Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild

Mohammad-Reza Zamiri-Gourabi, Ali Razmjoo-Qalaei, Babak Amin Azad
{"title":"Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild","authors":"Mohammad-Reza Zamiri-Gourabi, Ali Razmjoo-Qalaei, Babak Amin Azad","doi":"10.1145/3372318.3372322","DOIUrl":null,"url":null,"abstract":"Internet connectivity of electronic devices has brought us the ease of centralized management and these days more and more devices are connected to this globally accessible network. At the same time, this landscape has opened new doors for malicious actors. While internet connectivity is a built-in feature for desktop and mobile devices, Industrial Control Systems (ICS) lag behind. Traditionally, ICS networks have been air-gapped and as a result, many ICS devices are not well-equipped to be connected to the internet. Absence of proper authentication and other security mechanisms is commonly observed on these devices. In response to the new threats of connected ICS systems, various ICS honeypots have been developed during the past decade. These honeypots are used to collect information on the attack landscape of ICS systems. In this research, we show that ICS honeypots should be designed more carefully and existing honeypots can fairly easily be fingerprinted by the attackers. We systematically study the categories of often overlooked behaviors that make ICS honeypots fingerprintable. Moreover, to demonstrate the impact of these flaws, we perform a large scale analysis over the internet to detect GasPot honeypots that emulate automatic tank gauges (ATG). We were able to find 17 existing honeypot instances which is more than the number of discovered GasPots by Shodan. Finally, we released our ICS honeypot scanner and our ATG honeypot which provides full protocol support and fixes the existing flaws within GasPot that makes it detectable.","PeriodicalId":287941,"journal":{"name":"Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3372318.3372322","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Internet connectivity of electronic devices has brought us the ease of centralized management and these days more and more devices are connected to this globally accessible network. At the same time, this landscape has opened new doors for malicious actors. While internet connectivity is a built-in feature for desktop and mobile devices, Industrial Control Systems (ICS) lag behind. Traditionally, ICS networks have been air-gapped and as a result, many ICS devices are not well-equipped to be connected to the internet. Absence of proper authentication and other security mechanisms is commonly observed on these devices. In response to the new threats of connected ICS systems, various ICS honeypots have been developed during the past decade. These honeypots are used to collect information on the attack landscape of ICS systems. In this research, we show that ICS honeypots should be designed more carefully and existing honeypots can fairly easily be fingerprinted by the attackers. We systematically study the categories of often overlooked behaviors that make ICS honeypots fingerprintable. Moreover, to demonstrate the impact of these flaws, we perform a large scale analysis over the internet to detect GasPot honeypots that emulate automatic tank gauges (ATG). We were able to find 17 existing honeypot instances which is more than the number of discovered GasPots by Shodan. Finally, we released our ICS honeypot scanner and our ATG honeypot which provides full protocol support and fixes the existing flaws within GasPot that makes it detectable.
气什么?我能看到你的气垫。研究ICS蜜罐在野外的指纹识别能力
电子设备的互联网连接为我们带来了集中管理的便利,如今越来越多的设备连接到这个全球可访问的网络。与此同时,这种局面也为恶意行为者打开了新的大门。虽然互联网连接是桌面和移动设备的内置功能,但工业控制系统(ICS)却落后了。传统上,ICS网络是气隙的,因此,许多ICS设备不能很好地连接到互联网。在这些设备上通常观察到缺乏适当的身份验证和其他安全机制。为了应对连接ICS系统的新威胁,在过去的十年中,各种ICS蜜罐被开发出来。这些蜜罐用于收集有关ICS系统攻击情况的信息。在这项研究中,我们表明ICS蜜罐应该更仔细地设计,现有的蜜罐很容易被攻击者指纹化。我们系统地研究了使ICS蜜罐可指纹化的经常被忽视的行为类别。此外,为了证明这些漏洞的影响,我们在互联网上进行了大规模分析,以检测模拟自动油箱仪表(ATG)的GasPot蜜罐。我们能够找到17个现有的蜜罐实例,这比Shodan发现的gaspot的数量还要多。最后,我们发布了ICS蜜罐扫描仪和ATG蜜罐,它们提供了完整的协议支持,并修复了GasPot中现有的可检测缺陷。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信