Analysis of Conpot and Its BACnet Features for Cyber-Deception
2021; Springer International Publishing; Linguagem: Inglês
10.1007/978-3-030-71017-0_23
ISSN2569-7072
AutoresWarren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling,
Tópico(s)Security and Verification in Computing
ResumoThere is an increasing awareness of the cybersecurity issues around SCADA/ICS systems that are the cyber-physical connectors of our industrialized world to the Internet. Alerton’s BACtalk VAV-DD controller is an example of a multipurpose SCADA device that provides autonomous pressure control for any dual-duct VAV container using the BACnet protocol. The majority of devices functioning on the BACnet protocol are legacy deployments, which are difficult to secure. Therefore, SCADA honeypots such as Conpot are significant tools not only for regulating threats affecting SCADA devices such as the VAV-DD controller but also for the early detection of probable malicious tampering within a SCADA environment. This chapter analyzes the templates of the Conpot honeypot with special emphasis on the default template.xml file and the bacnet.xml protocol file and their potential to be used deceptively.
Referência(s)