[HTML][HTML] Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security

S Maesschalck, V Giotsas, B Green, N Race - Computers & Security, 2022 - Elsevier
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of
traditional manufacturing and production technologies with IP communications. Legacy …

Survey of contemporary open-source honeypots, frameworks, and tools

N Ilg, P Duplys, D Sisejkovic, M Menth - Journal of Network and Computer …, 2023 - Elsevier
Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at
short notice. To identify such attacks as well as new cyber security threats, defenders use …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Siphon: Towards scalable high-interaction physical honeypots

JD Guarnizo, A Tambe, SS Bhunia, M Ochoa… - Proceedings of the 3rd …, 2017 - dl.acm.org
In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the
security of networked embedded devices. In this work, we propose the SIPHON architecture …

Restrictive deterrent effects of a warning banner in an attacked computer system

D Maimon, M Alper, B Sobesto, M Cukier - Criminology, 2014 - Wiley Online Library
System trespassing by computer intruders is a growing concern among millions of Internet
users. However, little research has employed criminological insights to explore the …

Machine learning for detecting brute force attacks at the network level

MM Najafabadi, TM Khoshgoftaar… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
The tremendous growth in computer network and Internet usage, combined with the growing
number of attacks makes network security a topic of serious concern. One of the most …

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees

A Roy, DS Kim, KS Trivedi - IEEE/IFIP International Conference …, 2012 - ieeexplore.ieee.org
Constraints such as limited security investment cost precludes a security decision maker
from implementing all possible countermeasures in a system. Existing analytical model …

Profiling attacker behavior following SSH compromises

D Ramsbrock, R Berthier… - 37th Annual IEEE/IFIP …, 2007 - ieeexplore.ieee.org
This practical experience report presents the results of an experiment aimed at building a
profile of attacker behavior following a remote compromise. For this experiment, we utilized …

[PDF][PDF] A study of passwords and methods used in brute-force SSH attacks

J Owens, J Matthews - USENIX Workshop on Large-Scale Exploits …, 2008 - academia.edu
ABSTRACT In its Top-20 Security Risks report for 2007, the SANS Institute called brute-force
password guessing attacks against SSH, FTP and telnet servers “the most common form of …

Harms: Hierarchical attack representation models for network security analysis

J Hong, DS Kim - 2012 - ro.ecu.edu.au
Attack models can be used to assess network security. Purely graph based attack
representation models (eg, attack graphs) have a state-space explosion problem. Purely …