2012 Articles
Lost in Translation: Improving Decoy Documents via Automated Translation
Detecting insider attacks continues to prove to be one of the most difficult challenges in securing sensitive data. Decoy information and documents represent a promising approach to detecting malicious masqueraders, however, false positives can interfere with legitimate work and take up user time. We propose generating foreign language decoy documents that are sprinkled with untranslatable enticing proper nouns such as company names, hot topics, or apparent login information. Our goal is for this type of decoy to serve three main purposes. First, using a language that is not used in normal business practice gives real users a clear signal that the document is fake, so they waste less time examining it. Second, an attacker, if enticed, will need to exfiltrate the document's contents in order to translate it, providing a cleaner signal of malicious activity. Third, we consume significant adversarial resources as they must still read the document and decide if it contains valuable information, which is made more difficult as it will be somewhat scrambled through translation. In this paper, we expand upon the rationale behind using foreign language decoys. We present a preliminary evaluation which shows how they significantly increase the cost to attackers in terms of the amount of time that it takes to determine if a document is real and potentially contains valuable information or is entirely bogus, confounding their goal of exfiltrating important sensitive information.
Subjects
Files
- SPW.2012.20.pdf application/pdf 123 KB Download File
Also Published In
- Title
- IEEE CS Security and Privacy Workshops: SPW 2012: Proceedings: 24-25 May 2012, San Francisco, California, USA
- Publisher
- IEEE
- DOI
- https://doi.org/10.1109/SPW.2012.20
More About This Work
- Academic Units
- Computer Science
- Published Here
- October 11, 2012