Home

Lost in Translation: Improving Decoy Documents via Automated Translation

Jonathan A. Voris; Nathaniel Gordon Boggs; Salvatore Stolfo

Title:
Lost in Translation: Improving Decoy Documents via Automated Translation
Author(s):
Voris, Jonathan A.
Boggs, Nathaniel Gordon
Stolfo, Salvatore
Date:
Type:
Articles
Department:
Computer Science
Permanent URL:
Book/Journal Title:
IEEE CS Security and Privacy Workshops: SPW 2012: Proceedings: 24-25 May 2012, San Francisco, California, USA
Publisher:
IEEE
Publisher Location:
Los Alamitos, Calif.
Abstract:
Detecting insider attacks continues to prove to be one of the most difficult challenges in securing sensitive data. Decoy information and documents represent a promising approach to detecting malicious masqueraders, however, false positives can interfere with legitimate work and take up user time. We propose generating foreign language decoy documents that are sprinkled with untranslatable enticing proper nouns such as company names, hot topics, or apparent login information. Our goal is for this type of decoy to serve three main purposes. First, using a language that is not used in normal business practice gives real users a clear signal that the document is fake, so they waste less time examining it. Second, an attacker, if enticed, will need to exfiltrate the document's contents in order to translate it, providing a cleaner signal of malicious activity. Third, we consume significant adversarial resources as they must still read the document and decide if it contains valuable information, which is made more difficult as it will be somewhat scrambled through translation. In this paper, we expand upon the rationale behind using foreign language decoys. We present a preliminary evaluation which shows how they significantly increase the cost to attackers in terms of the amount of time that it takes to determine if a document is real and potentially contains valuable information or is entirely bogus, confounding their goal of exfiltrating important sensitive information.
Subject(s):
Computer science
Publisher DOI:
http://dx.doi.org/10.1109/SPW.2012.20
Item views:
97
Metadata:
text | xml

In Partnership with the Center for Digital Research and Scholarship at Columbia University Libraries/Information Services | Terms of Use