[HTML][HTML] Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of
traditional manufacturing and production technologies with IP communications. Legacy …
traditional manufacturing and production technologies with IP communications. Legacy …
Survey of contemporary open-source honeypots, frameworks, and tools
Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at
short notice. To identify such attacks as well as new cyber security threats, defenders use …
short notice. To identify such attacks as well as new cyber security threats, defenders use …
[PDF][PDF] A survey on honeypot software and data analysis
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
Siphon: Towards scalable high-interaction physical honeypots
In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the
security of networked embedded devices. In this work, we propose the SIPHON architecture …
security of networked embedded devices. In this work, we propose the SIPHON architecture …
Restrictive deterrent effects of a warning banner in an attacked computer system
System trespassing by computer intruders is a growing concern among millions of Internet
users. However, little research has employed criminological insights to explore the …
users. However, little research has employed criminological insights to explore the …
Machine learning for detecting brute force attacks at the network level
MM Najafabadi, TM Khoshgoftaar… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
The tremendous growth in computer network and Internet usage, combined with the growing
number of attacks makes network security a topic of serious concern. One of the most …
number of attacks makes network security a topic of serious concern. One of the most …
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
A Roy, DS Kim, KS Trivedi - IEEE/IFIP International Conference …, 2012 - ieeexplore.ieee.org
Constraints such as limited security investment cost precludes a security decision maker
from implementing all possible countermeasures in a system. Existing analytical model …
from implementing all possible countermeasures in a system. Existing analytical model …
Profiling attacker behavior following SSH compromises
D Ramsbrock, R Berthier… - 37th Annual IEEE/IFIP …, 2007 - ieeexplore.ieee.org
This practical experience report presents the results of an experiment aimed at building a
profile of attacker behavior following a remote compromise. For this experiment, we utilized …
profile of attacker behavior following a remote compromise. For this experiment, we utilized …
[PDF][PDF] A study of passwords and methods used in brute-force SSH attacks
J Owens, J Matthews - USENIX Workshop on Large-Scale Exploits …, 2008 - academia.edu
ABSTRACT In its Top-20 Security Risks report for 2007, the SANS Institute called brute-force
password guessing attacks against SSH, FTP and telnet servers “the most common form of …
password guessing attacks against SSH, FTP and telnet servers “the most common form of …
Harms: Hierarchical attack representation models for network security analysis
Attack models can be used to assess network security. Purely graph based attack
representation models (eg, attack graphs) have a state-space explosion problem. Purely …
representation models (eg, attack graphs) have a state-space explosion problem. Purely …