Analysis of security challenges in SCADA systems, a technical review on automated real-time systems

F Basholli, B Mema, D Hyka, A Basholli… - Advanced …, 2023 - publish.mersin.edu.tr
Cybersecurity is a rapidly growing concern in many technological areas of the industrial
economy. Supervisory Control and Data Acquisition (SCADA) systems are particularly …

Flow based containerized honeypot approach for network traffic analysis: An empirical study

SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …

Containerized cloud-based honeypot deception for tracking attackers

VSD Priya, SS Chakkaravarthy - Scientific Reports, 2023 - nature.com
Discovering malicious packets amid a cloud of normal activity, whether you use an IDS or
gather and analyze machine and device log files on company infrastructure, may be …

Cloud watching: Understanding attacks against cloud-hosted services

L Izhikevich, M Tran, M Kallitsis, A Fass… - Proceedings of the 2023 …, 2023 - dl.acm.org
Cloud computing has dramatically changed service deployment patterns. In this work, we
analyze how attackers identify and target cloud services in contrast to traditional enterprise …

Blockchain‐Based Decentralized Cloud Solutions for Data Transfer

R Nair, SN Zafrullah, P Vinayasree… - Computational …, 2022 - Wiley Online Library
Cloud computing has increased its service area and user experience above traditional
platforms through virtualization and resource integration, resulting in substantial economic …

Analysis of ics and scada systems attacks using honeypots

M Mesbah, MS Elsayed, AD Jurcut, M Azer - Future Internet, 2023 - mdpi.com
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital
transformation of many industrial control systems (ICS). Operational technology (OT) …

Container Orchestration Honeypot: Observing Attacks in the Wild

N Spahn, N Hanke, T Holz, C Kruegel… - Proceedings of the 26th …, 2023 - dl.acm.org
Containers, a mechanism to package software and its dependencies into a single artifact,
have helped fuel the rapid pace of technological advancements in the last few years …

Adapt: Adaptive camouflage based deception orchestration for trapping advanced persistent threats

VSC Putrevu, S Mukhopadhyay, S Manna… - … Threats: Research and …, 2024 - dl.acm.org
Honeypots serve as a valuable deception technology, enabling security teams to gain
insights into the behaviour patterns of attackers and investigate cyber security breaches …

Infrastructure as code for security automation and network infrastructure monitoring

WRA Putra, ARA Nurwa… - MATRIK: Jurnal …, 2022 - journal.universitasbumigora.ac.id
Abstract The Corona Virus (COVID-19) pandemic that has spread throughout the world has
created a new work culture, namely working remotely by utilizing existing technology. This …

Log4jPot: effective log4shell vulnerability detection system

S Sopariwala, E Fallon… - 2022 33rd Irish Signals and …, 2022 - ieeexplore.ieee.org
The global digital landscape is changing rapidly with the advances in science and
technology. A plethora of new breakthroughs are being made every day in several different …