Containerized cloud-based honeypot deception for tracking attackers

被引:9
|
作者
Priya, V. S. Devi [1 ,2 ,3 ]
Chakkaravarthy, S. Sibi [1 ,2 ,3 ]
机构
[1] VIT AP Univ, Ctr Excellence Artificial Intelligence & Robot AIR, Amaravati 522237, Andhra Pradesh, India
[2] VIT AP Univ, Ctr Excellence, Cyber Secur, Amaravati 522237, Andhra Pradesh, India
[3] VIT AP Univ, Sch Comp Sci & Engn, Amaravati 522237, Andhra Pradesh, India
关键词
INTRUSION DETECTION; FRAMEWORK; INTERNET; THINGS;
D O I
10.1038/s41598-023-28613-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more developing technologies, such as IoT, Industrial Automation, CPS, Digital Twins, etc are digitally connected. A honey trap aids in identifying malicious packets easily as, after a few rapid calibrations to eliminate false positives. Besides analyzing and reporting particular invasion patterns or toolkits exploited, it also assists in preventing access to actual devices by simulating the genuine systems and applications functioning in the network thus delaying as well as baffling the invader. In order to analyze and evaluate the hackers' behavior, an ensemble of research honeypot detectors has been deployed in our work. This paper delivers a robust outline of the deployment of containerized honeypot deployment, as a direct consequence, these are portable, durable, and simple to deploy and administer. The instrumented approach was monitored and generated countless data points on which significant judgments about the malevolent users' activities and purpose could be inferred.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Cloud-Based Software Crowdsourcing
    Tsai, Wei-Tek
    Wu, Wenjun
    Huhns, Michael N.
    IEEE INTERNET COMPUTING, 2014, 18 (03) : 78 - 83
  • [42] A Novel Deception Defense-Based Honeypot System for Power Grid Network
    Feng, Mingjun
    Xiao, Buqiong
    Yu, Bo
    Qian, Jianguo
    Zhang, Xinxin
    Chen, Peidong
    Li, Bo
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 297 - 307
  • [43] Navigating Cloud-Based Integrations: Challenges and Decision Factors in Cloud-Based Integration Platform Selection
    Hyrynsalmi, Sonja M.
    Koskinen, Kari M.
    Rossi, Matti
    Smolander, Kari
    IEEE ACCESS, 2024, 12 : 113826 - 113841
  • [44] Developing and Implementing a Cloud-Based Software Solution for Tracking Ureteral Stents: A Pilot Study
    Tam, Christopher A.
    Newman, Mark W.
    Dauw, Casey A.
    Ghani, Khurshid R.
    Roberts, William W.
    Ambani, Sapan N.
    Hollingsworth, John M.
    JOURNAL OF ENDOUROLOGY, 2021, 35 (03) : 285 - 288
  • [45] Semantic Point Cloud-Based Adaptive Multiple Object Detection and Tracking for Autonomous Vehicles
    Kim, Soyeong
    Ha, Jinsu
    Jo, Kichun
    IEEE ACCESS, 2021, 9 : 157550 - 157562
  • [46] CONTAINERIZED CLOUD BASED TECHNOLOGY FOR SMART CITIES APPLICATIONS
    Chesov, R. G.
    Solovyev, V. N.
    Khlamov, M. A.
    Prokofyev, A. V.
    JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES, 2016, 8 : 2638 - 2646
  • [47] Queueing Model based Dynamic Scalability for Containerized Cloud
    Srivastava, Ankita
    Kumar, Narander
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (01) : 465 - 472
  • [48] Cloud-Based Healthcare Portal in Virtual Private Cloud
    Mahaveerakannan, R.
    Dhas, C. Suresh Gnana
    Devi, R. Rama
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1071 - 1080
  • [49] Cloud-based integration; [Cloud-basierte Integration]
    Ebert N.
    Schlatter U.
    Informatik-Spektrum, 2017, 40 (3) : 278 - 282
  • [50] Thinking in the Cloud: The Cognitive Incorporation of Cloud-Based Technology
    Clowes R.
    Philosophy & Technology, 2015, 28 (2) : 261 - 296