[1] 范文斌. 工业控制协议安全防护分析[J]. 电子科学技术, 2015,2(3):334-337.(FAN W B. Analysis of security protection on industrial control protocol[J]. Electronic Science and Technology,2015,2(3):334-337.) [2] 国家计算机网络应急技术处理协调中心. 2011年中国互联网网络安全态势报告[J]. 信息网络安全,2012,12(4):98-100. (National Computer Network Emergency Response Technical Team/Coordination Center of China. 2011 China Internet network security situation report[J]. Netinfo Security,2012,12(4):98-100.) [3] GUPTA J N D, SHARMA S K. Handbook of Research on Information Security and Assurance[M]. Hershey, PA:Information Science Reference,2008:527-532. [4] NARUOKA H,MATSUTA M,MACHⅡ W,et al. ICS honeypot system(CamouflageNet) based on attacker's human factors[J]. Procedia Manufacturing,2015,3:1074-1081. [5] SIMÕES P,CRUZ T,PROENÇA J,et al. Specialized honeypots for SCADA systems[M]//LEHTO M,NEITTAANMÄKI P. Cyber Security:Analytics,Technology and Automation,ISCA 78. Cham:Springer,2015:251-269. [6] IRVENE C,FORMBY D,LITCHFIELD S,et al. HoneyBot:a honeypot for robotic systems[J]. Proceedings of the IEEE,2018, 106(1):61-70. [7] PROVOS N. A virtual honeypot framework[C]//Proceedings of the 13th USENIX Security Symposium. Berkeley:USENIX Association,2004:1-14. [8] POTHAMSETTY V, FRANZ M. SCADA HoneyNet project:building honeypots for industrial networks[EB/OL].[2019-10-29]. http://scadahoneynet.sourceforge.net/. [9] TAMMINEN U. Kippo-SSH honeypot[EB/OL].[2019-10-29]. https://github.com/desaster/kippo. [10] MushMush. Conpot:ICS/SCADA honeypot[EB/OL].[2019-04-06]. https://github.com/mushorg/conpot. [11] BUZA D I,JUHÁSZ F,MIRU G,et al. CryPLH:protecting smart energy systems from targeted attacks with a PLC honeypot[C]//Proceedings of the 2014 International Workshop on Smart Grid Security,LNCS 8448. Cham:Springer,2014:181-192. [12] Cowrie Project. Cowrie SSH/Telnet honeypot[EB/OL].[2019-10-29]. https://github.com/cowrie/cowrie. [13] LAU S,KLICK J,ARNDT S,et al. POSTER:towards highly interactive honeypots for industrial control systems[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM,2016:1823-1825. [14] LITCHFIELD S,FORMBY D,ROGERS J,et al. Rethinking the honeypot for cyber-physical systems[J]. IEEE Internet Computing,2016,20(5):9-17. [15] KYUNG S,HAN W,TIWARI N,et al. HoneyProxy:design and implementation of next-generation honeynet via SDN[C]//Proceedings of the 2017 IEEE Conference on Communications and Network Security. Piscataway:IEEE,2017:1-9. [16] 游建舟, 张悦阳, 吕世超, 等. 基于数据包分片的工控蜜罐识别方法[J]. 信息安全学报,2019,4(3):83-92.(YOU J Z, ZHANG Y Y, LYU S C, et al. Method of ICS honeypot identification based on packet-sharding[J]. Journal of Cyber Security,2019,4(3):83-92.) |