2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346907
|View full text |Cite
|
Sign up to set email alerts
|

Did you really hack a nuclear power plant? An industrial control mobile honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…ICS-specific honeypots have been developed [7][8][9][10] to understand the origin, frequency, and sophistication of attacks on ICS services. ICS services are popular victims.…”
Section: A Glimpse Into Ics Protocol Securitymentioning
confidence: 99%
“…ICS-specific honeypots have been developed [7][8][9][10] to understand the origin, frequency, and sophistication of attacks on ICS services. ICS services are popular victims.…”
Section: A Glimpse Into Ics Protocol Securitymentioning
confidence: 99%
“…• Network host information. In [28], a mobile honeypot system for industrial control systems was introduced. This system can be placed in many network locations to provide an additional layer of defense to disrupt attacker's reconnaissance activities.…”
Section: Topology Info Host Info Traffic Infomentioning
confidence: 99%
“…ICS specific honeypots have been developed [6]- [8] to understand the origin, frequency, and sophistication of attacks on ICS services. ICS services are popular victims.…”
Section: Background and Related Work A A Glimpse Into Ics Protocol Se...mentioning
confidence: 99%