While advanced defenders have successfully used honeyfiles to detect unauthorized intruders and insider threats for more than 30 years, the complexity associated with adaptively devising enticing content has limited their diffusion. This paper presents four new designs for automating the construction of honeyfile content. The new designs select a document from the target directory as a template and employ word transposition and substitution based on parts of speech tagging and n-grams collected from both the target directory and the surrounding file system. These designs were compared to previous methods using a new theory to quantitatively evaluate honeyfile enticement. The new designs were able to successfully mimic the content from the t...
Client-side attacks have emerged in recent years to become the most popular means of propagat-ing ma...
Digital honeypots are computers commonly used to collect intelligence about new cyberattacks and mal...
Organizations face a persistent challenge detecting malicious insiders as well as outside attackers ...
Honeyfile deployment is a useful breach detection method in cyber deception that can also inform def...
Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of...
Honeywords (decoy passwords) have been proposed to detect attacks against hashed password databases....
Honeywords are the decoy words also known as potential password for a user which, when an attacker e...
For nearly 30 years, fake digital documents have been used to identify external intruders and malici...
Honeywords are false passwords injected in a database for detecting password leakage. Generating hon...
Past experiences show us that password breach is still one of the main methods of attackers to obtai...
Honeypots are essential tools in cybersecurity. However, most of them (even the high-interaction one...
Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. I...
Client-side computers connected to the Internet today are exposed to a lot malicious activity. Brows...
As society is dependent on digital world, the threat continues to rapidly increase. Every year new m...
Cyber deception is an area of cybersecurity based on building detection systems and verification mod...
Client-side attacks have emerged in recent years to become the most popular means of propagat-ing ma...
Digital honeypots are computers commonly used to collect intelligence about new cyberattacks and mal...
Organizations face a persistent challenge detecting malicious insiders as well as outside attackers ...
Honeyfile deployment is a useful breach detection method in cyber deception that can also inform def...
Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of...
Honeywords (decoy passwords) have been proposed to detect attacks against hashed password databases....
Honeywords are the decoy words also known as potential password for a user which, when an attacker e...
For nearly 30 years, fake digital documents have been used to identify external intruders and malici...
Honeywords are false passwords injected in a database for detecting password leakage. Generating hon...
Past experiences show us that password breach is still one of the main methods of attackers to obtai...
Honeypots are essential tools in cybersecurity. However, most of them (even the high-interaction one...
Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. I...
Client-side computers connected to the Internet today are exposed to a lot malicious activity. Brows...
As society is dependent on digital world, the threat continues to rapidly increase. Every year new m...
Cyber deception is an area of cybersecurity based on building detection systems and verification mod...
Client-side attacks have emerged in recent years to become the most popular means of propagat-ing ma...
Digital honeypots are computers commonly used to collect intelligence about new cyberattacks and mal...
Organizations face a persistent challenge detecting malicious insiders as well as outside attackers ...