Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,167 papers from all fields of science
Search
Sign In
Create Free Account
Honeytoken
In the field of computer security, honeytokens are honeypots that are not computer systems. Their value lies not in their use, but in their abuse. As…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Canary trap
Computer security
Honeypot (computing)
Trap street
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Ramsonware and Honeypot
Chee Keong Ng
,
Lei Pan
,
Yang Xiang
2018
Corpus ID: 170060606
Ramsonware is a malware of its kind and is growing rapidly. There is an urgency to take this matter seriously. Honeypot which…
Expand
2017
2017
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
Mitsuaki Akiyama
,
Takeshi Yagi
,
Takeo Hariu
,
Y. Kadobayashi
International Journal of Information Security
2017
Corpus ID: 254167788
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download…
Expand
2017
2017
HoneynetTrap: Analysis of insider threat detection using agent oriented PN2 simulator
Alisha Gupta
,
B. Gupta
International Conference On Smart Technologies…
2017
Corpus ID: 21669585
Insider threat is one of the major concerns for an organization that breaches the confidentiality and integrity of enterprise…
Expand
Review
2016
Review
2016
Survey of different IDS using honeytoken based techniques to mitigate cyber threats
P. Jogdand
,
Puja Padiya
International Conference on Electrical…
2016
Corpus ID: 319737
Intrusion detection system using honeypot being increasingly used technique for intrusion detection and recovery of data…
Expand
2014
2014
A Steganographic Approach to Localizing Botmasters
Julian L. Rrushi
28th International Conference on Advanced…
2014
Corpus ID: 18462561
Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we…
Expand
2013
2013
Active Credential Leakage for Observing Web-Based Attack Cycle
Mitsuaki Akiyama
,
Takeshi Yagi
,
Kazufumi Aoki
,
Takeo Hariu
,
Y. Kadobayashi
International Symposium on Recent Advances in…
2013
Corpus ID: 39097577
A user who accesses a compromised website is usually redirected to an adversary's website and forced to download malware…
Expand
2008
2008
Détection de fraude utilisant le suivi de données « honeytoken »
Sean K. Catlett
,
Xu He
2008
Corpus ID: 165752364
La presente invention concerne de fausses donnees « honeytoken » qui sont generees, stockees et diffusees a une organisation…
Expand
2007
2007
SpyCon: Emulating User Activities to Detect Evasive Spyware
M. Chandrasekaran
,
V. Sankaranarayanan
,
S. Upadhyaya
IEEE International Performance, Computing, and…
2007
Corpus ID: 510784
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies…
Expand
2006
2006
Database Level Honeytoken Modules for Active DBMS Protection
A. Čenys
,
Darius Rainys
,
Lukas Radvilavicius
,
N. Goranin
2006
Corpus ID: 60695641
Data and information are sometimes called the “crown jewels” of an organization [3]. Modern company cannot exist without flexible…
Expand
2003
2003
White Paper : “ Honeypot , Honeynet , Honeytoken : Terminological issues 1 ”
F. Pouget
,
M. Dacier
,
Hervé Debar
2003
Corpus ID: 21863889
Many different terms, definitions and classifications for honeypots, honeynets and other honeytokens have been proposed by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE