Proceedings of the ACM Workshop on Cyber-Physical Systems Security &Amp; Privacy - CPS-SPC'19 2019
DOI: 10.1145/3338499.3357361
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots

Abstract: Industrial Control Systems (ICS) are nowadays interconnected with various networks and, ultimately, with the Internet. Due to this exposure, malicious actors are interested into compromising ICSnot only for advanced and targeted attacks, but also in the context of more frequent network scanning and mass exploiting of directly Internet-exposed devices. To understand the level of interest towards Internet-connected ICS, we deploy a scalable network of low-interaction ICS honeypots based on the popular conpot fra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…1,2 Such scan results can be used to asses the security of ICS in individual countries. 12 ICS scans are dominated by few recurrent scanners 13 and captured within few days by honeypot deployments. 1 Mirian et al 2 measured the increase of open ICS services of up to 20 % in 4 months.…”
Section: A Glimpse Into Ics Protocol Securitymentioning
confidence: 99%
“…1,2 Such scan results can be used to asses the security of ICS in individual countries. 12 ICS scans are dominated by few recurrent scanners 13 and captured within few days by honeypot deployments. 1 Mirian et al 2 measured the increase of open ICS services of up to 20 % in 4 months.…”
Section: A Glimpse Into Ics Protocol Securitymentioning
confidence: 99%
“…Ferretti et al [120] aimed to analyze the scanning traffic on the Internet that is targeting ICS. To analyze the scanners and their behaviors, the authors deployed several low interaction Conpot honeypots.…”
Section: Cao Et Al Proposed a Distributed Ics Honeypot Calledmentioning
confidence: 99%
“…We believe that IP address lookup for the traffic sources can provide information on the benign origins of the decoy traffic. In addition, analysis of Ferretti et al [120] on the scanning patterns of legitimate scanners such as Shodan can give clues to researchers on discriminating legitimate traffic.…”
Section: Machine Learningmentioning
confidence: 99%
“…It is Ferretti and colleagues' objective [19] to analyze the Internet scanning traffic that is aiming at ICS in order to find out. Several low interaction Conpot honeypots were analyzed by the authors in order to study the scanning behavior of the scanners.…”
Section: More Iot Honeypotsmentioning
confidence: 99%