Log In Sign Up

Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

by   Daniel Reti, et al.

In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualization gained popularity for application deployment. This paper investigates the possibilities of container-based honeypots and introduces the concept of simulating container escapes as a deception technique.


page 1

page 2

page 3

page 4


The cloud technologies of learning: origin

The research goal is to investigate the evolution of the concept of util...

Application of Ontologies in Cloud Computing: The State-Of-The-Art

This paper presents a systematic survey on existing literature and semin...

The Decision Criteria Used by Large Enterprises in South Africa for the Adoption of Cloud Computing

Cloud computing is a technology that has become increasingly popular ove...

Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense

Security is one of the most relevant concerns in cloud computing. With t...

Feasibility of Supervised Machine Learning for Cloud Security

Cloud computing is gaining significant attention, however, security is t...

Secure (S)Hell: Introducing an SSH Deception Proxy Framework

Deceiving an attacker in the network security domain is a well establish...

Tails Tor and other tools for Safeguarding Online Activities

There are not many known ways to break Tor anonymity, and they require a...