Creating effective industrial-control-system honeypots

NC Rowe, TD Nguyen, MM Kendrick… - American Journal of …, 2020 - articlearchives.co
Cyberattacks on industrial control systems (ICSs) can be especially damaging. Honeypots
are valuable network-defense tools, but it is difficult to simulate the specialized protocols of …

Measuring and clustering network attackers using medium-interaction honeypots

Z Shamsi, D Zhang, D Kyoung… - 2022 IEEE European …, 2022 - ieeexplore.ieee.org
Network honeypots are often used by information security teams to measure the threat
landscape in order to secure their networks. With the advancement of honeypot …

[PDF][PDF] Deploying and analyzing containerized honeypots in the cloud with T-Pot

AD Washofsky - 2021 - apps.dtic.mil
Honeypots (decoy systems) are effective tools to monitor cyberattack and intrusion attempts,
but it is challenging to deploy enough of them to catch a sufficient amount of such activity …

[PDF][PDF] Testing deception with a commercial tool simulating cyberspace

SK Drew, CW Heinen - 2022 - apps.dtic.mil
Deception methods have been applied to the traditional domains of war (air, land, sea, and
space). In the newest domain of cyber, deception can be studied to see how it can be best …

Enhancing Cybersecurity Resilience: Integrating IDS with Advanced Honeypot Environments for Proactive Threat Detection

SA Raghul, G Gayathri, R Bhatt… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
As cyber threats evolve, conventional intrusion detection methods struggle to detect,
necessitating innovative solutions. This research study explores the transformative potential …

Despliegue de honeypot en la nube privada como primer perímetro de seguridad

HJ León Loja - 2021 - dspace.ups.edu.ec
El rápido crecimiento del consumo de los servicios web hace que la infraestructura sobre la
cual estos funcionan se vuelva vulnerable ante cualquier ataque mientras más incrementa …

[PDF][PDF] Malicious activity detection

M Dondo, M Sultana, G Vandenberghe - 2021 - cradpdf.drdc-rddc.gc.ca
Operational networks continue to face increasing and evolving malicious activities that
threaten to disrupt ongoing missions. To ensure mission continuity and minimise disruptions …