• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于容器化云的蜜罐欺骗技术,用于追踪攻击者。

Containerized cloud-based honeypot deception for tracking attackers.

机构信息

Centre of Excellence, Artificial Intelligence and Robotics (AIR); Centre of Excellence, Cyber Security and School of Computer Science and Engineering, VIT-AP University, Amaravati, Andhra Pradesh, 522237, India.

出版信息

Sci Rep. 2023 Jan 25;13(1):1437. doi: 10.1038/s41598-023-28613-0.

DOI:10.1038/s41598-023-28613-0
PMID:36697488
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9876893/
Abstract

Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or gather and analyze machine and device log files on company infrastructure, may be challenging and time consuming. The vulnerability landscape is rapidly evolving, and it will only become worse as more and more developing technologies, such as IoT, Industrial Automation, CPS, Digital Twins, etc are digitally connected. A honey trap aids in identifying malicious packets easily as, after a few rapid calibrations to eliminate false positives. Besides analyzing and reporting particular invasion patterns or toolkits exploited, it also assists in preventing access to actual devices by simulating the genuine systems and applications functioning in the network thus delaying as well as baffling the invader. In order to analyze and evaluate the hackers' behavior, an ensemble of research honeypot detectors has been deployed in our work. This paper delivers a robust outline of the deployment of containerized honeypot deployment, as a direct consequence, these are portable, durable, and simple to deploy and administer. The instrumented approach was monitored and generated countless data points on which significant judgments about the malevolent users' activities and purpose could be inferred.

摘要

在云正常活动中发现恶意数据包,无论是使用 IDS 还是在公司基础设施上收集和分析机器和设备日志文件,都可能具有挑战性和耗时。漏洞状况正在迅速演变,随着越来越多的发展技术(如物联网、工业自动化、CPS、数字双胞胎等)实现数字化连接,情况只会变得更糟。蜜罐有助于轻松识别恶意数据包,因为在进行了几次快速校准以消除误报之后。除了分析和报告特定的入侵模式或利用的工具包外,它还通过模拟网络中实际设备上运行的真实系统和应用程序来防止访问实际设备,从而延迟和迷惑入侵者。为了分析和评估黑客的行为,我们在工作中部署了一组研究蜜罐探测器。本文提供了一个强大的容器化蜜罐部署部署概述,因此,这些是便携式的、持久的、易于部署和管理的。监测并生成了无数的关于恶意用户活动和目的的数据点,可以从中推断出关于这些数据点的重要判断。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4fa96d48aff1/41598_2023_28613_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/22197a3f617e/41598_2023_28613_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4db27455e674/41598_2023_28613_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/de848791af85/41598_2023_28613_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/9427d59f0979/41598_2023_28613_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/7fc478b58868/41598_2023_28613_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/7129bef8fd8e/41598_2023_28613_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/75f0c18e2dd3/41598_2023_28613_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4fc314dad7f0/41598_2023_28613_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4f4705c7fea0/41598_2023_28613_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/2403722bcc2b/41598_2023_28613_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/091f3185d6ea/41598_2023_28613_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4fa96d48aff1/41598_2023_28613_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/22197a3f617e/41598_2023_28613_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4db27455e674/41598_2023_28613_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/de848791af85/41598_2023_28613_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/9427d59f0979/41598_2023_28613_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/7fc478b58868/41598_2023_28613_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/7129bef8fd8e/41598_2023_28613_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/75f0c18e2dd3/41598_2023_28613_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4fc314dad7f0/41598_2023_28613_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4f4705c7fea0/41598_2023_28613_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/2403722bcc2b/41598_2023_28613_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/091f3185d6ea/41598_2023_28613_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bc5/9876893/4fa96d48aff1/41598_2023_28613_Fig12_HTML.jpg

相似文献

1
Containerized cloud-based honeypot deception for tracking attackers.基于容器化云的蜜罐欺骗技术,用于追踪攻击者。
Sci Rep. 2023 Jan 25;13(1):1437. doi: 10.1038/s41598-023-28613-0.
2
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning.基于蜜罐与机器学习的物联网智能工厂中僵尸网络攻击分类
PeerJ Comput Sci. 2021 Jan 25;7:e350. doi: 10.7717/peerj-cs.350. eCollection 2021.
3
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.交错蜜罐-框架模型与无线传感器网络的安全 MAC 策略。
Sensors (Basel). 2022 Oct 21;22(20):8046. doi: 10.3390/s22208046.
4
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
5
Design and Implementation of Fast Fault Detection in Cloud Infrastructure for Containerized IoT Services.用于容器化物联网服务的云基础设施中快速故障检测的设计与实现
Sensors (Basel). 2020 Aug 16;20(16):4592. doi: 10.3390/s20164592.
6
A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective.从信息物理系统视角对工业物联网的一项调查。
IEEE Access. 2018;6. doi: 10.1109/access.2018.2884906.
7
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.利用文件熵估计进行云服务中的有效勒索软件检测。
Sensors (Basel). 2023 Mar 10;23(6):3023. doi: 10.3390/s23063023.
8
Hornet 40: Network dataset of geographically placed honeypots.大黄蜂40:地理定位蜜罐的网络数据集。
Data Brief. 2022 Jan 5;40:107795. doi: 10.1016/j.dib.2022.107795. eCollection 2022 Feb.
9
A Comparative Analysis of Honeypots on Different Cloud Platforms.不同云平台上蜜罐的比较分析
Sensors (Basel). 2021 Apr 1;21(7):2433. doi: 10.3390/s21072433.
10
Containerized Architecture Performance Analysis for IoT Framework Based on Enhanced Fire Prevention Case Study: Rwanda.基于增强防火案例研究的物联网框架的集装箱架构性能分析:卢旺达。
Sensors (Basel). 2022 Aug 27;22(17):6462. doi: 10.3390/s22176462.

引用本文的文献

1
DDoS attack detection in intelligent transport systems using adaptive neuro-fuzzy inference system.基于自适应神经模糊推理系统的智能交通系统中的分布式拒绝服务攻击检测
Sci Rep. 2025 Jul 1;15(1):20597. doi: 10.1038/s41598-025-06719-x.

本文引用的文献

1
A Comparative Analysis of Honeypots on Different Cloud Platforms.不同云平台上蜜罐的比较分析
Sensors (Basel). 2021 Apr 1;21(7):2433. doi: 10.3390/s21072433.