Home > Research > Publications & Outputs > These aren’t the PLCs you’re looking for

Electronic data

  • TNSM3361915

    Accepted author manuscript, 3.44 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

Research output: Contribution to Journal/MagazineJournal articlepeer-review

E-pub ahead of print

Standard

These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots. / Maesschalck, Sam; Fantom, Will; Giotsas, Vasileios et al.
In: IEEE Transactions on Network and Service Management, 05.02.2024.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Maesschalck S, Fantom W, Giotsas V, Race N. These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots. IEEE Transactions on Network and Service Management. 2024 Feb 5. Epub 2024 Feb 5. doi: 10.1109/TNSM.2024.3361915

Author

Bibtex

@article{00006b6459a949b7a6d88fc73d25bc2e,
title = "These aren{\textquoteright}t the PLCs you{\textquoteright}re looking for: Obfuscating PLCs to mimic Honeypots",
abstract = "Industry 4.0 and the trend of connecting legacy Industrial Control Systems (ICSs) to public networks have exposed these systems to various online threats. To combat these threats, honeypots have been widely used to provide proactive monitoring, detection and deception security capabilities. However, skilled attackers are now adept at fingerprinting and avoiding honeypots. Therefore, we take a fundamentally different approach in this paper. Instead of the honeypot representing a real system, we deploy it as a deterrent. Through obfuscation, the aim is to make an attacker believe the real system is a honeypot and collect threat intelligence data on the attacker. To achieve this, we introduce a new obfuscation technique that allows real ICSs to present themselves as honeypots. By taking advantage of honeypot fingerprinting techniques, we are able to deter attackers from interacting with the real Programmable Logic Controller (PLC) within the industrial network. The approach is implemented and evaluated using different penetration testing tools and an expert evaluation highlighting the benefits of obfuscation in that potential adversaries would be misled into assuming the PLC is a honeypot.",
author = "Sam Maesschalck and Will Fantom and Vasileios Giotsas and Nicholas Race",
year = "2024",
month = feb,
day = "5",
doi = "10.1109/TNSM.2024.3361915",
language = "English",
journal = "IEEE Transactions on Network and Service Management",
issn = "1932-4537",
publisher = "IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC",

}

RIS

TY - JOUR

T1 - These aren’t the PLCs you’re looking for

T2 - Obfuscating PLCs to mimic Honeypots

AU - Maesschalck, Sam

AU - Fantom, Will

AU - Giotsas, Vasileios

AU - Race, Nicholas

PY - 2024/2/5

Y1 - 2024/2/5

N2 - Industry 4.0 and the trend of connecting legacy Industrial Control Systems (ICSs) to public networks have exposed these systems to various online threats. To combat these threats, honeypots have been widely used to provide proactive monitoring, detection and deception security capabilities. However, skilled attackers are now adept at fingerprinting and avoiding honeypots. Therefore, we take a fundamentally different approach in this paper. Instead of the honeypot representing a real system, we deploy it as a deterrent. Through obfuscation, the aim is to make an attacker believe the real system is a honeypot and collect threat intelligence data on the attacker. To achieve this, we introduce a new obfuscation technique that allows real ICSs to present themselves as honeypots. By taking advantage of honeypot fingerprinting techniques, we are able to deter attackers from interacting with the real Programmable Logic Controller (PLC) within the industrial network. The approach is implemented and evaluated using different penetration testing tools and an expert evaluation highlighting the benefits of obfuscation in that potential adversaries would be misled into assuming the PLC is a honeypot.

AB - Industry 4.0 and the trend of connecting legacy Industrial Control Systems (ICSs) to public networks have exposed these systems to various online threats. To combat these threats, honeypots have been widely used to provide proactive monitoring, detection and deception security capabilities. However, skilled attackers are now adept at fingerprinting and avoiding honeypots. Therefore, we take a fundamentally different approach in this paper. Instead of the honeypot representing a real system, we deploy it as a deterrent. Through obfuscation, the aim is to make an attacker believe the real system is a honeypot and collect threat intelligence data on the attacker. To achieve this, we introduce a new obfuscation technique that allows real ICSs to present themselves as honeypots. By taking advantage of honeypot fingerprinting techniques, we are able to deter attackers from interacting with the real Programmable Logic Controller (PLC) within the industrial network. The approach is implemented and evaluated using different penetration testing tools and an expert evaluation highlighting the benefits of obfuscation in that potential adversaries would be misled into assuming the PLC is a honeypot.

U2 - 10.1109/TNSM.2024.3361915

DO - 10.1109/TNSM.2024.3361915

M3 - Journal article

JO - IEEE Transactions on Network and Service Management

JF - IEEE Transactions on Network and Service Management

SN - 1932-4537

ER -