Honeypots are a technique that can mitigate the risk of cyber threats. Effective honeypots are authentic and targetable, and their design and implementation must accommodate risk tolerance and financial constraints. The proprietary, and often expensive, hardware and software used by Industrial Control System (ICS) devices creates the challenging problem of building a flexible, economical, and scalable honeypot. This research extends Honeyd into Honeyd+, making it possible to use the proxy feature to create multiple high interaction honeypots with a single Programmable Logic Controller (PLC). Honeyd+ is tested with a network of 75 decoy PLCs, and the interactions with the decoys are compared to a physical PLC to test for authenticity. The pe...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Defending critical infrastructure assets is an important but extremely difficult and expensive task....
Attacks on industrial control systems and critical infrastructure are on the rise. Important systems...
Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target...
Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary withi...
The proposed doctoral work investigates a new approach to implement, deploy and manage honeypots for...
Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020The article of reco...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
The Internet of Things (IoT) is growing at an alarming rate. It is estimated that there will be over...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
Heuristic analysis can reveal honeypots (decoy computer systems doing intelligence gathering) among ...
Part 3: INDUSTRIAL CONTROL SYSTEM SECURITYInternational audienceDefending critical infrastructure as...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
Defending critical infrastructure assets is an important but extremely difficult and expensive task....
Attacks on industrial control systems and critical infrastructure are on the rise. Important systems...
Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target...
Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary withi...
The proposed doctoral work investigates a new approach to implement, deploy and manage honeypots for...
Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020The article of reco...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
The Internet of Things (IoT) is growing at an alarming rate. It is estimated that there will be over...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
Heuristic analysis can reveal honeypots (decoy computer systems doing intelligence gathering) among ...
Part 3: INDUSTRIAL CONTROL SYSTEM SECURITYInternational audienceDefending critical infrastructure as...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...