Two decades of SCADA exploitation: A brief history

SD Anton, D Fraunholz, C Lipps, F Pohl… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Since the early 1960, industrial process control has been applied by electric systems. In the
mid 1970's, the term SCADA emerged, describing the automated control and data …

[HTML][HTML] Systematic review of graphical visual methods in honeypot attack data analysis

G Ikuomenisan, Y Morgan - Journal of Information Security, 2022 - scirp.org
Mitigating increasing cyberattack incidents may require strategies such as reinforcing
organizations' networks with Honeypots and effectively analyzing attack traffic for detection …

[HTML][HTML] H-DOCTOR: Honeypot based firewall tuning for attack prevention

MR Amal, P Venkadesh - Measurement: Sensors, 2023 - Elsevier
A honeypot is a well-known entrapment technique used by network and Internet of Things
(IoT) security professionals to lure intruders. Unlike traditional security measures, they can …

Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot

D Fraunholz, D Krohmer, SD Anton… - … conference on cyber …, 2017 - ieeexplore.ieee.org
Recently, advances in cyber-physical systems and IoT led to an increase in devices
connected to the internet. This rise of functionality also comes with an increased attack …

Cloud Security Using Honeypot Network and Blockchain: A Review

S Sangui, SK Ghosh - Machine Learning Techniques and …, 2021 - Wiley Online Library
Cloud technology has revolutionized the domain of computing in recent years. The cloud
has succeeded to attract many businesses to use cloud resources or host most of their data …

Data mining in long-term honeypot data

D Fraunholz, M Zimmermann, A Hafner… - … Conference on Data …, 2017 - ieeexplore.ieee.org
Criminal activity in the Internet is becoming more sophisticated. Traditional information
security techniques hardly cope with recent trends. Honeypots proved to be a valuable …

The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world

SDD Anton, D Fraunholz, D Krohmer… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Operational Technology (OT) networks and devices, ie, all components used in industrial
environments, were not designed with security in mind. Efficiency and ease of use were the …

Defending web servers with feints, distraction and obfuscation

D Fraunholz, HD Schotten - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
In this paper we investigate deceptive defense strategies for web servers. Web servers are
widely exploited resources in the modern cyber threat landscape. Often these servers are …

Towards basic design principles for high-and medium-interaction honeypots

D Fraunholz, F Pohl, HD Schotten - Proceedings of 16th …, 2017 - books.google.com
Recently, the increase of interconnectivity has led to a rising amount of threats in the
cyberspace. Reconnaissance is crucial to develop and optimize mitigation strategies against …

[PDF][PDF] Measurement: Sensors

MR Amal, P Venkadesh - Measurement, 2023 - researchgate.net
ABSTRACT A honeypot is a well-known entrapment technique used by network and Internet
of Things (IoT) security professionals to lure intruders. Unlike traditional security measures …