[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Honeyics: A high-interaction physics-aware honeynet for industrial control systems

M Lucchese, F Lupia, M Merro, F Paci… - Proceedings of the 18th …, 2023 - dl.acm.org
Industrial control systems (ICSs) are vulnerable to cyber-physical attacks, ie, security
breaches in cyberspace that adversely affect the underlying physical processes. In this …

Ics honeypot interactions: A latitudinal study

F Lupia, M Lucchese, M Merro… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The recent proliferation of sophisticated threats targeting the plant of Industrial Control
Systems (ICSs) has triggered a growing interest in the development of dedicated …

HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing

H Zhu, M Liu, B Chen, X Che… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The widespread use of programmable logic controllers (PLCs) in critical infrastructures has
given rise to escalating cybersecurity concerns regarding PLC attacks. As a proactive …

PHCG: PLC honeypoint communication generator for industrial IoT

H Liu, Y Zhou, B Fang, Y Sun, N Hu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid development of mobile and wireless technologies, the industrial
manufacturing sector has entered the era of automation. The proliferation of mobile devices …

Llmpot: Automated llm-based industrial protocol and physical process emulation for ics honeypots

C Vasilatos, DJ Mahboobeh, H Lamri, M Alam… - ar** advanced persistent threats
VSC Putrevu, S Mukhopadhyay, S Manna… - … Threats: Research and …, 2024 - dl.acm.org
Honeypots serve as a valuable deception technology, enabling security teams to gain
insights into the behaviour patterns of attackers and investigate cyber security breaches …

ICSNet: A Hybrid-Interaction Honeynet for Industrial Control Systems

L Salazar, E López-Morales, J Lozano… - Proceedings of the …, 2024 - dl.acm.org
Industrial Control Systems (ICS) manage several critical infrastructures, such as the
electrical grid and water treatment plants. ICS have been the target of cyberattacks designed …

Reconfigurable and Scalable Honeynet for Cyber-Physical Systems

L Sousa, J Cecílio, PM Ferreira… - ACM SIGAda Ada …, 2024 - dl.acm.org
Industrial Control Systems (ICS) constitute the backbone of contemporary industrial
operations, ranging from modest heating, ventilation, and air conditioning systems to …

MySQL-Pot: A LLM-Based Honeypot for MySQL Threat Protection

Y Hu, S Cheng, Y Ma, S Chen, F **ao… - 2024 9th International …, 2024 - ieeexplore.ieee.org
Traditional network defense techniques such as firewalls and intrusion detection systems [1]
primarily involve passive defense, which often struggles to effectively counter the …