Creating personally identifiable honeytokens

16Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, a method for creating digital honeytokens consisting of personal information such as names, addresses, telephone numbers and social security numbers is designed and evaluated. We show that these honeytokens can add to the security of digital data by allowing better identification of individuals who are misusing or inappropriately copying personally identifying information. No program currently exists publically to create personally identifying honeytokens; we will show how the design we've proposed will fill this void and be another good tool for the computer security engineer and a vast improvement over previous naïve and manual methods of generating fake identifying information. The main contribution of this work is a new and innovative program to produce PII honeytokens, a description of where they can be deployed, and an analysis that shows they appear realistic. © Springer Science+Business Media B.V. 2010.

Cite

CITATION STYLE

APA

White, J. (2010). Creating personally identifiable honeytokens. In Innovations and Advances in Computer Sciences and Engineering (pp. 227–232). https://doi.org/10.1007/978-90-481-3658-2_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free