Abstract | ||
---|---|---|
Supervisory Control and Data Acquisition (SCADA) honeypots are key tools not only for determining threats which pertain to SCADA devices in the wild, but also for early detection of potential malicious tampering within a SCADA device network. An analysis of one such SCADA honeypot, Conpot, is conducted to determine its viability as an effective SCADA emulating device. A long-term analysis is conducted and a simple scoring mechanism leveraged to evaluate the Conpot honeypot. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/ISI.2016.7745468 | 2016 IEEE Conference on Intelligence and Security Informatics (ISI) |
Keywords | Field | DocType |
Supervisory Control and Data Acquisition systems,honeypots,Conpot,network security | Honeypot,Early detection,Computer security,Computer science,Network security,DNP3,Emulation,SCADA,Embedded system | Conference |
ISBN | Citations | PageRank |
978-1-5090-3866-4 | 6 | 0.71 |
References | Authors | |
1 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Arthur Jicha | 1 | 6 | 0.71 |
Mark W. Patton | 2 | 10 | 4.28 |
Hsinchun Chen | 3 | 9569 | 813.33 |