首页> 外文期刊>International Journal of Computer Network and Information Security >Industrial Control Systems Honeypot: A Formal Analysis of Conpot
【24h】

Industrial Control Systems Honeypot: A Formal Analysis of Conpot

机译:工业控制系统蜜罐:傻瓜的正式分析

获取原文
           

摘要

Technologies used in ICS and Smart Grid are overlapping. The most discussed attacks on ICSs are Stuxnet and Black energy malware. The anatomy of these attacks not only pointed out that the security of ICS is of prime concern but also demanded to execute a proactive approach in practicing ICS security. Honeypot is used to implement defensive measures for security. The Honeynet group released Honeypot for ICS labelled as Conpot in 2013. Though the Conpot is low interactive Honeypot, it emulates processes of different cyber-physical systems, typically Smart Grid. In the literature, the effectiveness of Honeypot operations was studied by challenging limitations of the existing setup or proposing new variants. Similar approaches are followed for Conpot evaluation. However, none of the work addressed a formal verification method to verify the engagement of Honeypot, and this makes the presented work unique. For proposed work, Coloured Petri Net (CPN) tool is used for formal verification of Conpot. The variants of Conpot are modelled, including initial state model, deadlock state model and livelock model. Further evaluation of these models based on state space analysis results confirmed that Conpot could lure an attacker by engaging him in an infinite loop and thereby limiting the scope of the attacker from exploring and damaging the real-time systems or services. However, in the deadlock state, the attacker’s activity in the conpot will be restricted and will be unable to proceed further as the conpot model incorporates deadlock loop.
机译:IC和SMART网格中使用的技术重叠。讨论ICS的最多攻击是Stuxnet和黑能量恶意软件。这些攻击的解剖不仅指出了IC的安全性是主要关注的,而且还要求在练习ICS安全方面执行主动方法。蜜罐用于实施安全的防御措施。 HoneyNet Group于2013年发布了标记为Conpot的IC的蜜罐。虽然凹凸是低的交互式蜜罐,它会模拟不同网络物理系统的过程,通常是智能电网。在文献中,通过挑战现有设置或提出新变种的限制来研究蜜罐操作的有效性。露梦评估遵循类似的方法。但是,没有任何作品解决了正式的验证方法,以验证蜜罐的参与,这使得所呈现的工作独特。对于拟议的工作,彩色Petri网(CPN)工具用于正式验证套头。套头的变体是建模的,包括初始状态模型,死锁状态模型和Livelock模型。进一步评估这些模型的基于状态空间分析结果证实,套点可以通过在无限循环中吸引他来引诱攻击者,从而限制攻击者的范围探索和损坏实时系统或服务。但是,在死锁状态下,攻击者在突出者中的活动将受到限制,并且由于骗子模型包含死锁循环,无法进一步继续。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号