Abstract
Currently a lot of the document data are leaked. We designed and implemented a decoy document system, which made up for the lack of traditional protection technology. We researched the document content generating technology, the document distributing technology and the document tracking and locating technology. We tested the system on networks, and our technology was proved to be effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
http://en.wikipedia.org/wiki/United_States_diplomatic_cables_leak#cite_note-1
Oard, D.W., Marchionini, G.: A conceptual framework for text filtering. Technical report, University of Maryland, Maryland (1996)
Bowen, B.M., et al.: Monitoring technologies for mitigating insider threats. Columbia University, Department of Computer Science, 28 Aug. 2009. http://ids.cs.columbia.edu/sites/default/files/insider-bookchapter.pdf
Bowen, B.M., Hershkop, S., Keromytis, A.D., Stolfo, S.J.: Baiting Inside Attackers Using Decoy Documents. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 51–70. Springer, Heidelberg (2009)
Spitzner, L.: Honeypots: catching the insider threat. ACSAC, December 2003
Yuill, J., Zappe, M., Denning, D., Feer, F.: Honeyfiles: deceptive files for intru-sion detection. In: Proceedings of the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 116–122, June 2004
Whitham, B.: Automating the generation of fake documents to detect network intruders. Int. J. Cyber-Security Digit. Forensics 2, 103–118 (2013)
Salem, M. B., Stolfo, S.: Decoy document deployment for effective masquerade attack detection. In: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (2011)
Voris, J., Boggs, N., Stolfo, S.: Lost in translation: improving decoy documents via automated translation. In: Workshop on Research for Insider Threat (2012)
Bowen, B. M., Kemerlis, V. P., Prabhu, P., Keromytis, A. D., Stolfo, S. J.: Automating the injection of believable decoys to detect snooping. In: Proceedings of the Third ACM Conference on Wireless Network Security, p. 8186 (2010)
Mendo, T.: Document flow tracking within corporate networks, Master’s thesis, Carnegie Mellon University/Faculdade de Ciências da Universidade de Lisboa, November 2009
Bercovitch, M., Renford, M., Hasson, L., Shabtai, A., Rokach, L., Elovici, Y.: HoneyGen: an automated honeytokens generator. Intell. Secur. Inf. 131–136 (2011)
Acknowledgements
These and the Reference headings are in bold but have no numbers. Text below continues as normal. This work is supported by National Natural Science Foundation of China (Grant No. 61272500), National High Technology Research and Development Program of China, 863 Program (Grant No. 2011AA01A103 and 2012AA013101), National Key Technology R&D Program (Grant No. 2012BAH37B04), and Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA06030200).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, L., Li, C., Tan, Q., Wang, X. (2014). Generation and Distribution of Decoy Document System. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)