Seneors报告 不同云平台上蜜罐的比较分析-2021年

VIP文档

ID:28464

大小:1.35 MB

页数:19页

时间:2023-01-07

金币:10

上传者:战必胜
sensors
Article
A Comparative Analysis of Honeypots on Different
Cloud Platforms
Christopher Kelly
1
, Nikolaos Pitropakis
1,2,
* , Alexios Mylonas
3,
* , Sean McKeown
1
and William J. Buchanan
1

 
Citation: Kelly, C.; Pitropakis, N.;
Mylonas, A.; McKeown, S.; Buchanan,
W.J. A Comparative Analysis of
Honeypots on Different Cloud
Platforms. Sensors 2021, 21, 2433.
https://doi.org/10.3390/s21072433
Academic Editor: Yuh-Shyan Chen
Received: 22 January 2021
Accepted: 26 March 2021
Published: 1 April 2021
Publishers Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2021 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
1
School of Computing Edinburgh Napier University, Edinburgh EH10 5DT, UK;
40204337@live.napier.ac.uk (C.K.); S.McKeown@napier.ac.uk (S.M.); B.Buchanan@napier.ac.uk (W.J.B.)
2
Eight Bells LTD, Nicosia 2002, Cyprus
3
Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK
* Correspondence: nikolaos.pitropakis@8bellsresearch.com or n.pitropakis@napier.ac.uk (N.P.);
a.mylonas@herts.ac.uk (A.M.)
Abstract:
In 2019, the majority of companies used at least one cloud computing service and it is
expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and
operational advantages of moving IT infrastructure to specialised cloud providers are clearly com-
pelling. However, with such volumes of private and personal data being stored in cloud computing
infrastructures, security concerns have risen. Motivated to monitor and analyze adversarial activities,
we deploy multiple honeypots on the popular cloud providers, namely Amazon Web Services (AWS),
Google Cloud Platform (GCP) and Microsoft Azure, and operate them in multiple regions. Logs were
collected over a period of three weeks in May 2020 and then comparatively analysed, evaluated and
visualised. Our work revealed heterogeneous attackers’ activity on each cloud provider, both when
one considers the volume and origin of attacks, as well as the targeted services and vulnerabilities.
Our results highlight the attempt of threat actors to abuse popular services, which were widely used
during the COVID-19 pandemic for remote working, such as remote desktop sharing. Furthermore,
the attacks seem to exit not only from countries that are commonly found to be the source of attacks,
such as China, Russia and the United States, but also from uncommon ones such as Vietnam, India
and Venezuela. Our results provide insights on the adversarial activity during our experiments,
which can be used to inform the Situational Awareness operations of an organisation.
Keywords: cloud computing; cybersecurity; honeypot; Google Cloud; AWS; Microsoft Azure
1. Introduction
It is estimated that one in four businesses will run their applications solely on the
cloud within a year [
1
]. This involves moving all their IT infrastructure to cloud-based
providers to utilise either a private and/or public cloud structure. As cloud providers’ IP
address subnets are public knowledge, this has opened channels for attackers to deploy
mass scanners to automate attacks and take advantage of poorly configured services and
protocols that are deployed in cloud instances.
In the current threat landscape, threat actors are active constantly across the world,
attempting to exploit new and existing vulnerabilities, which often could be decades old.
Such an incident happened recently, where yet another large-scale breach was witnessed
with Capital One’s customers data being exposed [
2
]. A misconfigured Amazon Web
Services (AWS) instance allowed the exposure of hundreds of thousands of customers
details, including bank account and social security numbers. It is therefore necessary to
learn and investigate how cyber criminals scan and interact with systems that are accessible
publicly. To understand such activity honeypots are often deployed, which can emulate
a vast range of different services across a system and network to lure potential attackers
into initiating interaction. The results gathered from honeypots can be extremely useful
Sensors 2021, 21, 2433. https://doi.org/10.3390/s21072433 https://www.mdpi.com/journal/sensors
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