Containerized cloud-based honeypot deception for tracking attackers

被引:9
|
作者
Priya, V. S. Devi [1 ,2 ,3 ]
Chakkaravarthy, S. Sibi [1 ,2 ,3 ]
机构
[1] VIT AP Univ, Ctr Excellence Artificial Intelligence & Robot AIR, Amaravati 522237, Andhra Pradesh, India
[2] VIT AP Univ, Ctr Excellence, Cyber Secur, Amaravati 522237, Andhra Pradesh, India
[3] VIT AP Univ, Sch Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
关键词
INTRUSION DETECTION; FRAMEWORK; INTERNET; THINGS;
D O I
10.1038/s41598-023-28613-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more developing technologies, such as IoT, Industrial Automation, CPS, Digital Twins, etc are digitally connected. A honey trap aids in identifying malicious packets easily as, after a few rapid calibrations to eliminate false positives. Besides analyzing and reporting particular invasion patterns or toolkits exploited, it also assists in preventing access to actual devices by simulating the genuine systems and applications functioning in the network thus delaying as well as baffling the invader. In order to analyze and evaluate the hackers' behavior, an ensemble of research honeypot detectors has been deployed in our work. This paper delivers a robust outline of the deployment of containerized honeypot deployment, as a direct consequence, these are portable, durable, and simple to deploy and administer. The instrumented approach was monitored and generated countless data points on which significant judgments about the malevolent users' activities and purpose could be inferred.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Containerized cloud-based honeypot deception for tracking attackers
    V. S. Devi Priya
    S. Sibi Chakkaravarthy
    Scientific Reports, 13
  • [2] Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments?
    Ivanova, Stanislava
    Moradpoor, Naghmeh
    2023 IEEE 19TH INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS, WFCS, 2023, : 217 - 220
  • [3] Dynamic Tailoring and Cloud-based Deployment of Containerized Service Middleware
    Saez, Santiago Gomez
    Andrikopoulos, Vasilios
    Sanchez, Roberto Jimenez
    Leymann, Frank
    Wettinger, Johannes
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 349 - 356
  • [4] Securing CHEESEHub: A Cloud-based, Containerized Cybersecurity Education Platform
    Lambert, Mike
    Kalyanam, Rajesh
    Kooper, Rob
    Yang, Baijian
    PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2021, PEARC 2021, 2021,
  • [5] An efficient deception architecture for cloud-based virtual networks
    Qasc, Mohammed
    Almohri, Hussain M. J.
    KUWAIT JOURNAL OF SCIENCE, 2019, 46 (03) : 40 - 52
  • [6] DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
    Zheng, Yubo
    Xu, Peng
    Wang, Wei
    Chen, Tianyang
    Susilo, Willy
    Liang, Kaitai
    Jin, Hai
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 86 - 104
  • [7] Detection and mitigation of deception attacks on cloud-based industrial control systems
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 106 - 110
  • [8] NEARBY Platform for Detecting Asteroids in Astronomical Images Using Cloud-based Containerized Applications
    Bacu, Victor
    Sabou, Adrian
    Stefanut, Teodor
    Gorgan, Dorian
    Vaduvescu, Ovidiu
    2018 IEEE 14TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2018, : 371 - 376
  • [9] A Simple Application: Cloud-Based Vehicle Tracking System
    Nag, Anindya
    Mobin, Gulfishan
    Kar, Anwesha
    Das, Ayontika
    Soubhik, Kar
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (03): : 67 - 78
  • [10] Tracking GDPR Compliance in Cloud-Based Service Delivery
    Barati, Masoud
    Rana, Omer
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (03) : 1498 - 1511