Honware: A virtual honeypot framework for capturing CPE and IoT zero days

A Vetterl, R Clayton - 2019 APWG symposium on electronic …, 2019 - ieeexplore.ieee.org
Existing solutions are ineffective in detecting zero day exploits targeting Customer Premise
Equipment (CPE) and Internet of Things (IoT) devices. We present honware, a high …

Open for hire: Attack trends and misconfiguration pitfalls of iot devices

S Srinivasa, JM Pedersen… - Proceedings of the 21st …, 2021 - dl.acm.org
Mirai and its variants have demonstrated the ease and devastating effects of exploiting
vulnerable Internet of Things (IoT) devices. In many cases, the exploitation vector is not …

Duplicity games for deception design with an application to insider threat mitigation

L Huang, Q Zhu - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
Recent incidents such as the Colonial Pipeline ransomware attack and the SolarWinds hack
have shown that traditional defense techniques are becoming insufficient to deter …

Llm in the shell: Generative honeypots

M Sladić, V Valeros, C Catania, S Garcia - arXiv preprint arXiv:2309.00155, 2023 - arxiv.org
Honeypots are essential tools in cybersecurity. However, most of them (even the high-
interaction ones) lack the required realism to engage and fool human attackers. This …

Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots

S Srinivasa, JM Pedersen… - Proceedings of the 38th …, 2022 - dl.acm.org
The Internet of things (IoT) and critical infrastructure utilizing operational technology (OT)
protocols are nowadays a common attack target and/or attack surface used to further …

A Survey on Network Attack Surface Mapping

D Everson, L Cheng - Digital Threats: Research and Practice, 2024 - dl.acm.org
Network services are processes running on a system with network exposure. A key activity
for any network defender, penetration tester, or red team is network attack surface mapping …

[HTML][HTML] Large-scale empirical evaluation of DNS and SSDP amplification attacks

M Anagnostopoulos, S Lagos… - Journal of Information …, 2022 - Elsevier
Reflection-based volumetric distributed denial-of-service (DDoS) attacks take advantage of
the available to all (open) services to flood and possibly overpower a victim's server or …

Gotta catch'em all: a multistage framework for honeypot fingerprinting

S Srinivasa, JM Pedersen… - Digital Threats: Research …, 2023 - dl.acm.org
Honeypots are decoy systems that lure attackers by presenting them with a seemingly
vulnerable system. They provide an early detection mechanism as well as a method for …

Fifteen Months in the Life of a Honeyfarm

C Munteanu, SJ Saidi, O Gasser… - Proceedings of the …, 2023 - dl.acm.org
Honeypots have been used for decades to detect, monitor, and understand attempts of
unauthorized use of information systems. Previous studies focused on characterizing the …

A comparison of an adaptive self-guarded honeypot with conventional honeypots

S Touch, JN Colin - Applied Sciences, 2022 - mdpi.com
To proactively defend computer systems against cyber-attacks, a honeypot system—
purposely designed to be prone to attacks—is commonly used to detect attacks, discover …