The disaggregation of monolithic applications in containerized microservices inevitably weaken their security posture. In this context, leveraging the cloning feature of containerized environments, we propose Decepto, a software platform that integrates a high-interaction cyber deception mechanism within cloud-native applications using Kubernetes (K8s). In particular, our deception solution automatically generates decoys as clones of production microservices and deploys them to look like legitimate microservices. Attackers that unknowingly interact with such deceptive artifacts are reliably detected and monitored. In this work, we first present Decepto technical implementation, then we demonstrate its functionalities and related computational performance overhead emulating a practical attack scenario on a real K8s cluster.
Demo: Cloud-native Cyber Deception with Decepto / Santoro, Daniele; Zambianco, Marco; Facchinetti, Claudio; Siracusa, Domenico. - (2024), pp. 1-3. (Intervento presentato al convegno 29th IEEE Symposium on Computers and Communications, ISCC 2024 tenutosi a Paris nel 2024) [10.1109/iscc61673.2024.10733585].
Demo: Cloud-native Cyber Deception with Decepto
Siracusa, Domenico
2024-01-01
Abstract
The disaggregation of monolithic applications in containerized microservices inevitably weaken their security posture. In this context, leveraging the cloning feature of containerized environments, we propose Decepto, a software platform that integrates a high-interaction cyber deception mechanism within cloud-native applications using Kubernetes (K8s). In particular, our deception solution automatically generates decoys as clones of production microservices and deploys them to look like legitimate microservices. Attackers that unknowingly interact with such deceptive artifacts are reliably detected and monitored. In this work, we first present Decepto technical implementation, then we demonstrate its functionalities and related computational performance overhead emulating a practical attack scenario on a real K8s cluster.File | Dimensione | Formato | |
---|---|---|---|
santoroCloudnativeCyberDeception2024[AAM].pdf
embargo fino al 31/10/2026
Descrizione: Accepted Manuscript
Tipologia:
Post-print referato (Refereed author’s manuscript)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
246.67 kB
Formato
Adobe PDF
|
246.67 kB | Adobe PDF | Visualizza/Apri |
santoroCloudnativeCyberDeception2024[VoR].pdf
Solo gestori archivio
Tipologia:
Versione editoriale (Publisher’s layout)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
291.49 kB
Formato
Adobe PDF
|
291.49 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione