Robot Developed To Protect Factories From Cyber-Threats

HoneyBot is tiny enough to get into a shoebox; however, this robot on 4 wheels has much immense undertaking: keeping factories and other such huge facilities protected from the hackers. Built by a research team from the Georgia Institute of Technology, this little tool is developed to decoy in digital troublemakers who have placed their views on industrial facilities. The bad actors will be tricked by the HoneyBot into giving up helpful data to the cyber-security experts.


Robot Developed To Protect Factories From Cyber-ThreatsThe decoy robot surfaces as progressively more tools—never developed to work on the Internet—are emerging online in factories and homes equally, bringing up a new array of opportunities for the hackers seeking to cause destruction in both the physical and digital world.

The Internet security experts long have used decoy computer systems called “honeypots” as a means to shake cyber-attackers off the stalk. The researchers used the identical notion to the HoneyBot that is partly sponsored with an endowment from the National Science Foundation. After access is gained by the hackers to the decoy, useful data is left behind that can assist firms further to protect their networks.

The device can be supervised and managed via the Internet. However, contrasting other remote-controlled bots, the unique capability of the HoneyBot is hoaxing its operators into believing it is executing one assignment, when, in fact, it is executing something entirely different. In a factory location, such a HoneyBot robot can take an immobile seat in a corner, coming to life when an intruder achieves access—an image pointer that a malicious actor is aiming the facility.

Instead of letting the intruder to then go on a rampage in the physical world, the bot can be developed to pursue specific commands considered risk-free—such as wandering leisurely around or lifting up items—but discontinuing short of really executing anything hazardous.

Recommended For You

Leave a Reply

Your email address will not be published. Required fields are marked *