Methods, systems, and media for baiting inside attackers

作者: Angelos D. Keromytis , Vasileios P. Kemerlis , Shlomo Hershkop , Salvatore J. Stolfo , Brian M. Bowen

DOI:

关键词:

摘要: Methods, systems, and media for providing trap-based defenses are provided. In accordance with some embodiments, a method is provided, the comprising: generating decoy information based at least in part on actual computing environment, wherein generated to comply one or more document properties; embedding beacon into information; inserting embedded provides first indication that has been accessed by an attacker second differentiates between information.

参考文章(240)
Clarence T. Tegreene, Mark A. Malamud, Royce A. Levien, Edward K.Y. Jung, William Henry Mangione-Smith, John D. Rinaldo, Robert W. Lord, Alexander J. Cohen, Signaling a security breach of a protected set of files ,(2006)
Baljeet S. Bilkhu, Andrew C. Smith, Tsz-Kin Gary Wong, Messaging script for communications server ,(2006)
Anthony Carathimas, Eric Thomas, Fred Cohen, Method and apparatus for invisible network responder ,(2003)