Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security 2017
DOI: 10.1145/3055186.3055192
|View full text |Cite
|
Sign up to set email alerts
|

Siphon

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(13 citation statements)
references
References 12 publications
0
13
0
Order By: Relevance
“…Phype [7] Telnet medium Cowrie [8] Telnet medium IoTCandyJar [10] multiple very high Honware [11] multiple very high IoTPOT [9] multiple high SIPHON [12] SSH, HTTP high ThingPot [13] HTTP, XMPP medium Multi-purpose IoT Honeypot [14] multiple high HoneyThing [15] TR-064 low Smart Factory Honeypot [64] multiple varying…”
Section: Simulated Service(s) Interactionmentioning
confidence: 99%
“…Phype [7] Telnet medium Cowrie [8] Telnet medium IoTCandyJar [10] multiple very high Honware [11] multiple very high IoTPOT [9] multiple high SIPHON [12] SSH, HTTP high ThingPot [13] HTTP, XMPP medium Multi-purpose IoT Honeypot [14] multiple high HoneyThing [15] TR-064 low Smart Factory Honeypot [64] multiple varying…”
Section: Simulated Service(s) Interactionmentioning
confidence: 99%
“…J. Guarnizo et al depict a new IoT honeypot-based scalable architecture named SIPHON. They basically suggest a system composed of real IoT devices in a setup that enables to collect information on attacks from different geo-locations [30].…”
Section: Iot Honeypot Systemsmentioning
confidence: 99%
“…• SIPHON is a high-interaction honeypot for IoT devices. In [14], the authors designed a network architecture to monitor and collect IoT attacks by establishing secure VPN tunnels between the deployed forwarding machine and the physical devices. • Nepenthes is a low interaction honeypot and emulates network vulnerabilities that worms exploit to spread.…”
Section: Honeypotsmentioning
confidence: 99%