A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

A survey of cyber security management in industrial control systems

W Knowles, D Prince, D Hutchison, JFP Disso… - International journal of …, 2015 - Elsevier
Contemporary industrial control systems no longer operate in isolation, but use other
networks (eg, corporate networks and the Internet) to facilitate and improve business …

Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …

IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024 - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …

Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

[HTML][HTML] Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security

S Maesschalck, V Giotsas, B Green, N Race - Computers & Security, 2022 - Elsevier
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of
traditional manufacturing and production technologies with IP communications. Legacy …

DDoS attacks in Industrial IoT: A survey

S Chaudhary, PK Mishra - Computer Networks, 2023 - Elsevier
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …

Securing SCADA-based critical infrastructures: Challenges and open issues

N Tariq, M Asim, FA Khan - Procedia computer science, 2019 - Elsevier
Conventionally, the security of critical infrastructures was mainly focused on environmental
threats. Cyber attacks, nevertheless, have shifted the attention to various other threats and …

[PDF][PDF] How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey.

P Lackner - ICEIS (2), 2021 - scitepress.org
In a digitized world even critical infrastructure relies on computers controlled via networks.
Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a …

A review on malware analysis for iot and android system

CS Yadav, S Gupta - SN Computer Science, 2022 - Springer
Today all humankind is willing to avail more facilities and hopes everything should be
available with a click of the button. In order to offer different services, the developers have …