NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 2016
DOI: 10.1109/noms.2016.7502992
|View full text |Cite
|
Sign up to set email alerts
|

Multi-stage attack detection and signature generation with ICS honeypots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…At the process level, faults are going to have the same characteristics as an attack as both are violating the normal procedure of the process. Labeled data can also be collected by simulating attacks using methods such as honeypots [39], simulations [40,41], or deep learning attack generation techniques [42]. While these are simulations of working ICS, they offer data that can be used to build an extra layer of protection for these systems.…”
Section: Discussionmentioning
confidence: 99%
“…At the process level, faults are going to have the same characteristics as an attack as both are violating the normal procedure of the process. Labeled data can also be collected by simulating attacks using methods such as honeypots [39], simulations [40,41], or deep learning attack generation techniques [42]. While these are simulations of working ICS, they offer data that can be used to build an extra layer of protection for these systems.…”
Section: Discussionmentioning
confidence: 99%
“…Vasilomanolakis et al [5] used bespoke ICS (Industrial Control System) honeypots in order to generate signatures of multi stage attacks by modeling each disparate protocol from the same host as a separate stage in the attack. For each of these stages, a signature is generated based upon characteristics of the network packet involved in the attack which is then used by Bro IDS 1 to evaluate the detection capabilities.…”
Section: Related Work a Threat Intelligencementioning
confidence: 99%
“…Recent literature [2]- [5] has identified the benefits of extracting attack characteristics from honeypots and generating signatures such that attacks in the same vein are prevented. While providing effective signatures for NIDSs (Network Intrusion Systems), this research does not consider events which transpire at a host level, and only provides signatures suitable for network based defense mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…A mobile ICS honeypot dubbed as HosTaGe, as demonstrated by Vasilomanolakis et al [28], is capable of emulating nuclear power plants, water distribution plants, etc. It is not unusual to set up a large and detailed decoy infrastructure to attract attackers and generate attack signatures [27]. Similar research and development efforts were conducted in the IoT realm.…”
Section: Related Workmentioning
confidence: 99%