Reversing the asymmetry in data exfiltration

09/12/2018
by   David Skillicorn, et al.
0

Preventing data exfiltration from computer systems typically depends on perimeter defences, but these are becoming increasingly fragile. Instead we suggest an approach in which each at-risk document is supplemented by many fake versions of itself. An attacker must either exfiltrate all of them; or try to discover which is the real one while operating within the penetrated system, and both are difficult. Creating and maintaining many fakes is relatively inexpensive, so the advantage that typically accrues to an attacker now lies with the defender. We show that algorithmically generated fake documents are reasonably difficult to detect using algorithmic analytics.

READ FULL TEXT
research
03/05/2020

Fake Generated Painting Detection via Frequency Analysis

With the development of deep neural networks, digital fake paintings can...
research
03/28/2022

Attacker Attribution of Audio Deepfakes

Deepfakes are synthetically generated media often devised with malicious...
research
03/06/2019

Attack Graph Obfuscation

Before executing an attack, adversaries usually explore the victim's net...
research
10/18/2022

Controllable Fake Document Infilling for Cyber Deception

Recent works in cyber deception study how to deter malicious intrusion b...
research
07/15/2019

Detecting and Simulating Artifacts in GAN Fake Images

To detect GAN generated images, conventional supervised machine learning...
research
03/27/2017

Adversarial Source Identification Game with Corrupted Training

We study a variant of the source identification game with training data ...

Please sign up or login with your details

Forgot password? Click here to reset