2020
DOI: 10.1109/access.2020.3034443
|View full text |Cite
|
Sign up to set email alerts
|

PhantomFS-v2: Dare You to Avoid This Trap

Abstract: It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques. Especially, a file-based deception technology is promising because it is very difficult (if not impossible) to commit an attack without reading and modifying any file. It can play as an additional security barrier because malicious file access can be detected even if an adversary succeeds in gaini… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Generally, the Honeyfile is inaccessible to legitimate users. Only attackers enumerate files in system will touch decoy files [33]. The main purpose of a readable, believable and indistinguishable design of text content are: 1) increase the likelihood of being accessed, and 2) obfuscate attacker's recognition of the real information.…”
Section: Threat Modelmentioning
confidence: 99%
“…Generally, the Honeyfile is inaccessible to legitimate users. Only attackers enumerate files in system will touch decoy files [33]. The main purpose of a readable, believable and indistinguishable design of text content are: 1) increase the likelihood of being accessed, and 2) obfuscate attacker's recognition of the real information.…”
Section: Threat Modelmentioning
confidence: 99%
“…HT: HT: [90], [109], [168] HT: [77], [89] HP: [53], [55]- [61], [67], [153], [160] HP: [53], [54] HP:…”
Section: B Deception Lifecyclementioning
confidence: 99%