Containerized cloud-based honeypot deception for tracking attackers

被引:9
|
作者
Priya, V. S. Devi [1 ,2 ,3 ]
Chakkaravarthy, S. Sibi [1 ,2 ,3 ]
机构
[1] VIT AP Univ, Ctr Excellence Artificial Intelligence & Robot AIR, Amaravati 522237, Andhra Pradesh, India
[2] VIT AP Univ, Ctr Excellence, Cyber Secur, Amaravati 522237, Andhra Pradesh, India
[3] VIT AP Univ, Sch Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
关键词
INTRUSION DETECTION; FRAMEWORK; INTERNET; THINGS;
D O I
10.1038/s41598-023-28613-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more developing technologies, such as IoT, Industrial Automation, CPS, Digital Twins, etc are digitally connected. A honey trap aids in identifying malicious packets easily as, after a few rapid calibrations to eliminate false positives. Besides analyzing and reporting particular invasion patterns or toolkits exploited, it also assists in preventing access to actual devices by simulating the genuine systems and applications functioning in the network thus delaying as well as baffling the invader. In order to analyze and evaluate the hackers' behavior, an ensemble of research honeypot detectors has been deployed in our work. This paper delivers a robust outline of the deployment of containerized honeypot deployment, as a direct consequence, these are portable, durable, and simple to deploy and administer. The instrumented approach was monitored and generated countless data points on which significant judgments about the malevolent users' activities and purpose could be inferred.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] A cloud-based forensics tracking scheme for online social network clients
    Lin, Feng-Yu
    Huang, Chien-Cheng
    Chang, Pei-Ying
    FORENSIC SCIENCE INTERNATIONAL, 2015, 255 : 64 - 71
  • [22] Flow based containerized honeypot approach for network traffic analysis: An empirical study
    Sethuraman, Sibi Chakkaravarthy
    Jadapalli, Tharshith Goud
    Sudhakaran, Devi Priya Vimala
    Mohanty, Saraju P.
    COMPUTER SCIENCE REVIEW, 2023, 50
  • [23] Cloud-Based BEMS
    Ponoum, Ratcharit
    Cooperman, Alissa
    Brodrick, James
    ASHRAE JOURNAL, 2012, 54 (11) : 68 - 70
  • [24] Cloud-based HPC
    Geller, Tom
    COMMUNICATIONS OF THE ACM, 2012, 55 (03) : 21 - 21
  • [25] Cloud-Based Energy Efficient Scheme for Sigfox Monarch as Asset Tracking Service
    Mineo, Andrea
    Palesi, Maurizio
    Patti, Davide
    Catania, Vincenzo
    2020 INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2020), 2020, : 7 - 12
  • [26] Cloud-based bug tracking software defects analysis using deep learning
    Tao Hai
    Jincheng Zhou
    Ning Li
    Sanjiv Kumar Jain
    Shweta Agrawal
    Imed Ben Dhaou
    Journal of Cloud Computing, 11
  • [27] CLOUD-BASED TEMPERATURE MONITORING MECHANISM FOR COVID-19 PANDEMIC TRACKING
    Lun, Loo Tung
    Chin, Tam Swee
    Ishak, Mohamad Khairi
    Asaari, Mohd Shahrimie Mohd
    JURNAL TEKNOLOGI-SCIENCES & ENGINEERING, 2022, 84 (01): : 241 - 247
  • [28] Secure and Fast Aggregation of Financial Data in Cloud-Based Expense Tracking Applications
    Juan Camilo Corena
    Tomoaki Ohtsuki
    Journal of Network and Systems Management, 2012, 20 : 534 - 560
  • [29] Secure and Fast Aggregation of Financial Data in Cloud-Based Expense Tracking Applications
    Corena, Juan Camilo
    Ohtsuki, Tomoaki
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2012, 20 (04) : 534 - 560
  • [30] Cloud-based bug tracking software defects analysis using deep learning
    Hai, Tao
    Zhou, Jincheng
    Li, Ning
    Jain, Sanjiv Kumar
    Agrawal, Shweta
    Ben Dhaou, Imed
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):