Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Honeypot (computing)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Industrial Control Systems honeypot === [[Industrial control system|Industrial Control Systems]] (ICS) are often the target of cyberattacks.<ref>{{Cite journal |last=Langner |first=Ralph |date=May 2011 |title=Stuxnet: Dissecting a Cyberwarfare Weapon |url=https://ieeexplore.ieee.org/document/5772960 |journal=IEEE Security & Privacy |volume=9 |issue=3 |pages=49–51 |doi=10.1109/MSP.2011.67 |s2cid=206485737 |issn=1558-4046|url-access=subscription }}</ref> One of the main targets within ICS are [[Programmable logic controller|Programmable Logic Controllers]].<ref>{{Cite journal |last1=Stouffer |first1=Keith |last2=Falco |first2=Joe |last3=Scarfone |first3=Karen |date=June 2011 |title=Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) |url=http://dx.doi.org/10.6028/nist.sp.800-82|website=NIST Publications|number=NIST Special Publication (SP) 800-82 |location=Gaithersburg, MD|doi=10.6028/nist.sp.800-82|pages=155 pages|doi-access=free}}</ref> In order to understand intruders' techniques in this context, several honeypots have been proposed. Conpot <ref>{{Cite book |last1=Jicha |first1=Arthur |last2=Patton |first2=Mark |last3=Chen |first3=Hsinchun |title=2016 IEEE Conference on Intelligence and Security Informatics (ISI) |chapter=SCADA honeypots: An in-depth analysis of Conpot |date=September 2016 |chapter-url=https://ieeexplore.ieee.org/document/7745468 |pages=196–198 |doi=10.1109/ISI.2016.7745468|isbn=978-1-5090-3865-7 |s2cid=14996905 }}</ref><ref>{{Citation |title=Conpot |date=2023-06-23 |url=https://github.com/mushorg/conpot |access-date=2023-06-24 |publisher=MushMush}}</ref> is a low interaction honeypot capable of simulation Siemens PLCs. HoneyPLC is a medium interaction honeypot that can simulate Siemens, Rockwell and other PLC brands.<ref>{{Cite book |last1=López-Morales |first1=Efrén |title=Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security |last2=Rubio-Medrano |first2=Carlos |last3=Doupé |first3=Adam |last4=Shoshitaishvili |first4=Yan |last5=Wang |first5=Ruoyu |last6=Bao |first6=Tiffany |last7=Ahn |first7=Gail-Joon |date=2020-11-02 |publisher=Association for Computing Machinery |isbn=978-1-4503-7089-9 |series=CCS '20 |location=New York, NY, USA |pages=279–291 |chapter=HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems |doi=10.1145/3372297.3423356 |hdl=2286/R.I.57069 |author-link7=Gail-Joon Ahn |chapter-url=https://dl.acm.org/doi/10.1145/3372297.3423356 |s2cid=226228191}}</ref><ref>{{Citation |title=HoneyPLC |date=2023-05-24 |url=https://github.com/sefcom/honeyplc |access-date=2023-06-24 |publisher=SEFCOM}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)