PLC Honeypots: Enhancing Interaction-Level Assessment
Abstract
:1. Introduction
2. Materials and Methods
- What are the explicit and implicit PLC features that can be used to classify the interaction level of PLC honeypots?
3. Background
3.1. Honeypots
3.2. Programmable Logic Controllers
3.3. Honeypot Decoy Systems in IT and OT
3.4. Related Work on OT Honeypots
4. Results
4.1. PLC-Specific Features
4.1.1. System
R. | System | Service | Token | Virtual/Physical |
---|---|---|---|---|
[7] | Firmware images, simulation of OS fingerprints, Ubuntu OS | SSH, Telnet, DNS, NTP, SIP, SMTP, banner interactions, TCP requests, authentication, detection of ports connection, logic defined responses to attackers inputs, Modbus TCP, FTP, HTTP, SNMP, S7comm, PLC program-related services (compile, interpret, load), network traffic response configuration, average response time for Nmap scans, support to application layer protocols, CWMP, higher-fidelity ICS protocol simulations (functions and subfunctions), firewall | PLC program file, fake files on file server, fake company profile with employees data | Docker, Amazon AWS, local virtual machines (Ubuntu), local virtual equipment, local real equipment |
[16] | Network topology, network configuration, Fingerprint Resistance, Linux Oss | Expanded the simulation level of various protocols, STEP7, GOOSE, MMS, support for AI and AO to Modbus TCP protocol, IEC 104, DNP3, ICCP, passive x active protocols mode, adjustable response latencies | N/A | Linux virtual machines, Siemens ET200S PLC emulation |
[3] | Network-related features, limited fingerprint ability, firewalls, ring topology, | Static or dynamic data for PLC/HMI input and output processing, IP packet information, STEP7, HTTP(S), SNMP, accessible ports, process environment simulation, malicious software writing in the honeypot, traffic emulation, web interface, implementation of function codes of Modbus, plant simulation, real operator interactions, traffic latency, changes frequency, TCP, UDP, serial connections, MC7 instructions, PLC program loading, PLC execution delay | HMI software, PLC programs | PLC virtual mimicking, Ubuntu virtual machine, HMI virtual mimicking, real RTU, Amazon cloud infrastructure, multiple virtual machines on the same hosts, Siemens S7 314C simulation |
[15] | Network topology, fingerprint of ICS system, | Simulation of physical process, ICS networking, time constraints, determinism constraints, network parameters (link shaping, infrastructure, protocols, advanced traffic properties), physical metrics (process simulation, sensor readings simulation, simulation of human operations), PLC commands (get, set, receive), vulnerability in gateway device allowing root shell access | PLC control logic | Virtual PLC, virtual switch, hardware-in-the-loop simulation, victual gateway, virtual sensors |
[27] | OS fingerprint simulation, firmware version | Passive protocols connection with simple response messages, high fidelity simulation of ICS protocols, devices simulation, TCP handshake mechanism simulation, TCP, HTTP, FTP, Modbus, S7comm, BACnet, SNMP, IPMI, Guardian_Ast, Kamstrup, software information, response time, interaction depth, web interface, API, protocols function codes, malicious PLC commands | N/A | Docker, web visualization, virtual machine |
[28] | Fingerprint analysis | Support of several function and subfunction codes of PLC and ICS protocols, Modbus, S7comm, BACnet, SNMP, IPMI, HTTP(S), Kamstrup, web and API query interface, PROFIBUS, MPI, PLC commands (Stop, Request Download, Download Block, Download End, Download Start, Upload, Upload End), PLC operation codes (Hot Run, Cold Run), real data from S7-300 responses (static data) | PLC control logic | Amazon AWS, real Allen-Bradley ControlLogix 1756-L61 PLC, Docker, virtual machine, S7-300 PLC simulation |
[24] | Network topology | Model-based simulation of physical process, static data from real devices mimicking sensors and actuators, PLC interactions, PLC control routines, Modbus TCP (function codes to read input register- 04, and write single coil -05, among others) | N/A | SDN, real PLCs, virtualized environment |
[29] | Network topology, accurate TCP/IP Stack fingerprints for each Siemens PLC simulation | S7comm, Modbus, HTTP, SNMP, PLC memory blocks | PLC profile file, XML templates | Real router, real HMI, virtual PLCs, SCADA WinCC software, TIA Portal v14 software, real Siemens PLCs (S7-200) |
