Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target critical infrastructure. Honeypots are valuable network-defense tools, but they are difficult to implement for ICSs because they must then simulate more than familiar protocols. This research compared the performance of the Conpot and GridPot honeypot tools for simulating nodes on an electric grid for live (not recorded) traffic. We evaluated the success of their deceptions by observing their activity types and by scanning them. GridPot received a higher rate of traffic than Conpot, and many visitors to both were deceived as to whether they were dealing with a honeypot. We also tested Shodan’s Honeyscore for finding honeypots, and found...
Defending critical infrastructure assets is an important but extremely difficult and expensive task....
In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) s...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...
Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target...
Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020The article of reco...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary withi...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
Heuristic analysis can reveal honeypots (decoy computer systems doing intelligence gathering) among ...
Prepared for: U.S. Fleet Forces CommandApproved for public release; distribution unlimited.This work...
Honeypots are computers that collect intelligence about new cyberattacks and malware behavior. To be...
Operational technology, information technology for industrial control systems, has advanced more slo...
The Industrial Control Systems (ICS) are the underlying monitoring and control components of critica...
A honeypot is a technical tool that simulates a real computer system and permits the collection of i...
Industrial control systems (ICS) play an important role in critical infrastructure. Cybersecurity de...
Defending critical infrastructure assets is an important but extremely difficult and expensive task....
In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) s...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...
Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target...
Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020The article of reco...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary withi...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
Heuristic analysis can reveal honeypots (decoy computer systems doing intelligence gathering) among ...
Prepared for: U.S. Fleet Forces CommandApproved for public release; distribution unlimited.This work...
Honeypots are computers that collect intelligence about new cyberattacks and malware behavior. To be...
Operational technology, information technology for industrial control systems, has advanced more slo...
The Industrial Control Systems (ICS) are the underlying monitoring and control components of critica...
A honeypot is a technical tool that simulates a real computer system and permits the collection of i...
Industrial control systems (ICS) play an important role in critical infrastructure. Cybersecurity de...
Defending critical infrastructure assets is an important but extremely difficult and expensive task....
In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) s...
We describe our ongoing efforts toward the development of an advanced honeypot that simulates a comp...