Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus and EDR (End Point Detection and Response) aim to detect and prevent threats; such security mechanisms are reactive. This approach did not prove to be effective in protecting against stea...
Main Authors: | Abdul Basit Ajmal, Masoom Alam, Awais Abdul Khaliq, Shawal Khan, Zakria Qadir, M. A. Parvez Mahmud |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9531651/ |
Similar Items
-
Prototyping Bespoke Sensor Industrial Internet-of-Things (IIoT) Systems for Small and Medium Enterprises (SMEs)
by: Nikolay G. Petrov, et al.
Published: (2023-11-01) -
TTAS: Trusted Token Authentication Service of Securing SCADA Network in Energy Management System for Industrial Internet of Things
by: Yu-Sheng Yang, et al.
Published: (2021-04-01) -
Accurate threat hunting in industrial internet of things edge devices
by: Abbas Yazdinejad, et al.
Published: (2023-10-01) -
Influence of Network Size on Adversarial Decisions in a Deception Game Involving Honeypots
by: Harsh Katakwar, et al.
Published: (2020-09-01) -
A Security, Privacy and Trust Methodology for IIoT
by: Lifeng Chen, et al.
Published: (2021-01-01)