Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020‏ - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

A systematic analysis of enhancing cyber security using deep learning for cyber physical systems

S Gaba, I Budhiraja, V Kumar, S Martha, J Khurmi… - IEEE …, 2024‏ - ieeexplore.ieee.org
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration
in various fields because of their emergent applications. Though the robust dependence on …

[PDF][PDF] Research on intrusion detection and response: A survey.

P Kabiri, AA Ghorbani - Int. J. Netw. Secur., 2005‏ - Citeseer
With recent advances in network based technology and increased dependability of our
every day life on this technology, assuring reliable operation of network based systems is …

From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation

F Araujo, KW Hamlen, S Biedermann… - Proceedings of the …, 2014‏ - dl.acm.org
Traditional software security patches often have the unfortunate side-effect of quickly alerting
attackers that their attempts to exploit patched vulnerabilities have failed. Attackers greatly …

Chatbots in a honeypot world

F McKee, D Noever - arxiv preprint arxiv:2301.03771, 2023‏ - arxiv.org
Question-and-answer agents like ChatGPT offer a novel tool for use as a potential honeypot
interface in cyber security. By imitating Linux, Mac, and Windows terminal commands and …

HIoTPOT: surveillance on IoT devices against recent threats

UD Gandhi, PM Kumar, R Varatharajan… - Wireless personal …, 2018‏ - Springer
Abstract Honeypot Internet of Things (IoT)(HIoTPOT) keep a secret eye on IoT devices and
analyzes the various recent threats which are dangerous to IoT devices. In this paper …

A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks

H Artail, H Safa, M Sraj, I Kuwatly, Z Al-Masri - computers & security, 2006‏ - Elsevier
This paper proposes a hybrid and adaptable honeypot-based approach that improves the
currently deployed IDSs for protecting networks from intruders. The main idea is to deploy …

[كتاب][B] Honeypots: a new paradigm to information security

RC Joshi, A Sardana - 2011‏ - books.google.com
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this
book addresses the topic from a variety of perspectives. Following a strong theoretical …

Dynamic distributed honeypot based on blockchain

L Shi, Y Li, T Liu, J Liu, B Shan, H Chen - IEEE Access, 2019‏ - ieeexplore.ieee.org
Honeypot technology can be applied to efficiently attract attackers and exhaust their
resources. However, the traditional static honeypot is easy to be recognized by anti …

Session‐Based Webshell Detection Using Machine Learning in Web Logs

Y Wu, Y Sun, C Huang, P Jia… - Security and …, 2019‏ - Wiley Online Library
Attackers upload webshell into a web server to achieve the purpose of stealing data,
launching a DDoS attack, modifying files with malicious intentions, etc. Once these objects …