[30] | Dedicated server, network topology | Realistic process simulation, correct action/reaction behavior for attackers interaction involving state change, SCADA HMI screens, real time processing, network latency, stability, schedule maintenance stops, scheduled operations, scheduled equipment failure simulation, all S7comm and Modbus functions | PLC program file, HMI project, instruments manuals | Real ICS implementation (HMI, PLC), SCADA server, use of 24V DC signals for the ICS communication with simulating module |
[31] | Network topology | Network protocols SMTP, FTP, Telnet, SSH implemented with commands usually executed by intruders, Modbus, S7comm, HTTP, Ethernet IP | N/A | Virtual PLCs, virtual switch/router, physical firewall, open-source Linux software programs, virtual HMI |
[23] | Network topology, pre-defined OS simulation, Nmap fingerprints templates | Interactive realistic physical process simulation, HTTP, SNMP, Modbus, HMI, S7comm, HMI web interface, PLC web interface | MIB data of real S7-300 PLC | Siemens S7-300 simulation on AWS virtual machines and local Internet Exchange Point (IXP) |
[19] | Vendor specific proprietary PLC firmware, network topology | Cross network access, one-to-many mechanisms, Modbus, FTP, Telnet, HTTP, S7comm (functions: CPU Services, Setup Communication, Read Var, Write Var, Request Download, Download Block, Download Ended, Start Upload, Upload, End Upload, PI-Service, PLC Stop), partial implementation of TCP/IP stacks of industrial communication protocols, operators simulation, response time | PLC program file | Physical devices, real Siemens S7-300 PLC, remote proxies, virtual machines in distant nodes |
[21] | Server operating system, network infrastructure | Web interface, interaction with host, interaction with program, allowance for writing programs, time sensitivity, SCADA protocols (Modbus, S7comm, IEC 104. IPMI, Kamstrup), TCP/IP protocols (HTTP, SNMP) | N/A | Cloud platforms, real PLC, real HMI, real Historian, virtual PLC, virtual HMI, Siemens S7-200 simulation, Siemens S7-300 simulation, Ubuntu virtual machines for the PLCs simulation |
[20] | Customizable operating system fingerprint, network topology | HTTP, SNMP, S7communication, Modbus TCP, protocol interaction level, response to all protocol requests with arbitrary function codes, PLC web interface, Nmap scan result | PLC profile file, XML templates, MIB data of real S7-300 PLC, server files | Siemens S7-200 simulation, Siemens S7-300 simulation, Siemens S7-1200 simulation, docker images, Linux virtual machine, virtual firewall |
[22] | N/A | Interactive web interface, S7comm, SNMP, HTTP, PLC memory blocks | PLC program file, PLC memory blocks | Cloud environments, on-premise deployment, physical PLC, physical router |
[32] | N/A | Networking stacks, physical plant simulation, Modbus (extended support), dynamic input/output update, DNP3, request for PLC memory layout discovery | N/A | Dockrized virtual PLC, proxy profiler, Linux server |
4.1.2. Service
- “it enhances Conpot framework by adding higher-fidelity ICS protocol simulations (…)” [7]
- “CryPLH (…) expanded the simulation level of various protocols” [16]
- “honeypot cannot handle messages from the GOOSE protocol, however it incorporates a complete implementation of the MMS protocol” [16]
- “(…) enhanced the original implementation of Conpot in terms of simulation accuracy (…) added support for analog Input Output (IO) to Modbus protocol” [16]
- “to accurately implement all the necessary function codes to respond to Modbus communication, the configuration would require a significant amount of time” [3]
- “(…) honeynet framework with extended Modbus/TCP support” [32]
- “high interaction level is achieved, because the honeypot implements a response to all requests with arbitrary function code” [20]
- “results showed a high level of packet-level accuracy for the implemented services” [3]
4.1.3. Token
4.1.4. Physical/Virtual Deployment
4.2. Proposal of PLC Interaction-Level Classification
5. Discussion
5.1. Conpot
5.2. OpenPLC
5.3. Applying the Classification Method to Conpot and OpenPLC
6. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Ross, R.; Pillitteri, V.; Graubart, R.; Bodeau, D.; McQuaid, R. Developing Cyber Resilient Systems: A Systems Security Engineering Approach; Technical report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar]
- Sanders, C. Intrusion Detection Honeypots: Detection through Deception; Applied Network Defense: 2020. Available online: https://www.networkdefense.co/about/ (accessed on 30 September 2024).
- Maesschalck, S.; Giotsas, V.; Green, B.; Race, N. Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security. Comput. Secur. 2022, 114, 102598. [Google Scholar] [CrossRef]
- Learn the Industrial Automation Skills of Tomorrow. Available online: https://www.realpars.com/ (accessed on 2 May 2024).
