Authors
Brian M Bowen, Shlomo Hershkop, Angelos D Keromytis, Salvatore J Stolfo
Publication date
2009
Conference
Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers 5
Pages
51-70
Publisher
Springer Berlin Heidelberg
Description
The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses …
Total citations
200920102011201220132014201520162017201820192020202120222023202456913142418252621302125171415
Scholar articles
BM Bowen, S Hershkop, AD Keromytis, SJ Stolfo - Security and Privacy in Communication Networks: 5th …, 2009