---- ===== DATETIME ===== ^ Title | | ^ Authors | | ^ Journal | | ^ URL | | ^ Summary | | Comments: * Questions: *
Title | DecIED: Scalable 𝑘-Anonymous Deception for IEC61850-Compliant Smart Grid Systems |
---|---|
Authors | Dianshi Yang, Daisuke Mashima, Wei Lin, Jianying Zhou |
Journal | CPSS '20, October 6, 2020, Taipei, Taiwan |
Context: Part of CS5321 Network Security module, whose lecturer is author (Mashima).
Novelty: Implemented a deception network for smart grid systems compliant with a substation standard IEC61850.
Mechanism:
Takeaways:
Title | CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks |
---|---|
Authors | Phuong M. Cao, Yuming Wu, and Subho S. Banerjee, UIUC; Justin Azoff and Alex Withers, NCSA; Zbigniew T. Kalbarczyk and Ravishankar K. Iyer, UIUC |
Journal | 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19) |
Novelty: Farming of SSH attacks on an /16
address space (65k hosts) within NCSA peer-to-peer global cluster, which are then used for auditing of production network which may host improperly secured SSH hosts.
Mechanism:
Threat model: Assume attackers perform SSH-credential guessing attacks, and are not aware of the honeypot address space.
Takeaways:
sshlib 0.1
), CVE-2018-10933 auth bypass (libssh2 1.7.0
), or fake SSH clients (PuTTy)