Since the Stuxnet worm was discovered by a Belarusian security company, there has been a growing awareness of and a renewed interest in control system security. There is concern from some security researchers that the attention Stuxnet has received will have a proliferating effect. Will control systems now attract more attention from hackers, organized crime, terrorists, and foreign intelligence services? Will these attacks evolve beyond the typical virus or malware driven attacks commonly seen? Using a honeynet designed for control systems, insight into these questions will be sought by comparing the number and types of attacks received by a simulated control system with the number and types of attacks received by an IT network. Also, the usefulness of using honeynets on control systems to track adversary’s means and methods as well as serve as an early warning system will be explored.
[1]
William Cheswick.
An evening with Berferd
,
1997
.
[2]
C. Stoll.
The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage
,
1990
.
[3]
William Shaw,et al.
Cybersecurity for SCADA Systems
,
2006
.
[4]
S. Shankar Sastry,et al.
Research Challenges for the Security of Control Systems
,
2008,
HotSec.
[5]
Ronald L. Krutz.
Securing SCADA systems
,
2005
.
[6]
T. M. Chen,et al.
Stuxnet, the real start of cyber warfare? [Editor's Note]
,
2010,
IEEE Netw..
[7]
Niels Provos,et al.
A Virtual Honeypot Framework
,
2004,
USENIX Security Symposium.