CANARYTOKENS: AN OLD CONCEPT FOR A NEW WORLD

Authors: Gionathan Armando Reale, Benjamin Zinc Loft
Affiliation: Hovmark Data ApS, Cyber Security Department

Category:

Keywords: cyber, security, intrusion, detection, theft, protection, attacks
ABSTRACT. Cyber attacks are becoming more common, and the evolving nature of these attacks call for novel solutions to detect and prevent intrusion that costs businesses dearly each year. This article explores the concepts and limitations of Canarytokens, a honeytoken based software abstracted from coal miners’ use of birds as early warning systems to detect toxic gas, a practice established over a hundred years ago

References:

[1].Tarek Sobh. Innovations and Advances in Computer Sciences and Engineering: Springer Netherlands; 2010
[2].A. Shabtai, M. Bercovitch, L. Rokach, Y. Gal, Y. Elovici, E. Shmueli, "Behavioral study of users when interacting with active honeytokens", ACM Trans. Inf. Syst. Secur., vol. 18, no. 3, Feb. 2016
[3].Canarytokens. 2019
[4].Thinkst Applied Research Blog. Canarytokens.org - Quick, Free, Detection for the Masses . Sept 2015
[5].Github. Thinkst/canarytokens issue 37. March 2019
[6].Github. Thinkst/canarytokens issue 36. March 2019
[7].Github. Thinkst/canarytokens issue 35. March 2019
[8].Exploit-DB. 46589. March 2019
[9].YouTube. Canarytokens Detection Bypass. March 2019