13th International Conference on Security of Information and Networks 2020
DOI: 10.1145/3433174.3433599
|View full text |Cite
|
Sign up to set email alerts
|

Towards systematic honeytoken fingerprinting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 11 publications
0
5
0
1
Order By: Relevance
“…Srinivasa et al [21] proposed an set of techniques, referred to as fingerprinting honey tokens, to compromise a decoy system. The authors of this study explicitly mentioned the difficulty of fingerprinting honey tokens created at data level.…”
Section: A Deception-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Srinivasa et al [21] proposed an set of techniques, referred to as fingerprinting honey tokens, to compromise a decoy system. The authors of this study explicitly mentioned the difficulty of fingerprinting honey tokens created at data level.…”
Section: A Deception-based Approachesmentioning
confidence: 99%
“…On the other hand, the content-based approach applies machine learning and natural language processing techniques to textual content to build models for insider threat detection [2]- [4]. Finally, the deception-based approach uses decoy assets otherwise known as honey elements such as honey permissions [23], honeypots [25], honey files [19], honey documents [20], honey tokens [21], [26], honey words [24], and honey encryption [22] to attract and track insiders. Unlike other approaches, deception-based measures provide efficient early signs of insider incidents with the least amount of data collected from former or potential insiders [44].…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, the only work that examines honeytokenspecific fingerprinting to date is by Srinivasa et al [21]. The work showcases a proof of concept regarding fingerprinting a public honeytoken provider as a case study.…”
Section: Honeytoken Fingerprintingmentioning
confidence: 99%
“…To analyze the honeytokens, we started by building a classification to help us create fingerprinting techniques for each honeytoken class. Srinivasa et al have established a Canarytoken honeytoken classification, and we use it as a building block for our extended version [21].…”
Section: Honeytoken Analysismentioning
confidence: 99%
“…However, we consider this out of the scope of this article. Similarly, we will not discuss here fingerprinting of honeypot-like systems (such as honeytoken identification) [36]. We also note all papers in the SotA exclude high interaction honeypots from their analysis.…”
Section: Related Workmentioning
confidence: 99%