Open Access
Aspectising honeytokens to contain the insider threat
Author(s) -
Padayachee Keshnee
Publication year - 2015
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2014.0063
Subject(s) - insider threat , insider , aspectj , software deployment , computer science , aspect oriented programming , computer security , software engineering , programming language , software , political science , law
The aim of this study is to provide a generic implementation strategy for honeytokens deployed within a database management system that leverages the aspect‐oriented paradigm to contain the insider threat. This approach is tested by developing a proof‐of‐concept prototype in an aspect‐oriented language, namely AspectJ. This study also reflects on design and implementation challenges involved in the deployment of honeytokens to contain the insider threat. Consequently, aspect‐orientation is proposed as a means to resolve some of these challenges.