ticated way. The real-world experiments conducted
on a cloud infrastructure show the feasibility of the
approach proposed. The honeynet not only was regu-
larly probed and indexed by SHODAN (a search en-
gine that searches for specific types of devices), but
it has also attracted multiple seemingly-independent
peers to interact with it.
The results of the experiments conducted moti-
vate the fundamental need of having proper security
mechanisms in place within industrial control systems
that are connected to the Internet, as these systems
will be swiftly listed in relevant information reposito-
ries, thus possibly becoming further exposed to both
classical IT and ICS-specific attacks. Moreover, they
indicate that potentially malicious activities targeting
industrial control systems and using ICS-specific pro-
tocols may be currently conducted on the public In-
ternet.
As future work, we plan to extend the number of
protocols simulated and also to evaluate the influence
of search engine listings on the adversarial behaviour
observed. To summarize, we consider the proposed
architecture for an ICS honeynet system an important
foundation for obtaining a deeper insight into the in-
terest of potential attackers for industrial devices.
REFERENCES
Asgarkhani, M. and Sitnikova, E. (2014). A strategic ap-
proach to managing security in SCADA systems. In
Proceedings of the 13th European Conference on Cy-
ber warefare and Security, pages 23–32. Academic
Conferences and Publishing International Limited.
Beale, J., Baker, A., Esler, J., Kohlenberg, T., and Northcutt,
S. (2007). Snort: IDS and IPS Toolkit. Jay Beale’s
open source security series. Syngress.
Bodenheim, R., Butts, J., Dunlap, S., and Mullins, B.
(2014). Evaluation of the ability of the Shodan search
engine to identify internet-facing industrial control de-
vices. International Journal of Critical Infrastructure
Protection, 7(2):114–123.
Buza, D. I., Juh
´
asz, F., Miru, G., F
´
elegyh
´
azi, M., and Hol-
czer, T. (2014). CryPLH: Protecting smart energy sys-
tems from targeted attacks with a PLC honeypot. In
Smart Grid Security, Lecture Notes in Computer Sci-
ence, pages 181–192. Springer International Publish-
ing. http://dx.doi.org/10.1007/978-3-319-10329-7 12.
Byres, E. (2013). Project SHINE: 1,000,000 Internet-
Connected SCADA and ICS Systems and Counting.
Web page.
Deng, Y. and Shukla, S. (2013). A distributed real-time
event correlation architecture for SCADA security. In
Critical Infrastructure Protection VII, volume 417 of
IFIP Advances in Information and Communication
Technology, pages 81–93. Springer Berlin Heidelberg.
http://dx.doi.org/10.1007/978-3-642-45330-4 6.
ICS - CERT (2013). Increasing threat to industrial
control systems (update A). https://ics-cert.us-
cert.gov/alerts/ICS-ALERT-12-046-01A.
Morris, T. H. and Gao, W. (2013). Industrial
control system cyber attacks. In Proceed-
ings of the 1st International Symposium for
ICS & SCADA Cyber Security Research.
http://ewic.bcs.org/content/ConWebDoc/51165.
NIST (2008). Guide to General Server Secu-
rity – Recommendations of the National
Institute of Standards and Technology.
http://csrc.nist.gov/publications/nistpubs/800-
123/SP800-123.pdf.
Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., and
Chen, H. (2014). Uninvited Connections: A Study of
Vulnerable Devices on the Internet of Things (IoT).
In Intelligence and Security Informatics Conference
(JISIC), 2014 IEEE Joint, pages 232–235.
Robinson, M. (2013). The SCADA threat landscape.
In Proceedings of the 1st International Sympo-
sium for ICS & SCADA Cyber Security Research.
http://ewic.bcs.org/content/ConWebDoc/51166.
Scott, C. (2014). Designing and implementing a honeypot
for a SCADA network. Technical report, The SANS
Institute.
Wade, S. M. (2011). SCADA honeynets: The attractiveness
of honeypots as critical infrastructure security tools
for the detection and analysis of advanced threats.
Master’s thesis, Iowa State University, Ames, Iowa.
http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=
3130&context=etd.
Wilamowski, B. M. and Irwin, J. D. (2011). The Indus-
trial Electronics Handbook – Industrial Communica-
tions Systems, volume 2 of The Industrial Electronics
Handbook. CRC Press, Taylor & Francis Group, 2
edition.
Wilhoit, K. (2013a). The SCADA that didnt cry wolf –
whos really attacking your ICS equipment? – part
deux! Black Hat US 2013.
Wilhoit, K. (2013b). Whos really attacking your ICS equip-
ment? Black Hat Europe 2013.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
26