2022
DOI: 10.1016/j.cose.2021.102598
|View full text |Cite
|
Sign up to set email alerts
|

Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 31 publications
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“…The structure and high-level overview of controls were found to be adequate; however, areas concerning practical implementation require further development. The parent documents of the reviewed standards are mostly IT-focused or do not cover the applicability or implementation of novel security approaches, such as honeypots [33], for OT environments.…”
Section: Discussionmentioning
confidence: 99%
“…The structure and high-level overview of controls were found to be adequate; however, areas concerning practical implementation require further development. The parent documents of the reviewed standards are mostly IT-focused or do not cover the applicability or implementation of novel security approaches, such as honeypots [33], for OT environments.…”
Section: Discussionmentioning
confidence: 99%
“…Within the paper, there is an overview of many attacks involving critical infrastructure, their impact, and how they have evolved over the years. Although there is a lot of regulation within this space related to the security of these systems (Maesschalck et al, 2022), these have not stopped nation-states or nonstate actors from infiltrating the systems. Dealing with nation-state threat actors requires a different approach than other threat actors (Derbyshire et al, 2021(Derbyshire et al, , 2018, and the cooperation of states on this is crucial as they can work toward the identification of these actors by collaborating on investigations.…”
Section: International Security and Cyberspacementioning
confidence: 99%
“…The proposed framework architecture actively detects and mitigates threats as it contains multiple components in terms of security tools that may keep the network safe, such as a firewall [ 44 ], an AI-based IDS, and a specific type of IDS called a honeypot [ 45 ]. The honeypot mechanism relies on deception and diversion methods for detection and prevention to deflect and reroute the attackers by luring and entrapping them inside a heterogeneous environment that mimics the real network traffic [ 46 ]. In addition to providing existing vulnerabilities and exploits inside the simulated environment that entice the attacker by weakened systems to latch on and enable the monitoring and studying of the behavior of the malicious actors by capturing their activities for intelligence gathering and fore-sighting future risks and newly developed cyberattack patterns [ 47 ].…”
Section: Ids Architecturementioning
confidence: 99%