Digital honeypots are computers commonly used to collect intelligence about new cyberattacks and malware behavior. To be successful, these decoys must be configured to allow attackers to probe a system without compromising data collection. Previous research at the Naval Postgraduate School developed an industrial control system (ICS) honeypot simulating a small electric-distribution system. This honeypot was attacked, and its log data was deleted. Our research analyzed the attacks and developed methods to harden the main weakness of the publicly accessible user interface. The hardened honeypot included more robust data collection and logging capabilities and was deployed in a commercial cloud environment. We observed significant scanning an...
A honeypot is a trap set to detect attempts at unauthorized use of information systems. Generally it...
Information security is a rising concern today in this era of the internet because of the rapid deve...
Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target...
Honeypots are computers that collect intelligence about new cyberattacks and malware behavior. To be...
Operational technology, information technology for industrial control systems, has advanced more slo...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
Honeypots (decoy systems) are effective tools to monitor cyberattack and intrusion attempts, but it ...
Prepared for: U.S. Fleet Forces CommandApproved for public release; distribution unlimited.This work...
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or co...
Heuristic analysis can reveal honeypots (decoy computer systems doing intelligence gathering) among ...
According to studies conducted by researchers across the globe, in recent years there has been an in...
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromis...
Cybersecurity defenders can use honeypots (decoy systems) to capture and study adversarial activitie...
A honeypot is a technical tool that simulates a real computer system and permits the collection of i...
This thesis explores possibilities for extending the features of honeypot systems to decrease the ch...
A honeypot is a trap set to detect attempts at unauthorized use of information systems. Generally it...
Information security is a rising concern today in this era of the internet because of the rapid deve...
Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target...
Honeypots are computers that collect intelligence about new cyberattacks and malware behavior. To be...
Operational technology, information technology for industrial control systems, has advanced more slo...
In recent years critical-infrastructure systems, particularly smart electrical grids, have become de...
Honeypots (decoy systems) are effective tools to monitor cyberattack and intrusion attempts, but it ...
Prepared for: U.S. Fleet Forces CommandApproved for public release; distribution unlimited.This work...
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or co...
Heuristic analysis can reveal honeypots (decoy computer systems doing intelligence gathering) among ...
According to studies conducted by researchers across the globe, in recent years there has been an in...
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromis...
Cybersecurity defenders can use honeypots (decoy systems) to capture and study adversarial activitie...
A honeypot is a technical tool that simulates a real computer system and permits the collection of i...
This thesis explores possibilities for extending the features of honeypot systems to decrease the ch...
A honeypot is a trap set to detect attempts at unauthorized use of information systems. Generally it...
Information security is a rising concern today in this era of the internet because of the rapid deve...
Cyberattacks on industrial control systems (ICSs) can be especially damaging since they often target...