- Spitzner, L. Honeypots: Tracking Hackers; Addison-Wesley Reading: Boston, MA, USA, 2003; Volume 1. [Google Scholar]
- Whitman, M.; Mattord, H. Principles of Information Security; Mindtap Course List, Cengage: Boston, MA, USA, 2021. [Google Scholar]
- Franco, J.; Aris, A.; Canberk, B.; Uluagac, A.S. A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems. IEEE Commun. Surv. Tutorials 2021, 23, 2351–2383. [Google Scholar] [CrossRef]
- Knapp, E.D.; Langill, J.T. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems; Syngress: Oxford, UK, 2014. [Google Scholar]
- IEC 61131-3 2nd Ed; Programmable Controllers-Programming Languages. International Electrotechnical Commission: Geneva, Switzerland, 2013.
- Williams, T.J. The Purdue enterprise reference architecture. Comput. Ind. 1994, 24, 141–158. [Google Scholar] [CrossRef]
- IEC 60870-5; Telecontrol Equipment and Systems—Part 5: Transmission Protocols—ALL PARTS. International Electrotechnical Commission: Geneva, Switzerland, 2024.
- IEC 61850; Communication Networks and Systems for Power Utility Automation—ALL PARTS. International Electrotechnical Commission: Geneva, Switzerland, 2024.
- Drias, Z.; Serhrouchni, A.; Vogel, O. Taxonomy of attacks on industrial control protocols. In Proceedings of the 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France, 22–24 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–6. [Google Scholar]
- Wardak, H.; Zhioua, S.; Almulhem, A. PLC access control: A security analysis. In Proceedings of the 2016 World Congress on Industrial Control Systems Security (WCICSS), London, UK, 12–14 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–6. [Google Scholar]
- Antonioli, D.; Agrawal, A.; Tippenhauer, N.O. Towards high-interaction virtual ICS honeypots-in-a-box. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, New York, NY, USA, 28 October 2016; pp. 13–22. [Google Scholar]
- Dalamagkas, C.; Sarigiannidis, P.; Ioannidis, D.; Iturbe, E.; Nikolis, O.; Ramos, F.; Rios, E.; Sarigiannidis, A.; Tzovaras, D. A survey on honeypots, honeynets and their applications on smart grid. In Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 24–28 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 93–100. [Google Scholar]
- Basnight, Z.H. Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers. Diplomathesis, 2013. AIR FORCE INSTITUTE OF TECHNOLOGY, Wright-Patterson Air Force Base, Ohio. Student Graduate Works at AFIT Scholar. 2013. Available online: https://scholar.afit.edu/etd/853/?utm_source=scholar.afit.edu%2Fetd%2F853&utm_medium=PDF&utm_campaign=PDFCoverPages (accessed on 20 November 2023).
- OS Fingerprinting. Available online: https://www.itperfection.com/network-security/os-fingerprinting-active-passive-firewall-hacking-cybersecurity-network-security-tcp-nmap-xprobe2-ettercap-p0f/ (accessed on 17 November 2023).
- You, J.; Lv, S.; Zhao, L.; Niu, M.; Shi, Z.; Sun, L. A scalable high-interaction physical honeypot framework for programmable logic controller. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar]
- Schuba, M.; Höfken, H.; Linzbach, S. An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants. In Proceedings of the 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, 9–10 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
- Mesbah, M.; Elsayed, M.S.; Jurcut, A.D.; Azer, M. Analysis of ICS and SCADA Systems Attacks Using Honeypots. Future Internet 2023, 15, 241. [Google Scholar] [CrossRef]
- Ivanova, S.; Moradpoor, N. Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments? In Proceedings of the 2023 IEEE 19th International Conference on Factory Communication Systems (WFCS), Pavia, Italy, 26–28 April 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–4. [Google Scholar]
- Conti, M.; Trolese, F.; Turrin, F. Icspot: A high-interaction honeypot for industrial control systems. In Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Washington, DC, USA, 22–25 October 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–4. [Google Scholar]
- Bernieri, G.; Conti, M.; Pascucci, F. Mimepot: A model-based honeypot for industrial control networks. In Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics (smc), Bari, Italy, 6–9 October 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 433–438. [Google Scholar]
- Matherly, J. Complete Guide to Shodan; Shodan, LLC: 2015; Volume 1. Available online: https://ucilnica.fri.uni-lj.si/pluginfile.php/160496/mod_resource/content/1/Matherly%2C%20J.%20(2016).%20The%20Complete%20Guide%20to%20Shodan.pdf (accessed on 30 September 2024).
- OS Fingerprinting for Beginners. Available online: https://www.hackercoolmagazine.com/os-fingerprinting-for-beginners/ (accessed on 17 November 2023).
