Towards creating believable decoy project folders for detecting data theft

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

Abstract

Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can be done by deploying these intrinsically valueless folders between real project folders and bymonitoring interactions with them. We present our approach and results from a user study demonstrating the believability of the generated decoy folders.

Original languageEnglish
Title of host publicationData and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings
PublisherSpringer
Pages161-169
Number of pages9
ISBN (Print)9783319414829
DOIs
Publication statusPublished - 2016
Event30th IFIP WG 11.3 Conference on Data and Applications Security, DBSec 2016 - Trento, Italy
Duration: 18 Jul 201620 Jul 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9766
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

Conference30th IFIP WG 11.3 Conference on Data and Applications Security, DBSec 2016
Country/TerritoryItaly
CityTrento
Period18/07/1620/07/16

Keywords

  • Data theft
  • Data theft detection
  • Deception
  • Decoy
  • Honey pot
  • Intrusion detection
  • Trap-based defense

Fingerprint

Dive into the research topics of 'Towards creating believable decoy project folders for detecting data theft'. Together they form a unique fingerprint.
  • Best Presentation Award

    Thaler, S. (Recipient), 10 Dec 2016

    Prize: OtherCareer, activity or publication related prizes (lifetime, best paper, poster etc.)Scientific

Cite this