DeepAI
Log In Sign Up

Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

04/08/2021
by   Daniel Reti, et al.
0

In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualization gained popularity for application deployment. This paper investigates the possibilities of container-based honeypots and introduces the concept of simulating container escapes as a deception technique.

READ FULL TEXT

page 1

page 2

page 3

page 4

07/03/2018

The cloud technologies of learning: origin

The research goal is to investigate the evolution of the concept of util...
10/06/2016

Application of Ontologies in Cloud Computing: The State-Of-The-Art

This paper presents a systematic survey on existing literature and semin...
08/22/2021

The Decision Criteria Used by Large Enterprises in South Africa for the Adoption of Cloud Computing

Cloud computing is a technology that has become increasingly popular ove...
09/03/2019

Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense

Security is one of the most relevant concerns in cloud computing. With t...
10/23/2018

Feasibility of Supervised Machine Learning for Cloud Security

Cloud computing is gaining significant attention, however, security is t...
04/08/2021

Secure (S)Hell: Introducing an SSH Deception Proxy Framework

Deceiving an attacker in the network security domain is a well establish...
10/24/2017

Tails Tor and other tools for Safeguarding Online Activities

There are not many known ways to break Tor anonymity, and they require a...