%
“…One key advantage is that their content can entice external threat actors (who typically scan newly accessed file systems to identify valuable documents) [30] [29]. Highinteraction honeyfiles are also effective against malicious insiders masquerading as legitimate users; the attacker's lack of knowledge of the victim's access profile (files, locations of important directories, available applications, etc.)…”
mentioning
confidence: 99%