HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
abstract: Utilities infrastructure like the electric grid have been the target of more sophisticated cyberattacks designed to disrupt their operation and create social unrest and economical losses. Just in 2016, a cyberattack targeted the Ukrainian power grid and successfully caused a blackout that...
Other Authors: | |
---|---|
Format: | Dissertation |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://hdl.handle.net/2286/R.I.57069 |
id |
ndltd-asu.edu-item-57069 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-asu.edu-item-570692020-06-02T03:01:13Z HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems abstract: Utilities infrastructure like the electric grid have been the target of more sophisticated cyberattacks designed to disrupt their operation and create social unrest and economical losses. Just in 2016, a cyberattack targeted the Ukrainian power grid and successfully caused a blackout that affected 225,000 customers. Industrial Control Systems (ICS) are a critical part of this infrastructure. Honeypots are one of the tools that help us capture attack data to better understand new and existing attack methods and strategies. Honeypots are computer systems purposefully left exposed to be broken into. They do not have any inherent value, instead, their value comes when attackers interact with them. However, state-of-the-art honeypots lack sophisticated service simulations required to obtain valuable data. Worst, they cannot adapt while ICS malware keeps evolving and attacks patterns are increasingly more sophisticated. This work presents HoneyPLC: A Next-Generation Honeypot for ICS. HoneyPLC is, the very first medium-interaction ICS honeypot, and includes advanced service simulation modeled after S7-300 and S7-1200 Siemens PLCs, which are widely used in real-life ICS infrastructures. Additionally, HoneyPLC provides much needed extensibility features to prepare for new attack tactics, e.g., exploiting a new vulnerability found in a new PLC model. HoneyPLC was deployed both in local and public environments, and tested against well-known reconnaissance tools used by attackers such as Nmap and Shodan's Honeyscore. Results show that HoneyPLC is in fact able to fool both tools with a high level of confidence. Also, HoneyPLC recorded high amounts of interesting ICS interactions from all around the globe, proving not only that attackers are in fact targeting ICS systems, but that HoneyPLC provides a higher level of interaction that effectively deceives them. Dissertation/Thesis Lopez Morales, Efren (Author) Doupe, Adam (Advisor) Ahn, Gail-Joon (Advisor) Rubio-Medrano, Carlos (Committee member) Arizona State University (Publisher) Computer science honeypot ICS PLC eng 67 pages Masters Thesis Computer Science 2020 Masters Thesis http://hdl.handle.net/2286/R.I.57069 http://rightsstatements.org/vocab/InC/1.0/ 2020 |
collection |
NDLTD |
language |
English |
format |
Dissertation |
sources |
NDLTD |
topic |
Computer science honeypot ICS PLC |
spellingShingle |
Computer science honeypot ICS PLC HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems |
description |
abstract: Utilities infrastructure like the electric grid have been the target of more sophisticated cyberattacks designed to disrupt their operation and create social unrest and economical losses. Just in 2016, a cyberattack targeted the Ukrainian power grid and successfully caused a blackout that affected 225,000 customers.
Industrial Control Systems (ICS) are a critical part of this infrastructure. Honeypots are one of the tools that help us capture attack data to better understand new and existing attack methods and strategies. Honeypots are computer systems purposefully left exposed to be broken into. They do not have any inherent value, instead, their value comes when attackers interact with them. However, state-of-the-art honeypots lack sophisticated service simulations required to obtain valuable data.
Worst, they cannot adapt while ICS malware keeps evolving and attacks patterns are increasingly more sophisticated.
This work presents HoneyPLC: A Next-Generation Honeypot for ICS. HoneyPLC is, the very first medium-interaction ICS honeypot, and includes advanced service simulation modeled after S7-300 and S7-1200 Siemens PLCs, which are widely used in real-life ICS infrastructures.
Additionally, HoneyPLC provides much needed extensibility features to prepare for new attack tactics, e.g., exploiting a new vulnerability found in a new PLC model.
HoneyPLC was deployed both in local and public environments, and tested against well-known reconnaissance tools used by attackers such as Nmap and Shodan's Honeyscore. Results show that HoneyPLC is in fact able to fool both tools with a high level of confidence. Also, HoneyPLC recorded high amounts of interesting ICS interactions from all around the globe, proving not only that attackers are in fact targeting ICS systems, but that HoneyPLC provides a higher level of interaction that effectively deceives them. === Dissertation/Thesis === Masters Thesis Computer Science 2020 |
author2 |
Lopez Morales, Efren (Author) |
author_facet |
Lopez Morales, Efren (Author) |
title |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems |
title_short |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems |
title_full |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems |
title_fullStr |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems |
title_full_unstemmed |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems |
title_sort |
honeyplc: a next-generation honeypot for industrial control systems |
publishDate |
2020 |
url |
http://hdl.handle.net/2286/R.I.57069 |
_version_ |
1719315735684055040 |