Koney: A Cyber Deception Orchestration Framework for Kubernetes

  • Mario Kahlhofer*
  • , Matteo Golinelli*
  • , Stefan Rass*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceedingspeer-review

Abstract

System operators responsible for protecting software applications remain hesitant to implement cyber deception technology, including methods that place traps to catch attackers, despite its proven benefits. Overcoming their concerns removes a barrier that currently hinders industry adoption of deception technology. Our work introduces deception policy documents to describe deception technology “as code” and pairs them with Koney, a Kubernetes operator, which facilitates the setup, rotation, monitoring, and removal of traps in Kubernetes. We leverage cloud-native technologies, such as service meshes and eBPF, to automatically add traps to containerized software applications, without having access to the source code. We focus specifically on operational properties, such as maintainability, scalability, and simplicity, which we consider essential to accelerate the adoption of cyber deception technology and to facilitate further research on cyber deception.
Original languageEnglish
Title of host publication2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
Place of PublicationVenice, Italy
PublisherIEEE
Pages690-702
Number of pages13
Edition1
ISBN (Electronic)9798331595463
ISBN (Print)979-8-3315-9546-3
DOIs
Publication statusPublished - 01 Sept 2025

Publication series

NameEuroSPW '25
PublisherIEEE

Fields of science

  • 102016 IT security
  • 102 Computer Sciences

JKU Focus areas

  • Sustainable Development: Responsible Technologies and Management
  • Digital Transformation

Cite this