Proceedings of the 19th ACM Symposium on Access Control Models and Technologies 2014
DOI: 10.1145/2613087.2613088
|View full text |Cite
|
Sign up to set email alerts
|

A bodyguard of lies

Abstract: Decoy objects, often labeled in computer security with the term honey, are a powerful tool for compromise detection and mitigation. There has been little exploration of overarching theories or set of principles or properties, however. This short paper (and accompanying keynote talk) briefly explore two properties of honey systems, indistinguishability and secrecy. The aim is to illuminate a broad design space that might encompass a wide array of areas in information security, including access control, the main… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…User Login, When the user attempts login to his account, the login server checks the honeypot (Fake and legitimate accounts, the fake is set up by the administrator to detect the breaches) [33][34][35]. If his/her account is fakes then an alarm is sent to the administrative as a possible breach, else the account is legitimate then hashed the password of the user and compared to its database of sweetwords and sent (Check: i, j) to the honeychecker [36,37].…”
Section: Honeywordsmentioning
confidence: 99%
“…User Login, When the user attempts login to his account, the login server checks the honeypot (Fake and legitimate accounts, the fake is set up by the administrator to detect the breaches) [33][34][35]. If his/her account is fakes then an alarm is sent to the administrative as a possible breach, else the account is legitimate then hashed the password of the user and compared to its database of sweetwords and sent (Check: i, j) to the honeychecker [36,37].…”
Section: Honeywordsmentioning
confidence: 99%
“…User login, the honeypot is examined by the login server when a user wants to connect to his account (the administrator makes fake accounts to detect the attack) [28]. If the account is fake, the administrator will get a warning as a possible attack; if the account is legitimate, hash the user's password and compare it to the file of sweetwords before submitting checking to the honeychecker [29].…”
Section: Honeywordsmentioning
confidence: 99%
“…The attacker has no way to distinguish a priori and is correct and this is done in two steps 1 -Choose a random set of the seed area 2-Linking this random group of seeds with the original message [21] Figure (3) : The seed space for coffee types encryption. [22] the figure (3) shows an example of seed space for coffee types encryption, Cappuccino, Espresso, Latte, and Mocha are among the coffee message options. These four messages have been arranged in alphabetical order.…”
Section: Dtementioning
confidence: 99%
“…And here, these false messages are called honey terms, as researchers called these types of false messages, although researchers tend to use the term honey message instead. Honey words were added to be used as decoys before encrypting honey, present along with the correct message [2], and thus the attacker was unable to recognize the correct message even though the honey encryption involves a delivery encryption method that maps separate messages instead of storing a bunch of spoofed messages for each recipient, the Honey word concept is still very similar [3].…”
Section: The Challenges Of Honey Encryption 51-creating Of Honey Mess...mentioning
confidence: 99%
See 1 more Smart Citation