The aim of this study is to provide a generic implementation strategy for honeytokens deployed within a database management system that leverages the aspect-oriented paradigm to contain the insider threat. This approach is tested by developing a proof-of-concept prototype in an aspect-oriented language, namely AspectJ. This study also reflects on design and implementation challenges involved in the deployment of honeytokens to contain the insider threat. Consequently, aspect-orientation is proposed as a means to resolve some of these challenges.
CITATION STYLE
Padayachee, K. (2015). Aspectising honeytokens to contain the insider threat. IET Information Security, 9(4), 240–247. https://doi.org/10.1049/iet-ifs.2014.0063
Mendeley helps you to discover research relevant for your work.