Containerized cloud-based honeypot deception for tracking attackers

被引:9
|
作者
Priya, V. S. Devi [1 ,2 ,3 ]
Chakkaravarthy, S. Sibi [1 ,2 ,3 ]
机构
[1] VIT AP Univ, Ctr Excellence Artificial Intelligence & Robot AIR, Amaravati 522237, Andhra Pradesh, India
[2] VIT AP Univ, Ctr Excellence, Cyber Secur, Amaravati 522237, Andhra Pradesh, India
[3] VIT AP Univ, Sch Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
关键词
INTRUSION DETECTION; FRAMEWORK; INTERNET; THINGS;
D O I
10.1038/s41598-023-28613-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more developing technologies, such as IoT, Industrial Automation, CPS, Digital Twins, etc are digitally connected. A honey trap aids in identifying malicious packets easily as, after a few rapid calibrations to eliminate false positives. Besides analyzing and reporting particular invasion patterns or toolkits exploited, it also assists in preventing access to actual devices by simulating the genuine systems and applications functioning in the network thus delaying as well as baffling the invader. In order to analyze and evaluate the hackers' behavior, an ensemble of research honeypot detectors has been deployed in our work. This paper delivers a robust outline of the deployment of containerized honeypot deployment, as a direct consequence, these are portable, durable, and simple to deploy and administer. The instrumented approach was monitored and generated countless data points on which significant judgments about the malevolent users' activities and purpose could be inferred.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Cloud-Based CAPTCHA Service
    Shumilov, Artem
    Philippovich, Andrey
    2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 115 - 118
  • [32] Reliability of Cloud-Based Applications
    Hong Thai Tran
    Feuerlicht, George
    SERVICE-ORIENTED AND CLOUD COMPUTING, (ESOCC 2016), 2016, 9846 : 235 - 247
  • [33] The Modern Cloud-Based Platform
    Tilkov, Stefan
    IEEE SOFTWARE, 2015, 32 (02) : 112 - 115
  • [34] Cloud-based computing in the forecast
    Combs, L., 1600, American Water Works Association (105):
  • [35] Cloud-Based Application Whitelisting
    Hizver, Jennia
    Chiueh, Tzi-cker
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 636 - 643
  • [36] Cloud-based Sensor Services
    不详
    ATP EDITION, 2016, (7-8): : 23 - 23
  • [37] Cloud-based Notification Distribution
    Astrova, Irina
    Koschel, Arne
    Kleiner, Carsten
    Nitz, Stefan
    2ND ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS MOBILESOFT 2015, 2015, : 154 - 155
  • [38] Cloud-based computing in the forecast
    Combs, Larry
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2013, 105 (09): : 60 - 63
  • [39] The Future of Cloud-Based Entertainment
    Hughes, Kilroy
    PROCEEDINGS OF THE IEEE, 2012, 100 : 1391 - 1394
  • [40] Cloud-based RFID Authentication
    Xie, Wei
    Xie, Lei
    Zhang, Chen
    Zhang, Quan
    Tang, Chaojing
    2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 168 - 175