Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
ACM Transactions on Information and System Security (TISSEC)
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks
FAC '09 Proceedings of the 5th International Conference on Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience: Held as Part of HCI International 2009
Implementing PII honeytokens to mitigate against thethreat of Malicous insiders
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Architecture for data collection in database intrusion detection systems
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
An insider threat prediction model
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Enhanced insider threat detection model that increases data availability
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Decoy document deployment for effective masquerade attack detection
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Predicting and preventing insider threat in relational database systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Mitigation of malicious modifications by insiders in databases
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Detecting traffic snooping in tor using decoys
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
ShadowNet: an active defense infrastructure for insider cyber attack prevention
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Bot detection evasion: a case study on local-host alert correlation bot detection methods
Security and Communication Networks
Tackling Insider Threat in Cloud Relational Databases
UCC '12 Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing
Information Systems Frontiers
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
Engineering Security Agreements Against External Insider Threat
Information Resources Management Journal
A system for generating and injecting indistinguishable network decoys
Journal of Computer Security
Hi-index | 0.00 |
In the past several years there has been extensiveresearch into honeypot technologies, primarily fordetection and information gathering against externalthreats. However, little research has been done for one ofthe most dangerous threats, the advance insider, thetrusted individual who knows your internal organization.These individuals are not after your systems, they areafter your information. This presentation discusses howhoneypot technologies can be used to detect, identify, andgather information on these specific threats.