2022
DOI: 10.1007/s11276-022-03057-y
|View full text |Cite
|
Sign up to set email alerts
|

Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…As the honeypot is deployed in the cloud, hackers could readily distinguish it as a decoy system. Hence, we strongly believe that the findings obtained were the repercussion of bots scanning the cloud and are therefore insufficient to improve the security intelligence of the ICS system as asserted by 23 .…”
Section: Virtualization and Containerizationmentioning
confidence: 94%
See 2 more Smart Citations
“…As the honeypot is deployed in the cloud, hackers could readily distinguish it as a decoy system. Hence, we strongly believe that the findings obtained were the repercussion of bots scanning the cloud and are therefore insufficient to improve the security intelligence of the ICS system as asserted by 23 .…”
Section: Virtualization and Containerizationmentioning
confidence: 94%
“…Novelty of our experimentation. Existing research 23 on containerized honeypot data analysis has mostly focused on information pertaining to Industrial Control System (ICS) devices and is insufficient to analyze all of the data that has been collected. As the honeypot is deployed in the cloud, hackers could readily distinguish it as a decoy system.…”
Section: Virtualization and Containerizationmentioning
confidence: 99%
See 1 more Smart Citation
“…This transition showcases a dynamic and flexible approach to treating PLCs as a service. However, this shift has also led to an expansion of potential vulnerabilities due to the intricate nature of largescale frameworks, resulting in increased points of entry from diverse sources [231], [232]. Addressing the future security concerns associated with safeguarding these control systems involves the utilization of security platforms hosted in the cloud [233].…”
Section: E Computing Based On Cloudmentioning
confidence: 99%