Yanbin Sun1, Xiaojun Pan1, Chao Xu2, Penggang Sun2, Quanlong Guan3, Mohan Li1, *, Men Han4
CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1723-1737, 2020, DOI:10.32604/cmc.2020.010593
- 20 August 2020
Abstract The security issues of industrial control systems (ICSs) have become
increasingly prevalent. As an important part of ICS security, honeypots and antihoneypots have become the focus of offensive and defensive confrontation. However,
research on ICS honeypots still lacks breakthroughs, and it is difficult to simulate real
ICS devices perfectly. In this paper, we studied ICS honeypots to identify and address
their weaknesses. First, an intelligent honeypot identification framework is proposed,
based on which feature data type requirements and feature data acquisition for honeypot
identification is studied. Inspired by vulnerability mining, we propose a feature
acquisition More >