2018
DOI: 10.1109/jproc.2017.2748421
|View full text |Cite
|
Sign up to set email alerts
|

HoneyBot: A Honeypot for Robotic Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 12 publications
0
20
0
Order By: Relevance
“…Therefore, different honeypot systems were presented in the literature. To solve robotic issues and problems, Irvene et al introduced a "HoneyBot" [318]. This HoneyBot is based on a hybrid interaction honeypot which is designed specifically for robot systems.…”
Section: Honeypots Security Solutionsmentioning
confidence: 99%
“…Therefore, different honeypot systems were presented in the literature. To solve robotic issues and problems, Irvene et al introduced a "HoneyBot" [318]. This HoneyBot is based on a hybrid interaction honeypot which is designed specifically for robot systems.…”
Section: Honeypots Security Solutionsmentioning
confidence: 99%
“…The most critical component of a security tool is the ability to discover new vulnerabilities in a system. There have been several previous research endeavors to detect vulnerabilities for ROS systems, including static code analysis [24] [42], property-based testing [41], Honeypots [19] [29] , and fuzzing [18] [44]. All of these disjointed techniques yield valuable insights into the security of a robotic system, and as such, any integrated security system must make full use of them.…”
Section: Robustness Assessmentmentioning
confidence: 99%
“…The application of honeypots in CPS is a growing area of research. Irvene et al present an example of a honeypot for a robotic vehicle [8], where they fool an attacker into believing that a given attack was successful by simulating unsafe actions within a honeypot environment of the protected robotic system. For ICS, Rubio et al [13] present, among other intrusion detection solutions, a commercial use case of a honeypot solution developed for the acquisition and analysis of information related to a threat or attack against an ICS.…”
Section: Pymentioning
confidence: 99%
“…Currently, the two most popular open-source SDN controllers are OpenDaylight 7 and ONOS 8 . The former is supported by the Open-Source Foundation, while the latter is supported by the Open Networking Foundation.…”
Section: Sdn Controllersmentioning
confidence: 99%