Analysis of security challenges in SCADA systems, a technical review on automated real-time systems
Cybersecurity is a rapidly growing concern in many technological areas of the industrial
economy. Supervisory Control and Data Acquisition (SCADA) systems are particularly …
economy. Supervisory Control and Data Acquisition (SCADA) systems are particularly …
Flow based containerized honeypot approach for network traffic analysis: An empirical study
SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …
multitude of devices to acquire and distribute data over extremely diverse networks. This …
Containerized cloud-based honeypot deception for tracking attackers
VSD Priya, SS Chakkaravarthy - Scientific Reports, 2023 - nature.com
Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or
gather and analyze machine and device log files on company infrastructure, may be …
gather and analyze machine and device log files on company infrastructure, may be …
Cloud watching: Understanding attacks against cloud-hosted services
Cloud computing has dramatically changed service deployment patterns. In this work, we
analyze how attackers identify and target cloud services in contrast to traditional enterprise …
analyze how attackers identify and target cloud services in contrast to traditional enterprise …
Blockchain‐Based Decentralized Cloud Solutions for Data Transfer
R Nair, SN Zafrullah, P Vinayasree… - Computational …, 2022 - Wiley Online Library
Cloud computing has increased its service area and user experience above traditional
platforms through virtualization and resource integration, resulting in substantial economic …
platforms through virtualization and resource integration, resulting in substantial economic …
Analysis of ics and scada systems attacks using honeypots
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital
transformation of many industrial control systems (ICS). Operational technology (OT) …
transformation of many industrial control systems (ICS). Operational technology (OT) …
Container Orchestration Honeypot: Observing Attacks in the Wild
Containers, a mechanism to package software and its dependencies into a single artifact,
have helped fuel the rapid pace of technological advancements in the last few years …
have helped fuel the rapid pace of technological advancements in the last few years …
Adapt: Adaptive camouflage based deception orchestration for trapping advanced persistent threats
Honeypots serve as a valuable deception technology, enabling security teams to gain
insights into the behaviour patterns of attackers and investigate cyber security breaches …
insights into the behaviour patterns of attackers and investigate cyber security breaches …
Infrastructure as code for security automation and network infrastructure monitoring
WRA Putra, ARA Nurwa… - MATRIK: Jurnal …, 2022 - journal.universitasbumigora.ac.id
Abstract The Corona Virus (COVID-19) pandemic that has spread throughout the world has
created a new work culture, namely working remotely by utilizing existing technology. This …
created a new work culture, namely working remotely by utilizing existing technology. This …
Log4jPot: effective log4shell vulnerability detection system
S Sopariwala, E Fallon… - 2022 33rd Irish Signals and …, 2022 - ieeexplore.ieee.org
The global digital landscape is changing rapidly with the advances in science and
technology. A plethora of new breakthroughs are being made every day in several different …
technology. A plethora of new breakthroughs are being made every day in several different …