The proposed doctoral work investigates a new approach to implement, deploy and manage honeypots for Industrial Control Systems (ICS). Our goal is to address unique challenges of ICS security in terms of interactivity, resource utilization, timeliness of detection and uninterrupted operation, which are much stricter compared to traditional systems, making the existing approaches inefficient. Our proposal combines different levels of interactivity and coupling of the honeypots with the ICS network to satisfy trade-offs of detection accuracy and risk, and integrates the honeypot detection feeds with an SDN framework to enable autonomic reconfiguration
The emerge of sophisticated attackers and malware that target Industrial Control System (ICS) sugges...
In industrial control system (ICS) network, communication is often conducted using custom protocols....
Defending critical infrastructure assets is an important but extremely difficult and expensive task....
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
The Industrial Control Systems (ICS) are the underlying monitoring and control components of critica...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Honeypots are computers that collect intelligence about new cyberattacks and malware behavior. To be...
In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) s...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
Honeypots are powerful security tools, which are developed to shield commercial and industrial netwo...
The cybersecurity landscape is constantly evolving, meaning threat actors continually find and devel...
Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary withi...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
The emerge of sophisticated attackers and malware that target Industrial Control System (ICS) sugges...
In industrial control system (ICS) network, communication is often conducted using custom protocols....
Defending critical infrastructure assets is an important but extremely difficult and expensive task....
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditiona...
The Industrial Control Systems (ICS) are the underlying monitoring and control components of critica...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Honeypots are computers that collect intelligence about new cyberattacks and malware behavior. To be...
In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) s...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
Honeypots are powerful security tools, which are developed to shield commercial and industrial netwo...
The cybersecurity landscape is constantly evolving, meaning threat actors continually find and devel...
Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary withi...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
The emerge of sophisticated attackers and malware that target Industrial Control System (ICS) sugges...
In industrial control system (ICS) network, communication is often conducted using custom protocols....
Defending critical infrastructure assets is an important but extremely difficult and expensive task....