Survey of contemporary open-source honeypots, frameworks, and tools
Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at
short notice. To identify such attacks as well as new cyber security threats, defenders use …
short notice. To identify such attacks as well as new cyber security threats, defenders use …
Hybrid cyber defense strategies using Honey-X: A survey
The development and adoption of network technologies reshape our daily life; however,
network-connected devices have become popular targets of cybercrimes. Honey-X-based …
network-connected devices have become popular targets of cybercrimes. Honey-X-based …
Empirical study of PLC authentication protocols in industrial control systems
Programmable logic controllers (PLCs) run a 'control logic'program that defines how to
control a physical process such as a nuclear plant, power grid stations, and gas pipelines …
control a physical process such as a nuclear plant, power grid stations, and gas pipelines …
Gadgets of gadgets in industrial control systems: Return oriented programming attacks on PLCs
In industrial control systems (ICS), programmable logic controllers (PLCs) directly control
and monitor physical processes in real-time such as nuclear plants, and power grid stations …
and monitor physical processes in real-time such as nuclear plants, and power grid stations …
HoneyICS: A high-interaction physics-aware honeynet for industrial control systems
Industrial control systems (ICSs) are vulnerable to cyber-physical attacks, ie, security
breaches in cyberspace that adversely affect the underlying physical processes. In this …
breaches in cyberspace that adversely affect the underlying physical processes. In this …
Threat intelligence generation using network telescope data for industrial control systems
Industrial Control Systems (ICSs) are cyber-physical systems that offer attractive targets to
threat actors due to the scale of damages, both physical and cyber, that successful …
threat actors due to the scale of damages, both physical and cyber, that successful …
PHCG: PLC honeypoint communication generator for industrial IoT
H Liu, Y Zhou, B Fang, Y Sun, N Hu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid development of mobile and wireless technologies, the industrial
manufacturing sector has entered the era of automation. The proliferation of mobile devices …
manufacturing sector has entered the era of automation. The proliferation of mobile devices …
Icspot: A high-interaction honeypot for industrial control systems
Honeypots represent one of the most common solutions to study the adversaries'
movements and develop ad-hoc protection strategies. An effective honeypot can mimic a …
movements and develop ad-hoc protection strategies. An effective honeypot can mimic a …
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control
P Liu, Y Zheng, Z Song, D Fang, S Lv, L Sun - Journal of Systems …, 2022 - Elsevier
Programmable controllers, critical components in Industrial Control Systems (ICS), are the
bridge between cyberspace and physical world. With the development of the Industrial …
bridge between cyberspace and physical world. With the development of the Industrial …
Honeyvp: A cost-effective hybrid honeypot architecture for industrial control systems
J You, S Lv, Y Sun, H Wen, L Sun - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
As a decoy for hackers, honeypots have been proved to be a very valuable tool for collecting
real data. However, due to closed source and vendor-specific firmware, there are significant …
real data. However, due to closed source and vendor-specific firmware, there are significant …