메뉴 건너뛰기




Volumn 10, Issue , 2015, Pages 47-58

Constructing cost-effective and targetable industrial control system honeypots for production networks

Author keywords

Honeypots; Industrial control systems; Production networks; Programmable logic controllers

Indexed keywords

COMPUTER CIRCUITS; COST EFFECTIVENESS; COSTS; PROGRAMMABLE LOGIC CONTROLLERS; PROGRAMMED CONTROL SYSTEMS;

EID: 84939266661     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2015.04.002     Document Type: Article
Times cited : (30)

References (13)
  • 1
    • 84939282033 scopus 로고    scopus 로고
    • 1756 ControlLogix Controllers, Technical Data, Publication 1756-TD001H-EN-P, Rockwell Automation, Milwaukee, Wisconsin ()
    • Allen-Bradley, 1756 ControlLogix Controllers, Technical Data, Publication 1756-TD001H-EN-P, Rockwell Automation, Milwaukee, Wisconsin (), 2013. http://www.literature.rockwellautomation.com/idc/groups/literature/documents/td/1756-td001_-en-p.pdf.
    • (2013)
    • Allen-Bradley1
  • 2
    • 84939282034 scopus 로고    scopus 로고
    • Emulating Industrial Control System Devices Using Gumstix Technology, M.S. Thesis, AFIT/GCO/ENG/12-13, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio ()
    • D. Berman, Emulating Industrial Control System Devices Using Gumstix Technology, M.S. Thesis, AFIT/GCO/ENG/12-13, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio (), 2012. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA563104.
    • (2012)
    • Berman, D.1
  • 4
    • 84939282035 scopus 로고    scopus 로고
    • Cybersecurity threats (), November 20, 2014.
    • C-SPAN, Cybersecurity threats (), November 20, 2014. http://www.c-span.org/video/?322853-1/hearing-cybersecurity-threats.
  • 5
    • 84939282036 scopus 로고    scopus 로고
    • INL's SCADA Test Bed, Idaho Falls, Idaho ()
    • Idaho National Laboratory, INL's SCADA Test Bed, Idaho Falls, Idaho (), 2014. http://www.4vip.inl.gov/research/national-supervisory-control-and-data-acquisition-test-bed.
    • (2014)
  • 6
    • 84939282037 scopus 로고    scopus 로고
    • M.S. Thesis, AFIT-ENG-13-M-27, Department of Electrical and Computer Engineering, Wright-Patterson Air Force Base, Ohio ()
    • R. Jaromin, Emulation of Industrial Control Field Device Protocols, M.S. Thesis, AFIT-ENG-13-M-27, Department of Electrical and Computer Engineering, Wright-Patterson Air Force Base, Ohio (), 2013. http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA582482.
    • (2013) Emulation of Industrial Control Field Device Protocols
    • Jaromin, R.1
  • 7
    • 70350218435 scopus 로고    scopus 로고
    • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
    • Sunnyvale, California
    • G. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Insecure.Com, Sunnyvale, California, 2008.
    • (2008) Insecure.Com
    • Lyon, G.1
  • 9
    • 84939282039 scopus 로고    scopus 로고
    • HONEYD(8), OpenBSD System Manager's Manual
    • N. Provos, HONEYD(8), OpenBSD System Manager's Manual (), 2002. http://www.citi.umich.edu/u/provos/honeyd/honeyd-man.pdf.
    • (2002)
    • Provos, N.1
  • 11
    • 84939282040 scopus 로고    scopus 로고
    • A portable C string replacement function: repl_str()
    • L. Shaw, A portable C string replacement function: repl_str(), creativeandcritical.net (), 2009. http://www.creativeandcritical.net/str-replace-c.
    • (2009) creativeandcritical.net
    • Shaw, L.1
  • 12
    • 1642516070 scopus 로고    scopus 로고
    • The Honeynet Project. Trapping the hackers
    • Spitzner L. The Honeynet Project. Trapping the hackers. IEEE Security and Privacy 2003, vol. 1(2):15-23.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 15-23
    • Spitzner, L.1
  • 13
    • 84883882106 scopus 로고    scopus 로고
    • SCADA Honeynets: The Attractiveness of Honeypots as Critical Infrastructure Security Tools for the Detection and Analysis of Advanced Threats
    • M.S. Thesis, Department of Electrical and Computer Engineering, Iowa State University, Ames, Iowa ()
    • S. Wade, SCADA Honeynets: The Attractiveness of Honeypots as Critical Infrastructure Security Tools for the Detection and Analysis of Advanced Threats, M.S. Thesis, Department of Electrical and Computer Engineering, Iowa State University, Ames, Iowa (), 2011. http://www.lib.dr.iastate.edu/cgi/viewcontent.cgi?article=3130&context=etd.
    • (2011)
    • Wade, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.