2018
DOI: 10.1007/978-3-319-99007-1_56
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on SCADA Security and Honeypot in Industrial Control System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…In their work, the fundamental concepts and typical software tools, architectural implementations, and ethics and legal aspects of deception technologies were discussed. Lu et al [33] presented an overview of information monitoring system of Industrial Control System (ICS) called Supervisory Control and Data Acquisition (SCADA) and also Honeypot-based SCADA while the survey work presented by Razali et al [34] reviewed different concepts, functionality, software, architecture of Internet-of-Things (IoT) Honeypot. In addition, the application of Honeypot technology in Industrial Control Systems was surveyed.…”
Section: Survey Reviewmentioning
confidence: 99%
“…In their work, the fundamental concepts and typical software tools, architectural implementations, and ethics and legal aspects of deception technologies were discussed. Lu et al [33] presented an overview of information monitoring system of Industrial Control System (ICS) called Supervisory Control and Data Acquisition (SCADA) and also Honeypot-based SCADA while the survey work presented by Razali et al [34] reviewed different concepts, functionality, software, architecture of Internet-of-Things (IoT) Honeypot. In addition, the application of Honeypot technology in Industrial Control Systems was surveyed.…”
Section: Survey Reviewmentioning
confidence: 99%
“…Moreover, some efforts to unify models and variants, such as [489], have been made. Despite this, the original proposal has been widely used and applied to specific problems regarding advanced threat actors, such as those related to the modeling of the attack stages against critical infrastructures [112,253,379,686].…”
Section: Cyber Kill Chain ®mentioning
confidence: 99%