2020
DOI: 10.1109/access.2020.2973700
|View full text |Cite
|
Sign up to set email alerts
|

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works have mainly focused on using user data files as decoys, this concept can be applied to system files. If so, it is expected to be effective in detecting malicious users because it is very difficult to commit an attack without accessing a single system file. However,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…The file-based deception technology has been demonstrated to be effective in thwarting malicious users who have gained access to the host evading intrusion detection systems [9]. However, if adversaries become aware of the deception technology, the deception technology is unlikely to succeed in alluring adversaries.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The file-based deception technology has been demonstrated to be effective in thwarting malicious users who have gained access to the host evading intrusion detection systems [9]. However, if adversaries become aware of the deception technology, the deception technology is unlikely to succeed in alluring adversaries.…”
Section: Discussionmentioning
confidence: 99%
“…The goal of PhantomFS [9] is to allure adversaries who have already gained access to a host without being detected by traditional intrusion detection systems. PhantomFS offers an additional security barrier to thwart such adversaries.…”
Section: Background and Related Work A Phantomfsmentioning
confidence: 99%
See 2 more Smart Citations
“…Using decoy documents to track the users with malicious intent, the proposed method did not require additional user credential in the authentication process. In [13], Lee et al developed a hidden interface that recognized malicious users and used decoy files to lure them into an monitored environment. The advantage of their method is that no false alarms will be raised by legitimate applications and users.…”
Section: A Research On Decoy Documentsmentioning
confidence: 99%