Show simple item record

dc.contributor.advisorBeyah, Raheem A.
dc.contributor.authorLitchfield, Samuel Lewis
dc.date.accessioned2017-06-07T17:49:22Z
dc.date.available2017-06-07T17:49:22Z
dc.date.created2017-05
dc.date.issued2017-04-28
dc.date.submittedMay 2017
dc.identifier.urihttp://hdl.handle.net/1853/58329
dc.description.abstractCyber Physical Systems (CPS) are vulnerable systems, and attacks are currently being carried out against them. Some of these attacks have never been seen before, and so the first step in defending CPS is to understand what attackers are doing, and how they are doing it. Traditionally, honeypots have been a tool used to gain this information, but honeypots need to be convincing to fool attackers. For CPS, being convincing entails not only ad- dressing networking concerns, but also modeling device actuation fingerprints and how the attached process responds to actuations. In order to create a convincing CPS honeypot, a framework was developed to address the need to present convincing networking, device, and process fingerprints. Two proof of concept systems were developed for this framework, and a set of proof of concept device and process models were implemented.
dc.format.mimetypeapplication/pdf
dc.language.isoen_US
dc.publisherGeorgia Institute of Technology
dc.subjectCyber-physical systems
dc.subjectCPS
dc.subjectHoneypots
dc.subjectModeling
dc.subjectProcess modeling
dc.subjectDevice modeling
dc.subjectContainers
dc.titleHoneyPhy: A physics-aware CPS honeypot framework
dc.typeThesis
dc.description.degreeM.S.
dc.contributor.departmentElectrical and Computer Engineering
thesis.degree.levelMasters
dc.contributor.committeeMemberMeliopoulos, Sakis A. P.
dc.contributor.committeeMemberOwen, Henry L.
dc.date.updated2017-06-07T17:49:22Z


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record