CISUC

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

Authors

Abstract

P. Simões, T. Cruz, J. Gomes, E. Monteiro, , Proc. of the 12th European Conf. on Information Warfare and Security (ECIW 2013), pp. 263-270, Jyväskylä, Finland, 11-12 July 2013.

Subject

Protection of Critical Infrastructures, Security, SCADA Systems

Conference

In Proc. of 12th European Conference on Information Warfare and Security (ECIW 2013). ISBN: 978-1-909507-34-0 ISSN: 2048-8602, July 2013


Cited by

Year 2020 : 1 citations

 Cifranic, Nicholas & Romero-Mariona, Jose & Souza, Brian & Hallman, Roger. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures, in Proc of 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)At: Prague, Czech Republic. May 2020

Year 2019 : 3 citations

 Amine Belqruch and Abdelilah Maach. "SCADA security using SSH honeypot". In Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19). ACM, New York, NY, USA, Article 2, 5 pages. DOI: https://doi.org/10.1145/3320326.3320328

 Maglaras L., Ferrag M.A., Derhab A., Mukherjee M., Janicke H. (2019) Cyber Security: From Regulations and Policies to Practice. In: Kavoura A., Kefallonitis E., Giovanis A. (eds) Strategic Innovative Marketing and Tourism. Springer Proceedings in Business and Economics. Springer, Cham. DOI: 10.1007/978-3-030-12453-3_88

 William Hofer, Thomas Edgar, Draguna Vrabie, Katy Nowak “Model-driven Deception for Control System Environments”, in Proc of 2019 IEEE International Symposium onTechnologies for Homeland Security, November 5 - 6, 2019 Woburn, MA USA

Year 2018 : 3 citations

 Maglaras, Leandros & Ferrag, Mohamed Amine & Derhab, Abdelouahid & Mukherjee, Mithun & Janicke, Helge. (2018). Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. Security and Safety.

 Palleti, V.R., Tan, Y.C., Samavedham, L., A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems, (2018) Journal of Process Control, 68, pp. 160-170. DOI: 10.1016/j.jprocont.2018.05.005

 Adam Rose, Noah Miller, Jonathan Eyer, Joshua Banks, (2018). Economic Effectiveness of Mitigation and Resilience. 315-351. 10.1007/978-3-319-77492-3_14. May 2018.

Year 2017 : 2 citations

 Angséus, J., Ekbom, R., "Network-based Intrusion Detection Systems for Industrial Control Systems", Master’s thesis in Computer Systems and Networks (MPCSN), Department of Computer Science and Engineering. CHALMERS UNIVERSITY OF TECHNOLOGY/UNIVERSITY OF GOTHENBURG, Gothenburg, Sweden 2017

 Ibraheem Frieslaar and Barry Irwin. 2017. Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable. In Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT '17). ACM, New York, NY, USA, Article 15, 10 pages. DOI: https://doi.org/10.1145/3129416.3129436

Year 2016 : 2 citations

 Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016

 J. Nurmi, J. Kannisto and M. Vajaranta, "Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet," 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), Fukuoka, Japan, 2016, pp. 55-59.
doi: 10.1109/AsiaJCIS.2016.31

Year 2015 : 1 citations

 Kamil Koltys and Robert Gajewski, SHaPe: A Honeypot for Electric Power Substation, Journal of Telecommunications and Information Technology, 2015, vol. 4, pp. 37-43.