Intrusion detection with honeypot keys

A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the...

Full description

Saved in:
Bibliographic Details
Main Authors Schütz, Harald, Berger, Andreas, Harris, Mark D, Ray, Kenneth D, Humphries, Russell
Format Patent
LanguageEnglish
Published 01.08.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.
Bibliography:Application Number: US202117370863