2016 Military Communications and Information Systems Conference (MilCIS) 2016
DOI: 10.1109/milcis.2016.7797341
|View full text |Cite
|
Sign up to set email alerts
|

Minimising paradoxes when employing honeyfiles to combat data theft in military networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…• DS 6 -Honey information [57]: The defender uses honey information, such as files, tokens, or fake patches indicating vulnerabilities to mislead attackers. This strategy applies defend against AS 1 , AS 2 , AS 5 − AS 8 as those attacks aim to obtain target information (i.e., vulnerability, private key) for their attack success.…”
Section: B Defender Modelmentioning
confidence: 99%
“…• DS 6 -Honey information [57]: The defender uses honey information, such as files, tokens, or fake patches indicating vulnerabilities to mislead attackers. This strategy applies defend against AS 1 , AS 2 , AS 5 − AS 8 as those attacks aim to obtain target information (i.e., vulnerability, private key) for their attack success.…”
Section: B Defender Modelmentioning
confidence: 99%
“…The purpose of the central screen subtask was to simulate the cognitive load associated with domain-specific skill use in network defense, namely monitoring a system of honeyfiles ( Figure 1 ) (Helton and Russell, 2011 ; McIntire et al, 2013 ; Mancuso et al, 2015 ; Vieane et al, 2016 ). Network defense analysts use honeyfiles to guard against data theft and unauthorized system access (Whitham, 2016 ). Honeyfiles are designed to resemble “real” documents that attract data thieves.…”
Section: Wacdt Validationmentioning
confidence: 99%
“…1) DD Techniques: The common defensive deception (DD) techniques used in this network environment include various types of honey information, such as fake honey files [40,119,139] or honeypots [104,106,111,156].…”
Section: A Enterprise Networkmentioning
confidence: 99%
“…2) Main Attacks: In enterprise networks, the following attacks have been countered by game-theoretic (GT) or MLbased DD, including insider threat and sophisticated adversaries, such as APTs [73], zero-day attacks [139,140], worm attacks [32], reverse engineering attacker using security patch Avery and Spafford [19], or DoS attack [40].…”
Section: A Enterprise Networkmentioning
confidence: 99%
See 1 more Smart Citation