{"title":"了解你的敌人:利用蜜罐分析针对工业控制系统的网络威胁","authors":"S. M. Z. Ur Rashid, M. J. Uddin, Md. Ariful Islam","doi":"10.1109/RAAICON48939.2019.69","DOIUrl":null,"url":null,"abstract":"Industrial Control System (ICS) devices are being increasingly targeted by cyber attackers due to the lack of internet-ready security controls. IDS, firewall, IPS, and other protection measures are often used to prevent attacks on these systems but their efficiency depends on the prior knowledge of the attack patterns. In case of sophisticated and new attacks, they can't detect and take proper security measures. In this study, we deploy three low-interactive multi-platform honeypot in three different locations to lure cybercriminals to attack the networks. We perform large-scale analysis to observe current attack trends toward Industrial Control System (ICS), capture adversaries malicious activities and techniques for adaptive threat defense in the future.","PeriodicalId":102214,"journal":{"name":"2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Know Your Enemy: Analysing Cyber-threats Against Industrial Control Systems Using Honeypot\",\"authors\":\"S. M. Z. Ur Rashid, M. J. Uddin, Md. Ariful Islam\",\"doi\":\"10.1109/RAAICON48939.2019.69\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Industrial Control System (ICS) devices are being increasingly targeted by cyber attackers due to the lack of internet-ready security controls. IDS, firewall, IPS, and other protection measures are often used to prevent attacks on these systems but their efficiency depends on the prior knowledge of the attack patterns. In case of sophisticated and new attacks, they can't detect and take proper security measures. In this study, we deploy three low-interactive multi-platform honeypot in three different locations to lure cybercriminals to attack the networks. We perform large-scale analysis to observe current attack trends toward Industrial Control System (ICS), capture adversaries malicious activities and techniques for adaptive threat defense in the future.\",\"PeriodicalId\":102214,\"journal\":{\"name\":\"2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RAAICON48939.2019.69\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAAICON48939.2019.69","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Know Your Enemy: Analysing Cyber-threats Against Industrial Control Systems Using Honeypot
Industrial Control System (ICS) devices are being increasingly targeted by cyber attackers due to the lack of internet-ready security controls. IDS, firewall, IPS, and other protection measures are often used to prevent attacks on these systems but their efficiency depends on the prior knowledge of the attack patterns. In case of sophisticated and new attacks, they can't detect and take proper security measures. In this study, we deploy three low-interactive multi-platform honeypot in three different locations to lure cybercriminals to attack the networks. We perform large-scale analysis to observe current attack trends toward Industrial Control System (ICS), capture adversaries malicious activities and techniques for adaptive threat defense in the future.