{"title":"aMDH和TWIN:两种原始的基于蜜罐的方法来保护无人机群","authors":"S. Chaumette, Titien Cubilier","doi":"10.1109/CSCI54926.2021.00192","DOIUrl":null,"url":null,"abstract":"Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based system they can thus be (and are) the target of attacks and the consequences of such attacks can be dramatic for assets and people. We believe an approach based on honeypots that would attract the attention of attackers and would behave so that these attackers could not even understand they are in a honeypot and not in a real drone, would be a significant step towards the protection of these systems. Even though some prototypes exist, they do not fully address the fact of luring the attacker to believe he/she controls a real drone. In this paper we present our work to address this issue.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones\",\"authors\":\"S. Chaumette, Titien Cubilier\",\"doi\":\"10.1109/CSCI54926.2021.00192\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based system they can thus be (and are) the target of attacks and the consequences of such attacks can be dramatic for assets and people. We believe an approach based on honeypots that would attract the attention of attackers and would behave so that these attackers could not even understand they are in a honeypot and not in a real drone, would be a significant step towards the protection of these systems. Even though some prototypes exist, they do not fully address the fact of luring the attacker to believe he/she controls a real drone. In this paper we present our work to address this issue.\",\"PeriodicalId\":206881,\"journal\":{\"name\":\"2021 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCI54926.2021.00192\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI54926.2021.00192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones
Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based system they can thus be (and are) the target of attacks and the consequences of such attacks can be dramatic for assets and people. We believe an approach based on honeypots that would attract the attention of attackers and would behave so that these attackers could not even understand they are in a honeypot and not in a real drone, would be a significant step towards the protection of these systems. Even though some prototypes exist, they do not fully address the fact of luring the attacker to believe he/she controls a real drone. In this paper we present our work to address this issue.