Decoy document deployment for effective masquerade attack detection

40Citations
Citations of this article
57Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior work has focused on profiling legitimate user behavior and detecting deviations from that normal behavior that could potentially signal an ongoing masquerade attack. Such approaches suffer from high false positive rates. Other work investigated the use of trap-based mechanisms as a means for detecting insider attacks in general. In this paper, we investigate the use of such trap-based mechanisms for the detection of masquerade attacks. We evaluate the desirable properties of decoys deployed within a user's file space for detection. We investigate the trade-offs between these properties through two user studies, and propose recommendations for effective masquerade detection using decoy documents based on findings from our user studies. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Ben Salem, M., & Stolfo, S. J. (2011). Decoy document deployment for effective masquerade attack detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6739 LNCS, pp. 35–54). https://doi.org/10.1007/978-3-642-22424-9_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free