Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders. A key property of a honeyfile, enticement, is the extent to which the file can attract an intruder to interact with it. We introduce a novel metric, Topic Semantic Matching (TSM), which uses topic modelling to represent files in the repository and semantic matching in an embedding vector space to compare honeyfile text and topic words robustly. We also present a honeyfile corpus created with different Natural Language Processing (NLP) methods. Experiments show that TSM is effective in inter-corpus comparisons and is a promising tool to measure the enticement of honeyf...
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromis...
This thesis explores possibilities for extending the features of honeypot systems to decrease the ch...
Past experiences show us that password breach is still one of the main methods of attackers to obtai...
While advanced defenders have successfully used honeyfiles to detect unauthorized intruders and insi...
Honeywords are false passwords injected in a database for detecting password leakage. Generating hon...
Honeypots are essential tools in cybersecurity. However, most of them (even the high-interaction one...
Honeypots are active sensors deployed to obtain information about attacks. In their search for vulne...
Honeywords are the decoy words also known as potential password for a user which, when an attacker e...
Honeywords (decoy passwords) have been proposed to detect attacks against hashed password databases....
Cyber deception is an area of cybersecurity based on building detection systems and verification mod...
One of the pressing areas that is developing in the field of information security is associated with...
One of the pressing areas that is developing in the field of information security is associated with...
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is a...
As awareness is increasing rapidly, more upto date aggressions are appearing. Security is a key to p...
Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of...
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromis...
This thesis explores possibilities for extending the features of honeypot systems to decrease the ch...
Past experiences show us that password breach is still one of the main methods of attackers to obtai...
While advanced defenders have successfully used honeyfiles to detect unauthorized intruders and insi...
Honeywords are false passwords injected in a database for detecting password leakage. Generating hon...
Honeypots are essential tools in cybersecurity. However, most of them (even the high-interaction one...
Honeypots are active sensors deployed to obtain information about attacks. In their search for vulne...
Honeywords are the decoy words also known as potential password for a user which, when an attacker e...
Honeywords (decoy passwords) have been proposed to detect attacks against hashed password databases....
Cyber deception is an area of cybersecurity based on building detection systems and verification mod...
One of the pressing areas that is developing in the field of information security is associated with...
One of the pressing areas that is developing in the field of information security is associated with...
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is a...
As awareness is increasing rapidly, more upto date aggressions are appearing. Security is a key to p...
Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of...
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromis...
This thesis explores possibilities for extending the features of honeypot systems to decrease the ch...
Past experiences show us that password breach is still one of the main methods of attackers to obtai...