2015 48th Hawaii International Conference on System Sciences 2015
DOI: 10.1109/hicss.2015.619
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis

Abstract: Increasing situational awareness and investigating the cause of a software-induced cyber attack continues to be one of the most difficult yet important endeavors faced by network security professionals. Traditionally, these forensic pursuits are carried out by manually analyzing the malicious software agents at the heart of the incident, and then observing their interactions in a controlled environment. Both these steps are time consuming and difficult to maintain due to the ever changing nature of malicious s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Cyber deception aims at injecting intentionally falsified information to mislead the attackers during their attack planning stage. For example, the early honeypot systems [11], [12] intend to attract potential attackers to waste their time while in the meantime trying to learn attackers' strategies.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber deception aims at injecting intentionally falsified information to mislead the attackers during their attack planning stage. For example, the early honeypot systems [11], [12] intend to attract potential attackers to waste their time while in the meantime trying to learn attackers' strategies.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the "STUXNET" [4] virus that appeared in 2010 attacked the Iranian nuclear power plant system and caused serious damage; this was a warning that a great deal of attention needed to be paid to ICS security. Moreover, on December 23rd, 2015, the Ukrainian electric power network was attacked by BlackEnergy, which eventually led to system paralysis [5]. In other countries, their ICSs also face security problems.…”
Section: Introductionmentioning
confidence: 99%