all InfoSec news
Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models
April 26, 2024, 4:10 a.m. | Daniel Reti, Norman Becker, Tillmann Angeli, Anasuya Chattopadhyay, Daniel Schneider, Sebastian Vollmer, Hans D. Schotten
cs.CR updates on arXiv.org arxiv.org
Abstract: With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized for specific types of honeytokens, and heavily rely on suitable training datasets. To overcome these limitations, this work systematically investigates …
act addresses adoption arxiv challenge cs.cr cyber cyber security deception defense defense strategies generator honeytoken honeytokens incidents investigation key language language models large scalability security strategies work
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Principal - Cyber Risk and Assurance - Infra/Network
@ GSK | Bengaluru Luxor North Tower
Staff Security Engineer
@ Airwallex | AU - Melbourne
Chief Information Security Officer
@ Australian Payments Plus | Sydney, New South Wales, Australia
TW Test Automation Engineer (Access Control & Intrusion Systems)
@ Bosch Group | Taipei, Taiwan
Consultant infrastructure sécurité H/F
@ Hifield | Sèvres, France
SOC Analyst
@ Wix | Tel Aviv, Israel