2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) 2019
DOI: 10.1109/icumt48472.2019.8970921
|View full text |Cite
|
Sign up to set email alerts
|

Current State of Honeypots and Deception Strategies in Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 18 publications
0
12
0
1
Order By: Relevance
“…Honeypots and honeynets can be classified in various ways. In order to classify the honeypots and honeynets for IoT, IIoT, and CPS in this survey, we build upon prior surveys [12], [24], [25], [28]. However, our classification in this work improves the existing works by identifying some of the recurring key characteristics of the surveyed works.…”
Section: Classification Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…Honeypots and honeynets can be classified in various ways. In order to classify the honeypots and honeynets for IoT, IIoT, and CPS in this survey, we build upon prior surveys [12], [24], [25], [28]. However, our classification in this work improves the existing works by identifying some of the recurring key characteristics of the surveyed works.…”
Section: Classification Methodologymentioning
confidence: 99%
“…Classification by Purpose: Honeypots can be categorized Fig. 2: Classification categories of honeypots and honeynets for IoT, IIoT, and CPS in which some of the items in the categorization build upon [12], [24], [25], [28]. Details of works corresponding to each category are tabulated in Tables I, II, and III.…”
Section: Classification Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Por su parte, en (Zobal, Kolář, & Fujdiak, 2019) se analiza la problemática de los honeypot y las estrategias defensivas basadas en el engaño en el mundo cibernético. En primer lugar, se define el fenómeno honeypot y se resume sus ventajas y desventajas, así como las cuestiones legales y éticas.…”
Section: Los Honeypots En La Detección De Amenazasunclassified
“…Zuzcak M, Sochor T. [24] propose an FTP honeypot which based on port 22 in SSH mode. Zobal L, Kolar D, Fujdiak R. [25] survey honeypot problematics and deception-based defensive strategies in the cyberworld.…”
Section: Honeypot and Ipv6mentioning
confidence: 99%