Skip to main content

Database Level Honeytoken Modules for Active DBMS Protection

  • Conference paper

Abstract

Data and information are sometimes called the “crown jewels” of an organization [3]. Modern company cannot exist without flexible, fast and secure data management system. Insuring data security is of vital importance for any company.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheswick B (1991) An Evening with Berferd in which a Cracker is Lured, Endured, and Studied. www.tracking-hackers.com/papers/berferd.pdf

    Google Scholar 

  2. Čenys A, Rainys D, Radvilavičius L, Bielko A (2004) Development of Honeypot System Emulating Functions of Database Server. Proc of the NATO “Symposium on Adaptive Defense in Unclassified Networks”. Toulouse France April 19–20 2004. www.rta.nato.int/abstracts.asp

    Google Scholar 

  3. Finnigan P (2003) Introduction to Simple Oracle Auditing, www.petefinnigan.com/

    Google Scholar 

  4. Nanda A (2003) Fine-Grained Auditing for Real-World Problems. www.oracle.com/technology/oramag/webcolumns/2003/techarticles/nanda_f ga.html

    Google Scholar 

  5. Schneier B, Wiley J (2000) Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons New York

    Google Scholar 

  6. Stoll C (1990), Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage. Pocket Books New York

    Google Scholar 

  7. Spitzner L (2002) Honeypots: Tracking Hackers. www.spitzner.net/

    Google Scholar 

  8. Spitzner L (2003) Honeypots: Definitions and Value of Honeypots. www.tracking-hackers.comlpapers/honeypots.html

    Google Scholar 

  9. Spitzner L (2003) Honeytokens: The Other Honeypot. www.securityfocus.comlinfocus/1713

    Google Scholar 

  10. Thompson N (2003) New Economy. www.nytco.coml

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science-Business Media, LLC

About this paper

Cite this paper

Čenys, A., Rainys, D., Radvilavicius, L., Goranin, N. (2006). Database Level Honeytoken Modules for Active DBMS Protection. In: Nilsson, A.G., Gustas, R., Wojtkowski, W., Wojtkowski, W.G., Wrycza, S., Zupančič, J. (eds) Advances in Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36402-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-36402-5_38

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-30834-0

  • Online ISBN: 978-0-387-36402-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics