IIIT-Delhi Institutional Repository

Honeypots in containerised environments

Show simple item record

dc.contributor.author Arora, Mehul
dc.contributor.author Chakravarty, Sambuddho (Advisor)
dc.date.accessioned 2024-05-08T13:14:55Z
dc.date.available 2024-05-08T13:14:55Z
dc.date.issued 2023-11-29
dc.identifier.uri http://repository.iiitd.edu.in/xmlui/handle/123456789/1411
dc.description.abstract Containers have gained popularity for their efficiency, allowing developers to package and deploy applications seamlessly, thus replacing VMs in the modern-day deployment scenario and becoming a strong base for cloud computation. However, this surge has attracted malicious actors, exemplified by frequent cases of misconfigurations and vulnerabilities. This problem has grown with modern adversaries targeting Container Infrastructure by exploiting escapevulnerabilities, that allow them to gain access to the host system. This paper provides an indepth analysis of container security, and looks at the approach of using containerised honeypots to detect and study such attacks as a potential solution. IN my initial study, I have explored the use of tools like Wireshark and Procmon in obtaining in-depth information about container events from the host system, and did a preliminary study of existing Container Security tools such as Trivy. Initial results reveal that while data can be extensively studied from the host for containers, with instances where running simple malware can also lead to ProcMon registering 180k events in a five minute timespan, challenges in correlating data from monitoring tools with malware runtime exist profoundly. Thus, we aim to further look at methods for dynamic data analysis, study artefacts for building honeypots, and look at automation for scalable deployment of such honeypots in the future. en_US
dc.language.iso en_US en_US
dc.publisher IIIT-Delhi en_US
dc.subject containers en_US
dc.subject honeypots en_US
dc.subject Linux containers en_US
dc.subject Docker en_US
dc.subject detection artifacts en_US
dc.subject malware detection en_US
dc.subject obfuscation techniques en_US
dc.title Honeypots in containerised environments en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


Advanced Search

Browse

My Account