Two decades of SCADA exploitation: A brief history

SD Anton, D Fraunholz, C Lipps, F Pohl… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Since the early 1960, industrial process control has been applied by electric systems. In the
mid 1970's, the term SCADA emerged, describing the automated control and data …

[HTML][HTML] H-DOCTOR: Honeypot based firewall tuning for attack prevention

MR Amal, P Venkadesh - Measurement: Sensors, 2023 - Elsevier
A honeypot is a well-known entrapment technique used by network and Internet of Things
(IoT) security professionals to lure intruders. Unlike traditional security measures, they can …

The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world

SDD Anton, D Fraunholz, D Krohmer… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Operational Technology (OT) networks and devices, ie, all components used in industrial
environments, were not designed with security in mind. Efficiency and ease of use were the …

Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot

D Fraunholz, D Krohmer, SD Anton… - … conference on cyber …, 2017 - ieeexplore.ieee.org
Recently, advances in cyber-physical systems and IoT led to an increase in devices
connected to the internet. This rise of functionality also comes with an increased attack …

A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing

R Kirchner, S Koch, N Kamangar… - … on Privacy Enhancing …, 2024 - petsymposium.org
Online messaging has rapidly emerged as today's primary communication platform,
extending from personal, to business and even to government channels. But can these …

Systematic review of graphical visual methods in honeypot attack data analysis

G Ikuomenisan, Y Morgan - Journal of Information Security, 2022 - scirp.org
Mitigating increasing cyberattack incidents may require strategies such as reinforcing
organizations' networks with Honeypots and effectively analyzing attack traffic for detection …

Defending web servers with feints, distraction and obfuscation

D Fraunholz, HD Schotten - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
In this paper we investigate deceptive defense strategies for web servers. Web servers are
widely exploited resources in the modern cyber threat landscape. Often these servers are …

Cloud Security Using Honeypot Network and Blockchain: A Review

S Sangui, SK Ghosh - Machine Learning Techniques and …, 2021 - Wiley Online Library
Cloud technology has revolutionized the domain of computing in recent years. The cloud
has succeeded to attract many businesses to use cloud resources or host most of their data …

Data mining in long-term honeypot data

D Fraunholz, M Zimmermann, A Hafner… - … Conference on Data …, 2017 - ieeexplore.ieee.org
Criminal activity in the Internet is becoming more sophisticated. Traditional information
security techniques hardly cope with recent trends. Honeypots proved to be a valuable …

Risk assessment at the edge: Applying NERC CIP to aggregated grid-edge resources

D Christensen, M Martin, E Gantumur, B Mendrick - The Electricity Journal, 2019 - Elsevier
Distributed energy resources (DERs) promise to deliver benefits for both utilities and
consumers by dynamically interoperating utility systems with customer-owned grid-edge …