Score: 1

A Cyber-Twin Based Honeypot for Gathering Threat Intelligence

Published: September 11, 2025 | arXiv ID: 2509.09222v1

By: Muhammad Azmi Umer , Zhan Xuna , Yan Lin Aung and more

Potential Business Impact:

Protects water plants by tricking hackers.

Business Areas:
Intrusion Detection Information Technology, Privacy and Security

Critical Infrastructure (CI) is prone to cyberattacks. Several techniques have been developed to protect CI against such attacks. In this work, we describe a honeypot based on a cyber twin for a water treatment plant. The honeypot is intended to serve as a realistic replica of a water treatment plant that attracts potential attackers. The attacks launched on the honeypot are recorded and analyzed for threat intelligence. The intelligence so obtained is shared with the management of water treatment plants, who in turn may use it to improve plant protection systems. The honeypot used here is operational and has been attacked on several occasions using, for example, a ransomware attack that is described in detail.

Country of Origin
πŸ‡ΈπŸ‡¬ πŸ‡¬πŸ‡§ Singapore, United Kingdom

Page Count
9 pages

Category
Computer Science:
Cryptography and Security