메뉴 건너뛰기




Volumn 19 LNICST, Issue , 2009, Pages 51-70

Baiting inside attackers using decoy documents

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATICALLY GENERATED; DEFENSE MECHANISM; FILE SYSTEMS; HONEYPOTS; INSIDER ATTACK; INSIDER THREAT; MISUSE DETECTION; SENSITIVE INFORMATIONS; USER MODELING;

EID: 84885891904     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05284-2_4     Document Type: Conference Paper
Times cited : (146)

References (29)
  • 3
    • 84885886239 scopus 로고    scopus 로고
    • Security: Spyware and rootkits
    • December 2004
    • Butler, J., Sherri, S.: Security: Spyware and Rootkits. In: Login, December 2004, vol. 29(6) (2004)
    • (2004) Login , vol.29 , Issue.6
    • Butler, J.1    Sherri, S.2
  • 4
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Clark, D.D., Wilson, D.R.: A Comparison of Commercial and Military Computer Security Policies. In: IEEE Symposium on Security and Privacy, pp. 184-194 (1987)
    • (1987) IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 7
    • 70450076401 scopus 로고    scopus 로고
    • Department of Computer Science, University of Calgary, TR 2007-873-25 July
    • Friess, N., Aycock, J.: Black Market Botnets. Department of Computer Science, University of Calgary, TR 2007-873-25 (July 2007)
    • (2007) Black Market Botnets
    • Friess, N.1    Aycock, J.2
  • 8
    • 84885883837 scopus 로고    scopus 로고
    • Handling today's tough security threats
    • Hoang, M.: Handling Today's Tough Security Threats. Symantec Security Response (2006)
    • (2006) Symantec Security Response
    • Hoang, M.1
  • 11
    • 84885888847 scopus 로고    scopus 로고
    • Honeypot Mailing List, Security Focus, http://www.securityfocus.com/ archive/119
    • Honeypot Mailing List
  • 13
    • 84885887050 scopus 로고    scopus 로고
    • From riches to prison: Hackers rig stock prices
    • September
    • Kravets, D.: From Riches to Prison: Hackers Rig Stock Prices. Wired Blog Network (September 2008)
    • (2008) Wired Blog Network
    • Kravets, D.1
  • 14
    • 84885892955 scopus 로고    scopus 로고
    • Web fraud 2.0: Validating your stolen goods
    • August 20
    • Krebs, B.: Web Fraud 2.0: Validating Your Stolen Goods. The Washington Post (August 20, 2008)
    • (2008) The Washington Post
    • Krebs, B.1
  • 15
    • 38049030703 scopus 로고    scopus 로고
    • A study of malcode-bearing documents
    • Hämmerli, B.M., Sommer, R. (eds.) LNCS Springer, Heidelberg
    • Li, W., Stolfo, S.J., Stavrou, A., Androulaki, E., Keromytis, A.: A Study of Malcode-Bearing Documents. In: Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 231-250. Springer, Heidelberg (2007)
    • (2007) DIMVA 2007 , vol.4579 , pp. 231-250
    • Li, W.1    Stolfo, S.J.2    Stavrou, A.3    Androulaki, E.4    Keromytis, A.5
  • 16
    • 38349036494 scopus 로고    scopus 로고
    • ELICIT: A system for detecting insiders who violate need-to-know
    • Kruegel, C., Lippmann, R., Clark, A. (eds.) LNCS Springer, Heidelberg
    • Maloof, M., Stephens, G.D.: ELICIT: A System for Detecting Insiders Who Violate Need-to-know. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 146-166. Springer, Heidelberg (2007)
    • (2007) RAID 2007 , vol.4637 , pp. 146-166
    • Maloof, M.1    Stephens, G.D.2
  • 18
    • 84885894032 scopus 로고    scopus 로고
    • Orbiscom, http://www.orbiscom.com/
  • 22
    • 84944727480 scopus 로고    scopus 로고
    • Honeypots: Catching the insider threat
    • Las Vegas December
    • Spitzner, L.: Honeypots: Catching the Insider Threat. In: Proceedings of ACSAC, Las Vegas (December 2003)
    • (2003) Proceedings of ACSAC
    • Spitzner, L.1
  • 23
    • 15944378973 scopus 로고    scopus 로고
    • Honeytokens: The other honeypot
    • Spitzner, L.: Honeytokens: The Other Honeypot. Security Focus (2003)
    • (2003) Security Focus
    • Spitzner, L.1
  • 25
    • 69249090883 scopus 로고    scopus 로고
    • Symantec Trends for July-December 2007 April
    • Symantec. Global Internet Security Threat Report, Trends for July-December 2007 (April 2008)
    • (2008) Global Internet Security Threat Report
  • 27
    • 0003201842 scopus 로고    scopus 로고
    • Markov chain model of temporal behavior for anomaly detection
    • United States Military Academy, West Point, NY, June 2000
    • Ye, N.: Markov Chain Model of Temporal Behavior for Anomaly Detection. In: Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 2000, pp. 171-174 (2000)
    • (2000) Proceedings of the 2000 IEEE Workshop on Information Assurance and Security , pp. 171-174
    • Ye, N.1
  • 28
    • 70350026813 scopus 로고    scopus 로고
    • Using deception to hide things from hackers: Processes, principles, and techniques
    • Yuill, J., Denning, D., Feer, F.: Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques. Journal of Information Warfare 5(3), 26-40 (2006)
    • (2006) Journal of Information Warfare , vol.5 , Issue.3 , pp. 26-40
    • Yuill, J.1    Denning, D.2    Feer, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.