2016
DOI: 10.1007/978-3-319-41483-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Towards Creating Believable Decoy Project Folders for Detecting Data Theft

Abstract: Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can be done by deploying these intrinsically valueless folders between real project folders and by monitoring interactions with them. We present our approach and results from a user study demonstrating the believability… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Thaler et al [85] present an approach based on Markov chains for deceiving data stealer and detecting data theft by dynamically creating/placing decoy folders alongside actual folders inside a database and monitoring the interaction of the data stealer with these decoy folders. Since manual creation of decoy folders is labourintensive, therefore, this approach creates decoy folders dynamically using these four steps; (1) data is normalized to replace properties of actual folders with placeholders (2) using normalized data, Markov chain is learnt (3) using learnt model, decoy directory structure is created (4) the directory structure is instantiated to create decoy folders.…”
Section: Cyber Deceptionmentioning
confidence: 99%
“…Thaler et al [85] present an approach based on Markov chains for deceiving data stealer and detecting data theft by dynamically creating/placing decoy folders alongside actual folders inside a database and monitoring the interaction of the data stealer with these decoy folders. Since manual creation of decoy folders is labourintensive, therefore, this approach creates decoy folders dynamically using these four steps; (1) data is normalized to replace properties of actual folders with placeholders (2) using normalized data, Markov chain is learnt (3) using learnt model, decoy directory structure is created (4) the directory structure is instantiated to create decoy folders.…”
Section: Cyber Deceptionmentioning
confidence: 99%