Home > Research > Publications & Outputs > World Wide ICS Honeypots

Electronic data

  • World Wide ICS Honeypots

    Final published version, 647 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

View graph of relations

World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Published

Standard

World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots. / Maesschalck, Sam; Giotsas, Vasileios; Race, Nicholas.
2021. Paper presented at Industrial Control System Security Workshop, Austin, Texas, United States.

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Harvard

Maesschalck, S, Giotsas, V & Race, N 2021, 'World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots', Paper presented at Industrial Control System Security Workshop, Austin, United States, 7/12/21 - 7/12/21.

APA

Maesschalck, S., Giotsas, V., & Race, N. (2021). World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots. Paper presented at Industrial Control System Security Workshop, Austin, Texas, United States.

Vancouver

Maesschalck S, Giotsas V, Race N. World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots. 2021. Paper presented at Industrial Control System Security Workshop, Austin, Texas, United States.

Author

Maesschalck, Sam ; Giotsas, Vasileios ; Race, Nicholas. / World Wide ICS Honeypots : A Study into the Deployment of Conpot Honeypots. Paper presented at Industrial Control System Security Workshop, Austin, Texas, United States.

Bibtex

@conference{f88c9bad56cd438bba0a5bc7d27fe2c0,
title = "World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots",
abstract = "Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary within ICS environments. A well-known ICS honeypot, Conpot, is popular and has been deployed on a large scale. These deployments are not always correctly configured and have odd characteristics compared to a real industrial control system. This paper explores several common Conpot signatures and deployments found through internet search engines such as Shodan. We identify that the default deployment of Conpot is not enough when deploying a honeypot. Afterwards, we explore the behaviour of a real PLC when conducting the same reconnaissance operations. To verify these red flags, we deploy three honeypots with a different configuration, have them scanned by Shodan and evaluate the traffic they get. Our experiments indicate that Shodan leverages CIP for ICS classification. We conclude that proper deployment of a low-interaction honeypot, such as Conpot, requires time and resources to entirely obfuscate the device and fool the attacker to a limited level. However, small changes to the default configuration does increase the performance of Conpot and results in more returning traffic.",
keywords = "Honeypots, Conpot, Industrial Control Systems, ICS, Security, Critical infrastructure",
author = "Sam Maesschalck and Vasileios Giotsas and Nicholas Race",
year = "2021",
month = dec,
day = "7",
language = "English",
note = "Industrial Control System Security Workshop, ICSS ; Conference date: 07-12-2021 Through 07-12-2021",

}

RIS

TY - CONF

T1 - World Wide ICS Honeypots

T2 - Industrial Control System Security Workshop

AU - Maesschalck, Sam

AU - Giotsas, Vasileios

AU - Race, Nicholas

N1 - Conference code: 7

PY - 2021/12/7

Y1 - 2021/12/7

N2 - Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary within ICS environments. A well-known ICS honeypot, Conpot, is popular and has been deployed on a large scale. These deployments are not always correctly configured and have odd characteristics compared to a real industrial control system. This paper explores several common Conpot signatures and deployments found through internet search engines such as Shodan. We identify that the default deployment of Conpot is not enough when deploying a honeypot. Afterwards, we explore the behaviour of a real PLC when conducting the same reconnaissance operations. To verify these red flags, we deploy three honeypots with a different configuration, have them scanned by Shodan and evaluate the traffic they get. Our experiments indicate that Shodan leverages CIP for ICS classification. We conclude that proper deployment of a low-interaction honeypot, such as Conpot, requires time and resources to entirely obfuscate the device and fool the attacker to a limited level. However, small changes to the default configuration does increase the performance of Conpot and results in more returning traffic.

AB - Honeypots are a well-known concept used for threat intelligence and are becoming more ordinary within ICS environments. A well-known ICS honeypot, Conpot, is popular and has been deployed on a large scale. These deployments are not always correctly configured and have odd characteristics compared to a real industrial control system. This paper explores several common Conpot signatures and deployments found through internet search engines such as Shodan. We identify that the default deployment of Conpot is not enough when deploying a honeypot. Afterwards, we explore the behaviour of a real PLC when conducting the same reconnaissance operations. To verify these red flags, we deploy three honeypots with a different configuration, have them scanned by Shodan and evaluate the traffic they get. Our experiments indicate that Shodan leverages CIP for ICS classification. We conclude that proper deployment of a low-interaction honeypot, such as Conpot, requires time and resources to entirely obfuscate the device and fool the attacker to a limited level. However, small changes to the default configuration does increase the performance of Conpot and results in more returning traffic.

KW - Honeypots

KW - Conpot

KW - Industrial Control Systems

KW - ICS

KW - Security

KW - Critical infrastructure

M3 - Conference paper

Y2 - 7 December 2021 through 7 December 2021

ER -