作者: Daniel Fraunholz , Daniel Krohmer , Frederic Pohl , Hans Dieter Schotten
DOI: 10.1109/NTMS.2018.8328709
关键词:
摘要: Information security is a fast-changing domain. Traditional mechanisms such as firewalls and access control are circumvented regularly. The amount of significant incidents grows each year. Deception systems perfect match to support perimeter-based technologies in intrusion detection, data breach identification leakage prevention. In this work, framework proposed generating, deploying, monitoring maintaining honeytokens on host system. easily extendable flexible its use. authors also describe prototype implementation for four different types tokens thereby address typical issues when operating honeytokens.