2015
DOI: 10.1016/j.promfg.2015.07.175
|View full text |Cite
|
Sign up to set email alerts
|

ICS Honeypot System (CamouflageNet) Based on Attacker's Human Factors

Abstract: In order to protect ICS (Industrial Control System), there are many discussions about ICS security from the viewpoint of cyber defenders. ICS, however, has its specific difficulties to install IT security means such as antivirus with firewall software, because of its 24 hour-a-day, 365 days-a-year non-stop operation under the safety first culture. Comparing IT system, ICS has a certain advantage related to handling against cyber-attacks with operation staffs and safety devices installed in a plant. It is indis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…As the THS deceives attackers and emulates responses as a real PLC, it can observe payload sent from the attackers. This enhanced function to record attack procedures in detail and for the extended area is the significant difference from the preceding study [8]. As the two examples have demonstrated, the THS is more heavily focused on response to commands compared to conventional honeypots.…”
Section: Case 2: Evaluation With Attacks Targeting Plcsmentioning
confidence: 98%
See 4 more Smart Citations
“…As the THS deceives attackers and emulates responses as a real PLC, it can observe payload sent from the attackers. This enhanced function to record attack procedures in detail and for the extended area is the significant difference from the preceding study [8]. As the two examples have demonstrated, the THS is more heavily focused on response to commands compared to conventional honeypots.…”
Section: Case 2: Evaluation With Attacks Targeting Plcsmentioning
confidence: 98%
“…Another research collected device-specific information contained in the response from devices in ICS networks (e.g. product name, model number, vendor information) and integrated them in the honeypot's response, which successfully observed some attacker activities against ICS networks [8].…”
Section: Traceback Honeypot System (Ths) On Icsmentioning
confidence: 99%
See 3 more Smart Citations