2023
DOI: 10.1038/s41598-023-28613-0
|View full text |Cite
|
Sign up to set email alerts
|

Containerized cloud-based honeypot deception for tracking attackers

Abstract: Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more developing technologies, such as IoT, Industrial Automation, CPS, Digital Twins, etc are digitally connected. A honey trap aids in identifying malicious packets easily as, after a few rapid calibrations to eliminate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…This kind of technique is limited to web‐based attacks, and may not address other attack vectors. Deceptive Behavior Analysis: It refers to a set of techniques that are employed to monitor and analyze suspicious behavior patterns with the aim of detecting attacks and malicious activities. Deceptive Virtual Machines (DVMs), 22 Deceptive file systems, 18 Deceptive password vaults 23 and Deep‐dig 24 are a few techniques in this category. DVMs imitate authentic systems or services present in a network producing a perception of legitimate resources.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…This kind of technique is limited to web‐based attacks, and may not address other attack vectors. Deceptive Behavior Analysis: It refers to a set of techniques that are employed to monitor and analyze suspicious behavior patterns with the aim of detecting attacks and malicious activities. Deceptive Virtual Machines (DVMs), 22 Deceptive file systems, 18 Deceptive password vaults 23 and Deep‐dig 24 are a few techniques in this category. DVMs imitate authentic systems or services present in a network producing a perception of legitimate resources.…”
Section: Related Workmentioning
confidence: 99%
“…Decoy data and systems, including Canarytokens, 14 HoneyToken 15 Honeypots, 16 HoneyDB, 17 and Docuphish (decoy file systems). 18 Their functionality is restricted to identifying unauthorized access to designated decoy resources or monitoring interactions. They are also limited by their dependence on inputs from multiple source leading to concerns regarding the precision or authenticity of the data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The rapid advancement of network-based technologies and their applications has resulted in many risks and illegal activities. Cyber scamming, crypto trojans, and phishing are examples of frequent yet dangerous cyber assaults that deliberately seek out and exploit the user's sensitive data [1]. Innovation in security mechanisms is required to address these issues.…”
Section: Introductionmentioning
confidence: 99%