Software-Based Decoy System for Insider Threats

Decoy technology and the use of deception are useful in securing critical computing systems by confounding and confusing adversaries with fake information. Deception leverages uncertainty forcing adversaries to expend considerable effort to differentiate realistic useful information from purposely planted false information. In this paper, the authors propose software-based decoy system that aims to deceive insiders, to detect the ex-filtration of proprietary source code. The proposed system generates believable Java source code that appear to an adversary to be entirely valuable proprietary software. Bogus software is generated iteratively using code obfuscation techniques to transform original software using various transformation methods.

Provided by: Association for Computing Machinery Topic: Software Date Added: May 2012 Format: PDF

Find By Topic