Container Orchestration Honeypot: Observing Attacks in the Wild

3Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

Containers, a mechanism to package software and its dependencies into a single artifact, have helped fuel the rapid pace of technological advancements in the last few years. However, it is not always clear what the potential security risk of moving to the cloud and container-based technologies is. In this paper, we investigate exposed container orchestration services on the Internet: how many there are, and the attacks against them.We considered three groups of container-based software: Docker, Kubernetes, and workflow tools. In a measurement study, we scanned the Internet to identify vulnerable container and container-orchestration services running on default ports. Considering the scan data, we then designed a high-interaction honeypot to reveal where attackers tend to strike and what is being done against exposed instances. The honeypot is based on container orchestration tools installed on Ubuntu servers, behind a carefully constructed gateway, and using the default ports. Our honeypot attracted attackers within minutes of launch. In total, we collected 94 days of attack data and extracted associated indicators of compromise (IOCs), which are provided to the research community to enable further insights. Our empirical study measures the risk associated with container and container orchestration systems exposed on the Internet. The assessment is performed by leveraging a novel design for a highinteraction honeypot. Using the observed data, we extract fresh insights into malicious tools, tactics, and procedures used against exposed host systems. In addition,we make available to the research community a rich dataset of unencrypted malicious traffic.

Cite

CITATION STYLE

APA

Spahn, N., Hanke, N., Holz, T., Kruegel, C., & Vigna, G. (2023). Container Orchestration Honeypot: Observing Attacks in the Wild. In ACM International Conference Proceeding Series (pp. 381–396). Association for Computing Machinery. https://doi.org/10.1145/3607199.3607205

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free