- Cao, J.; Li, W.; Li, J.; Li, B. Dipot: A distributed industrial honeypot system. In Proceedings of the Smart Computing and Communication: Second International Conference, SmartCom 2017, Shenzhen, China, 10–12 December 2017; Proceedings 2. Springer: Berlin/Heidelberg, Germany, 2018; pp. 300–309. [Google Scholar]
- Xiao, F.; Chen, E.; Xu, Q. S7commtrace: A high interactive honeypot for industrial control system based on s7 protocol. In Proceedings of the Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, 6–8 December 2017; Proceedings 19. Springer: Berlin/Heidelberg, Germany, 2018; pp. 412–423. [Google Scholar]
- Pashaei, A.; Akbari, M.E.; Lighvan, M.Z.; Charmin, A. Early Intrusion Detection System using honeypot for industrial control networks. Results Eng. 2022, 16, 100576. [Google Scholar] [CrossRef]
- Navarro, O.; Balbastre, S.A.J.; Beyer, S. Gathering Intelligence Through Realistic Industrial Control System Honeypots: A Real-World Industrial Experience Report. In Proceedings of the Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, 24–26 September 2018; Revised Selected Papers 13. Springer: Berlin/Heidelberg, Germany, 2019; pp. 143–153. [Google Scholar]
- Pashaei, A.; Akbari, M.E.; Lighvan, M.Z.; Teymorzade, H.A. Improving the IDS performance through early detection approach in local area networks using industrial control systems of honeypot. In Proceedings of the 2020 IEEE International Conference on Environment and Electrical Engineering and 2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I&CPS Europe), Madrid, Spain, 9–12 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar]
- Chowdhury, S.Y.; Dudley, B.; Sun, R. The Case for Virtual PLC-enabled Honeypot Design. In Proceedings of the 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Delft, The Netherlands, 3–7 July 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 351–357. [Google Scholar]
- Modicon Modbus Protocol Reference Guide. Available online: https://www.modbus.org/docs/PI_MBUS_300.pdf (accessed on 26 November 2023).
- Shahzad, A.; Lee, M.; Lee, Y.K.; Kim, S.; Xiong, N.; Choi, J.Y.; Cho, Y. Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information. Symmetry 2015, 7, 1176–1210. [Google Scholar] [CrossRef]
- López-Morales, E.; Rubio-Medrano, C.; Doupé, A.; Shoshitaishvili, Y.; Wang, R.; Bao, T.; Ahn, G.J. Honeyplc: A next-generation honeypot for industrial control systems. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, 9–13 November 2020; pp. 279–291. [Google Scholar]
- CONPOT ICS/SCADA Honeypot. Available online: http://conpot.org/ (accessed on 23 October 2023).
- mushorg/conpot. Available online: https://github.com/mushorg/conpot (accessed on 23 October 2023).
- Open Source PLC Software: OpenPLC Overview. Available online: https://autonomylogic.com/docs/openplc-overview/ (accessed on 2 November 2023).
Target | Possible Attack Vectors | Possible Attack Methods | Possible Consequences |
---|---|---|---|
PLC |
|
|
|
Low | High | |
---|---|---|
System |
|
|
Service |
|
|
Token |
|
|
Conpot | OpenPLC | |
---|---|---|
System | ||
Unique banner | N | N |
Simulation of network topology | N | N |
Vendor-specific firmware | N | Y |
Service | ||
Industrial Communication Protocol simulation covering 70% of common attack vectors moves | N | N |
Network Management Protocol simulation with extended functions | Y | N |
Appropriate response time | N | Y |
PLC-code-related interactions available | N | Y |
Dynamic input/output data processing | N | N |
Physical process simulation | N | Y |
Web interface | Y | Y |
Human operator simulation | N | N |
Token | ||
Fake files | N | Y |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Heluany, J.B. PLC Honeypots: Enhancing Interaction-Level Assessment. Electronics 2024, 13, 4024. https://doi.org/10.3390/electronics13204024
Heluany JB. PLC Honeypots: Enhancing Interaction-Level Assessment. Electronics. 2024; 13(20):4024. https://doi.org/10.3390/electronics13204024
Chicago/Turabian StyleHeluany, Jessica B. 2024. "PLC Honeypots: Enhancing Interaction-Level Assessment" Electronics 13, no. 20: 4024. https://doi.org/10.3390/electronics13204024
APA StyleHeluany, J. B. (2024). PLC Honeypots: Enhancing Interaction-Level Assessment. Electronics, 13(20), 4024. https://doi.org/10.3390/electronics13204024