In this age of digitalization, Internet services face more attacks than ever. An attacker's objective is to exploit systems and use them for malicious purposes. Such efforts are rising as vulnerable systems can be discovered and compromised through Internet-wide scanning. One known methodology besides traditional security leverages is to learn from those who attack it. A honeypot helps to collect information about an attacker by pretending to be a vulnerable target. Thus, how honeypots can contribute to a more secure infrastructure makes an interesting topic of research. This thesis will present a honeypot solution to investigate malicious activities in heiCLOUD and show that attacks have increased significantly. To detect attackers in restricted network zones at Heidelberg University, a new concept to discover leaks in the firewall will be created. Furthermore, to consider an attacker's point of view, a method for detecting honeypots at the transport level will be introduced. Lastly, a customized OpenSSH server that works as an intermediary instance will be presented to mitigate these efforts.
翻译:在数字化时代,互联网服务面临着比以往任何时候更多的攻击。攻击者的目标是利用系统,并将系统用于恶意目的。这种努力正在增加,因为脆弱的系统可以通过整个互联网扫描被发现并受到破坏。除了传统的安全杠杆之外,已知的方法之一是向攻击者学习传统安全杠杆。蜂蜜罐有助于收集攻击者的信息,假装是一个易受攻击的目标。因此,蜂蜜罐如何有助于建立更安全的基础设施就是一个有趣的研究课题。这一论文将提出一个蜜罐解决方案,用于调查黑化和毒化中心的恶意活动,并显示攻击已经显著增加。为了在海德堡大学的封闭网络区发现攻击者,将建立一个发现防火墙泄漏的新概念。此外,为了考虑攻击者的观点,将引入一种在运输一级探测蜂罐的方法。最后,将介绍一个定制的OpenSSH服务器,作为中间人发挥作用,以缓解这些努力。