Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (4): 237-248.doi: 10.19665/j.issn1001-2400.2023.04.023

• Special Issue on Cyberspace Security • Previous Articles    

Research on cloud native API attack trapping technology

ZHANG Yue1,2(),CHEN Qingwang1,2(),LIU Baoxu1,2(),YU Cunwei3(),TAN Ru1(),ZHANG Fangjiao1()   

  1. 1. Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100085,China
    2. School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
    3. Unit 75841 of People’s Liberation Army,Changsha 41005,China
  • Received:2023-01-04 Online:2023-08-20 Published:2023-10-17
  • Contact: Fangjiao ZHANG E-mail:zhangyue@iie.ac.cn;chenqingwang@iie.ac.cn;liubaoxu@iie.ac.cn;453846750@qq.com;tanru@iie.ac.cn;zhangfangjiao@iie.ac.cn

Abstract:

As the core channel for connecting services and transmitting data,the application programming interface (API) hides security risks that cannot be ignored behind its huge value.As the most important information infrastructure on the Internet,it has become the main target for attackers.In order to make up for the shortcomings of existing API security schemes that cannot adequately protect API attack surfaces,we focus on the API security of the cloud native architecture.Based on the idea of active trapping,a cloud-oriented API attack trapping framework is proposed,which constructs corresponding API decoys and high-interactive trapping environments according to the characteristics of different cloud service levels.Especially,in the container orchestration layer (platform layer),three API decoys are designed around the vulnerabilities of cloud components Kubernetes and Docker.In the application layer,fifteen API decoys are designed by selecting API vulnerabilities with more harm and higher utilization frequency.At the same time,in view of the high demand for physical resources of high-interaction API decoys in the application layer,a dynamic scheduling algorithm based on the current network traffic is proposed to maximize the capture effect by making full use of physical resources.On the basis of the trapping framework,a prototype system is implemented and deployed in the real environment.The trapping system finally captures 1270 independent Internet Protocol (IP) addresses and 4146 requests.The captured data are statistically analyzed,and the captured attack behaviors are analyzed in detail.Experimental results show that the proposed API attack trapping technology can effectively discover API attack behaviors in the cloud native environment.

Key words: application programming interfaces(API), security, cloud API security, attack trapping, decoy

CLC Number: 

  • TP393.08