2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE) 2016
DOI: 10.1109/icitacee.2016.7892469
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of honeypot to detect and prevent distributed denial of service attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 4 publications
0
5
0
1
Order By: Relevance
“…Although SCADA is widely used due to its rapid development, recent studies have highlighted its vulnerabilities from a cyber-security and cyber-physical security perspective [14], [15], [22], [23], [27], [28], [30]- [37]. The threat of cyberattacks looms over SCADA systems that communicate with network protocols [22], [23], [27], [34], [38].…”
Section: Related Workmentioning
confidence: 99%
“…Although SCADA is widely used due to its rapid development, recent studies have highlighted its vulnerabilities from a cyber-security and cyber-physical security perspective [14], [15], [22], [23], [27], [28], [30]- [37]. The threat of cyberattacks looms over SCADA systems that communicate with network protocols [22], [23], [27], [34], [38].…”
Section: Related Workmentioning
confidence: 99%
“…Although SCADA is widely used due to its rapid development, recent studies have highlighted its vulnerabilities from a cyber-security and cyber-physical security perspective ( Bratus et al, 2016 ; Siddavatam & Kazi, 2016 ; Mantere, Sailio & Noponen, 2013 ; Lee et al, 2014 ; Rahman, Jakaria & Al-Shaer, 2016 ; Sembiring, 2017 ; Smaiah, Khellaf & Cherifi, 2016 ; Friesen, 2016 ; Moreira et al., 2016 ; Darwish, Igbe & Saadawi 2015 ; Amoah, 2016 ; Chen et al., 2014 ; Nivethan & Papa, 2016 ; Singh, Nivangune & Mrinal, 2016 ). The threat of cyberattacks looms over SCADA systems that communicate with network protocols ( Mantere, Sailio & Noponen, 2013 ; Lee et al, 2014 ; Rahman, Jakaria & Al-Shaer, 2016 ; Amoah, 2016 ; Ahn et al, 2015 ).…”
Section: Related Workmentioning
confidence: 99%
“…Such vulnerability can be used by attackers to steal the transmitted data. Furthermore, attackers may interrupt, intercept, fabricate, and modify the data, which would also hamper SCADA ( Nguyen, Ali & Yue, 2017 ; Orojloo & Azgomi, 2017 ; Dragomir et al, 2016 ; Senthivel, Ahmed & Roussev, 2017 ; Mantere, Sailio & Noponen, 2013 ; Lee et al, 2014 ; Park, Suh & Park, 2016 ; Bartman & Carson, 2016 ; Shitharth & Winston, 2016 ; Rahman, Jakaria & Al-Shaer, 2016 ; Sembiring, 2017 ; Amoah, Camtepe & Foo, 2016 ).…”
Section: Introductionmentioning
confidence: 99%
“…También se describe un método que se puede utilizar para obtener datos de la computadora de un atacante. También en (Sembiring, 2016) se hacen aportes a la investigación sobre el tópico en cuestión, al afirmar que el conocimiento de las diversas amenazas y ataques posibilita la recopilación de datos amplios de la red mediante el uso de honeypot. El honeypot por ellos implementado utiliza un tipo de interacción baja que es honeyd y otro software de soporte como apache2 y bind9.…”
Section: Los Honeypots En La Detección De Amenazasunclassified