HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems

abstract: Utilities infrastructure like the electric grid have been the target of more sophisticated cyberattacks designed to disrupt their operation and create social unrest and economical losses. Just in 2016, a cyberattack targeted the Ukrainian power grid and successfully caused a blackout that...

Full description

Bibliographic Details
Other Authors: Lopez Morales, Efren (Author)
Format: Dissertation
Language:English
Published: 2020
Subjects:
ICS
PLC
Online Access:http://hdl.handle.net/2286/R.I.57069
id ndltd-asu.edu-item-57069
record_format oai_dc
spelling ndltd-asu.edu-item-570692020-06-02T03:01:13Z HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems abstract: Utilities infrastructure like the electric grid have been the target of more sophisticated cyberattacks designed to disrupt their operation and create social unrest and economical losses. Just in 2016, a cyberattack targeted the Ukrainian power grid and successfully caused a blackout that affected 225,000 customers. Industrial Control Systems (ICS) are a critical part of this infrastructure. Honeypots are one of the tools that help us capture attack data to better understand new and existing attack methods and strategies. Honeypots are computer systems purposefully left exposed to be broken into. They do not have any inherent value, instead, their value comes when attackers interact with them. However, state-of-the-art honeypots lack sophisticated service simulations required to obtain valuable data. Worst, they cannot adapt while ICS malware keeps evolving and attacks patterns are increasingly more sophisticated. This work presents HoneyPLC: A Next-Generation Honeypot for ICS. HoneyPLC is, the very first medium-interaction ICS honeypot, and includes advanced service simulation modeled after S7-300 and S7-1200 Siemens PLCs, which are widely used in real-life ICS infrastructures. Additionally, HoneyPLC provides much needed extensibility features to prepare for new attack tactics, e.g., exploiting a new vulnerability found in a new PLC model. HoneyPLC was deployed both in local and public environments, and tested against well-known reconnaissance tools used by attackers such as Nmap and Shodan's Honeyscore. Results show that HoneyPLC is in fact able to fool both tools with a high level of confidence. Also, HoneyPLC recorded high amounts of interesting ICS interactions from all around the globe, proving not only that attackers are in fact targeting ICS systems, but that HoneyPLC provides a higher level of interaction that effectively deceives them. Dissertation/Thesis Lopez Morales, Efren (Author) Doupe, Adam (Advisor) Ahn, Gail-Joon (Advisor) Rubio-Medrano, Carlos (Committee member) Arizona State University (Publisher) Computer science honeypot ICS PLC eng 67 pages Masters Thesis Computer Science 2020 Masters Thesis http://hdl.handle.net/2286/R.I.57069 http://rightsstatements.org/vocab/InC/1.0/ 2020
collection NDLTD
language English
format Dissertation
sources NDLTD
topic Computer science
honeypot
ICS
PLC
spellingShingle Computer science
honeypot
ICS
PLC
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
description abstract: Utilities infrastructure like the electric grid have been the target of more sophisticated cyberattacks designed to disrupt their operation and create social unrest and economical losses. Just in 2016, a cyberattack targeted the Ukrainian power grid and successfully caused a blackout that affected 225,000 customers. Industrial Control Systems (ICS) are a critical part of this infrastructure. Honeypots are one of the tools that help us capture attack data to better understand new and existing attack methods and strategies. Honeypots are computer systems purposefully left exposed to be broken into. They do not have any inherent value, instead, their value comes when attackers interact with them. However, state-of-the-art honeypots lack sophisticated service simulations required to obtain valuable data. Worst, they cannot adapt while ICS malware keeps evolving and attacks patterns are increasingly more sophisticated. This work presents HoneyPLC: A Next-Generation Honeypot for ICS. HoneyPLC is, the very first medium-interaction ICS honeypot, and includes advanced service simulation modeled after S7-300 and S7-1200 Siemens PLCs, which are widely used in real-life ICS infrastructures. Additionally, HoneyPLC provides much needed extensibility features to prepare for new attack tactics, e.g., exploiting a new vulnerability found in a new PLC model. HoneyPLC was deployed both in local and public environments, and tested against well-known reconnaissance tools used by attackers such as Nmap and Shodan's Honeyscore. Results show that HoneyPLC is in fact able to fool both tools with a high level of confidence. Also, HoneyPLC recorded high amounts of interesting ICS interactions from all around the globe, proving not only that attackers are in fact targeting ICS systems, but that HoneyPLC provides a higher level of interaction that effectively deceives them. === Dissertation/Thesis === Masters Thesis Computer Science 2020
author2 Lopez Morales, Efren (Author)
author_facet Lopez Morales, Efren (Author)
title HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
title_short HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
title_full HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
title_fullStr HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
title_full_unstemmed HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
title_sort honeyplc: a next-generation honeypot for industrial control systems
publishDate 2020
url http://hdl.handle.net/2286/R.I.57069
_version_ 1719315735684055040