2021
DOI: 10.1109/comst.2021.3106669
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 117 publications
(63 citation statements)
references
References 100 publications
0
37
0
Order By: Relevance
“…Several studies have investigated the role of honeypots and relevant optimisation techniques with AI and game theory in order to protect critical organisations and infrastructures. Some of them are listed below [12], [28]- [34]. In particular, in [28], J. Franco et al provide a survey about honeypots and honeynets for the IoT and IIoT.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several studies have investigated the role of honeypots and relevant optimisation techniques with AI and game theory in order to protect critical organisations and infrastructures. Some of them are listed below [12], [28]- [34]. In particular, in [28], J. Franco et al provide a survey about honeypots and honeynets for the IoT and IIoT.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them are listed below [12], [28]- [34]. In particular, in [28], J. Franco et al provide a survey about honeypots and honeynets for the IoT and IIoT. In [12], M. Nawrocki et al present a comprehensive study about honeypot software and relevant data analytics.…”
Section: Related Workmentioning
confidence: 99%
“…In 2020, Lee et al [37] The authors [39] suggested: development of Honeypot systems for effective insider attack detection and mitigation; investigating technologies, platforms, and domains recently becoming prominent; investigating established but yet unexplored protocols; investigating effective deployment locations and remote management; and also, effective anti-Honeypot and ant-detection approaches.…”
Section: Survey Reviewmentioning
confidence: 99%
“…HONEYPOT As the applications of ICS -in particular-are increasing so do the attacks and as we mentioned earlier ICS are uses in critical industries some are managed by the federal agencies of the US and most of them are privately owned [5], hence, in order to protect theise critical systems from attackers, we can deploy different security aspects such as IDS, IPS, Firewalls, cryptography, antivirus and other tools can be applied to secure the system. But on the other hand these tools or mechanisms can't offer a chance to study how the attackers can get into the system, how they act, what is the attack flow, and also the identity of the attackers [1]. However, here comes Honeypot and Honeynet, a system that traps and tricks the attackers into believing that they have got access to the actual assets of the system while they just got into a simulated system that registers their attack patterns.…”
Section: IIImentioning
confidence: 99%
“…classification by application: Honeypot is a tool created to be applied and used within IoT systems such as IoT candyjar honeypot and IoTPOT honeypot, or for industrial purposes with ICS such as Honeyd+ honeypot and CamouflageNet honeynet [1].…”
Section: Amentioning
confidence: 99%