A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

[PDF][PDF] Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices

T Luo, Z Xu, X Jin, Y Jia, X Ouyang - Black Hat, 2017 - blackhat.com
In recent years, the emerging Internet-of-Things (IoT) has led to concerns about the security
of networked embedded devices. There is a strong need to develop suitable and …

[PDF][PDF] A survey: Recent advances and future trends in honeypot research

ML Bringer, CA Chelmecki, H Fujinoki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …

A survey of honeypot research: Trends and opportunities

RM Campbell, K Padayachee… - 2015 10th international …, 2015 - ieeexplore.ieee.org
The number of devices connected to computer networks is increasing daily, and so is the
number of network-based attacks. A honeypot is a system trap that is set to act against …

Attack detection and forensics using honeypot in IoT environment

RK Shrivastava, B Bashir, C Hota - … , January 10–13, 2019, Proceedings 15, 2019 - Springer
Abstract The Internet of Things (IoT) is a collection of tiny devices deployed with sensors. IoT
automates embedded devices and controls them over the Internet. Ubiquitous deployment of …

An IoT honeynet based on multiport honeypots for capturing IoT attacks

W Zhang, B Zhang, Y Zhou, H He… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) devices are vulnerable against attacks because of their limited
network resources and complex operating systems. Thus, a honeypot is a good method of …

Honeydoc: an efficient honeypot architecture enabling all-round design

W Fan, Z Du, M Smith-Creasey… - IEEE journal on …, 2019 - ieeexplore.ieee.org
Honeypots are designed to trap the attacker with the purpose of investigating its malicious
behavior. Owing to the increasing variety and sophistication of cyber attacks, how to capture …

[HTML][HTML] Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security

S Maesschalck, V Giotsas, B Green, N Race - Computers & Security, 2022 - Elsevier
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of
traditional manufacturing and production technologies with IP communications. Legacy …

Approaches for preventing honeypot detection and compromise

M Tsikerdekis, S Zeadally… - 2018 Global …, 2018 - ieeexplore.ieee.org
Honeypots have been used extensively for over two decades. However, their development
is rarely accompanied with an understanding of how attackers are able to detect them …

[图书][B] Honeypots: a new paradigm to information security

RC Joshi, A Sardana - 2011 - books.google.com
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this
book addresses the topic from a variety of perspectives. Following a strong theoretical …