Title :
Honeyfiles: deceptive files for intrusion detection
Author :
Yuill, Jim ; Zappe, Mike ; Denning, Dorothy ; Feer, Fred
Author_Institution :
Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA
Abstract :
This paper introduces an intrusion-detection device named honeyfiles. Honeyfiles are bait files intended for hackers to access. The files reside on a file server, and the server sends an alarm when a honey file is accessed. For example, a honeyfile named "passwords.txt" would be enticing to most hackers. The file server\´s end-users create honeyfiles, and the end-users receive the honeyfile\´s alarms. Honeyfiles can increase a network\´s internal security without adversely affecting normal operations. The honeyfile system was tested by deploying it on a honeynet, where hackers\´ use of honeyfiles was observed. The use of honeynets to test a computer security device is also discussed. This form of testing is a useful way of finding the faulty and overlooked assumptions made by the device\´s developers.
Keywords :
file servers; security of data; computer security; deceptive files; file server; honeyfiles; intrusion detection; Computer hacking; Computer security; File servers; Intrusion detection; Network servers; Prototypes; Read only memory; Standards organizations; System testing; Workstations;
Conference_Titel :
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN :
0-7803-8572-1
DOI :
10.1109/IAW.2004.1437806