Articles with "based deception" as a keyword



Photo by arthurbizkit from unsplash

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2973700

Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works… read more here.

Keywords: access; file; based deception; file based ... See more keywords