These are Not the PLCs You are Looking for: Obfuscating PLCs to Mimic Honeypots

被引:1
|
作者
Maesschalck, Sam [1 ,2 ]
Fantom, Will [2 ]
Giotsas, Vasileios [2 ]
Race, Nicholas [2 ]
机构
[1] Cybersecur Serv, RHEA Grp, B-6890 Redu, Belgium
[2] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4WA, England
基金
英国工程与自然科学研究理事会;
关键词
Industrial control systems; ICS; programmable logic controllers; PLC; honeypots; security; software-defined networking; ANTI-HONEYPOT;
D O I
10.1109/TNSM.2024.3361915
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industry 4.0 and the trend of connecting legacy Industrial Control Systems (ICSs) to public networks have exposed these systems to various online threats. To combat these threats, honeypots have been widely used to provide proactive monitoring, detection and deception security capabilities. However, skilled attackers are now adept at fingerprinting and avoiding honeypots. Therefore, we take a fundamentally different approach in this paper. Instead of the honeypot representing a real system, we deploy it as a deterrent. Through obfuscation, the aim is to make an attacker believe the real system is a honeypot and collect threat intelligence data on the attacker. To achieve this, we introduce a new obfuscation technique that allows real ICSs to present themselves as honeypots. By taking advantage of honeypot fingerprinting techniques, we are able to deter attackers from interacting with the real Programmable Logic Controller (PLC) within the industrial network. The approach is implemented and evaluated using different penetration testing tools and an expert evaluation highlighting the benefits of obfuscation in that potential adversaries would be misled into assuming the PLC is a honeypot.
引用
收藏
页码:3623 / 3635
页数:13
相关论文
共 50 条