Preserving Obliviousness Characteristic of Honeypot database

Shyam K. Gupta, Anand Gupta, Renu Damor, Vikram Goyal, Sangeeta Sabharwal
2006 International Conference on Management of Data  
The concept of honeypot has been explored by many researchers in the network domain. We have proposed database honeypots and have given its architecture [5] . The use of such a honeypot is to identify potential attackers before an attack actually takes place. The privacy policy as advocated in [6] is expected to deny the access to a suspected user. However, one would like to identify the suspected user who might have entered into the system under some disguise (masquerading). We propose that a
more » ... uspected user be provided with synthetic information (in place of denial of access) with the help of which the administrator could confirm the suspicion. In this paper, we give certain characteristics of such a honeypot namely, luring, determination of suspicion and transparency to the user and give techniques for it being oblivious to the user.
dblp:conf/comad/GuptaGDGS06 fatcat:heyclpceafecnkodat6dh7zdlm