Generation and Distribution of Decoy Document System

被引:3
作者
Wang, Lei [1 ]
Li, Chenglong [2 ]
Tan, QingFeng [1 ]
Wang, XueBin [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Coordinat Ctr China CNCERT CC, Natl Comp Network Emergency Response Tech Team, Beijing, Peoples R China
[3] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
来源
TRUSTWORTHY COMPUTING AND SERVICES | 2014年 / 426卷
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Document generating; Document distributing; Document tracking and locating; Decoy document;
D O I
10.1007/978-3-662-43908-1_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently a lot of the document data are leaked. We designed and implemented a decoy document system, which made up for the lack of traditional protection technology. We researched the document content generating technology, the document distributing technology and the document tracking and locating technology. We tested the system on networks, and our technology was proved to be effective.
引用
收藏
页码:123 / 129
页数:7
相关论文
共 11 条
  • [1] Bercovitch M., 2011, INTELL SECUR INF, P131
  • [2] Bowen B. M., 2010, P 3 ACM C WIR NETW S, P8186
  • [3] Bowen B.M., 2009, MONITORING TECHNOLOG
  • [4] Bowen BM, 2009, L N INST COMP SCI SO, V19, P51
  • [5] Mendo T., 2009, THESIS
  • [6] Oard D.W., 1996, TECHNICAL REPORT
  • [7] Salem M. B., 2011, C DET INTR MALW VULN
  • [8] Spitzner L., 2003, HONEYPOTS CATCHING I
  • [9] Voris J, 2012, WORKSH RES INS THREA
  • [10] Whitham Ben, 2013, International Journal of Cyber-Security and Digital Forensics, V2, P103