2012 IEEE Symposium on Security and Privacy Workshops 2012
DOI: 10.1109/spw.2012.20
|View full text |Cite
|
Sign up to set email alerts
|

Lost in Translation: Improving Decoy Documents via Automated Translation

Abstract: Abstract-Detecting insider attacks continues to prove to be one of the most difficult challenges in securing sensitive data. Decoy information and documents represent a promising approach to detecting malicious masqueraders; however, false positives can interfere with legitimate work and take up user time. We propose generating foreign language decoy documents that are sprinkled with untranslatable enticing proper nouns such as company names, hot topics, or apparent login information. Our goal is for this type… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 2 publications
0
15
0
Order By: Relevance
“…Others study how to create effective decoys [41] and honeypots [42]. Stolfo et al [43] extend this work to the cloud.…”
Section: Related Workmentioning
confidence: 95%
“…Others study how to create effective decoys [41] and honeypots [42]. Stolfo et al [43] extend this work to the cloud.…”
Section: Related Workmentioning
confidence: 95%
“…In this paper we introduce a data-driven approach to create believable project folders that can be deployed to detect data theft attempts. Previous approaches focused on creating and placing single decoy documents( [13], [2], [10], [11]) or file systems [6]. Conceptually we also create decoys to detect data theft.…”
Section: Related Workmentioning
confidence: 99%
“…In [5], a project history is simulated for a piece of bogus software is produced by introducing obfuscated software variations. Similarly, in [9], the creation of documents in foreign languages is proposed to deceive attackers without the ability to apply translation tools on the fly.…”
Section: Indistinguishabilitymentioning
confidence: 99%