CyCon 2020 15 Dodson Beresford Vingaard
CyCon 2020 15 Dodson Beresford Vingaard
use within NATO and for personal or educational use when for non-profit or
20/20 Vision: The Next Decade
non-commercial purposes is granted providing that copies bear this notice
T. Jančárková, L. Lindström, and a full citation on the first page. Any other reproduction or transmission
M. Signoretti, I. Tolga, G. Visky (Eds.) requires prior written permission by NATO CCDCOE.
Mikael Vingaard
Industrial Security Researcher
Industrial Defenica
SecuriOT
Copenhagen, Denmark
[email protected]
Abstract: Defending industrial control systems (ICS) in the cyber domain is both
helped and hindered by bespoke systems integrating heterogeneous devices for unique
purposes. Because of this fragmentation, observed attacks against ICS have been
targeted and skilled, making them difficult to identify prior to initiation. Furthermore,
organisations may be hesitant to share business-sensitive details of an intrusion that
would otherwise assist the security community.
275
logic, leveraged protocol implementation gaps and exploited buffer overflows. While
the yield was small, the impact was high, as these were skilled, targeted exploits
previously unknown to the ICS community.
1. INTRODUCTION
Industrial Control Systems (ICS) are used to command, manage, or regulate devices
or physical systems in industry (e.g., chemical processing), infrastructure (e.g., power
generation), and building automation (e.g., fire suppression). Devices communicate
using ICS-specific protocols, most of which are legacy point-to-point or broadcast
protocols designed with the assumption that devices are connected with dedicated
cabling; however, many of these protocols are now layered on top of ethernet and
TCP or UDP, and devices use existing IP-based networks, including the internet, to
communicate.
ICS security has not kept up with this growing digitisation and connectivity. The
proprietary nature of most industrial software and the relatively low profile of
industrial devices result in limited vulnerability hunting and disclosure [1] – [3]. For
example, all versions of the two most popular proprietary (VxWorks) and open-source
(FreeRTOS) real-time operating systems (RTOSes) have a total of 54 entries in the
National Vulnerability Database (NVD) at the time of writing, compared with over
2,000 records for Windows 10 and over 800 records for Ubuntu 18.04. Further, all
‘critical’ VxWorks vulnerabilities in the NVD came from a single disclosure. Similarly,
all but two of the FreeRTOS vulnerabilities came from a single disclosure. In each
case, security researchers found more than 10 vulnerabilities that allowed remote
code execution, data leakage, and denial of service attacks. Most were memory safety
vulnerabilities and had existed in the software for more than a decade. Because these
RTOSes are highly configurable, it is hard to estimate the number of affected devices;
however, it is likely to exceed two billion [1], [4]. For comparison, the initial install
target for Windows 10 was only one billion devices [5]. Further, when vulnerabilities
276
are identified, the industrial community demonstrates a strong resistance to patching,
partly due to the high cost of regression testing and recertification by both the vendor
and user [6]. Additionally, industrial networks have limited host-based security or
logging opportunities, complicating forensic efforts. Even when forensic examination
is possible, industrial network compromises are generally business-sensitive, so post-
exploit forensic efforts rarely result in public disclosure of vulnerabilities, though ICS
security companies often publish summary reports, such as those for Triton/Trisis [7].
Finally, few industrial protocols employ authentication or encryption; therefore, ICS
devices will consider any well-formed packet to be valid, including those that request
information or command changes of state [8], allowing malicious manipulation of
device behaviour without actually exploiting any specific vulnerability. Together,
these factors result in a vulnerable industrial environment and create unique security
challenges.
Successful attacks against ICS have all targeted specific organisations and devices
(e.g., Stuxnet [9], Triton/Trisis [7], CRASHOVERRIDE [10]) or have targeted vendors
directly (e.g., [11]); therefore, unlike other domains where attacks are large-scale and
indiscriminate, such as the Internet of Things (IoT) domain, there are limited means
for researchers to gather open-source intelligence on ICS attack methods, motivations
and campaigns. In domains such as IoT, honeypots have been effective tools to track
and profile malicious behaviour [12], but they rely on either indiscriminate or easily
deceived attackers, neither of which apply to current ICS adversaries. To date, the use
of ICS honeypots for security research has been largely limited to monitoring internet-
wide scanning.
277
2. BACKGROUND
A. Honeypots
Honeypots are computer security systems that emulate production systems and either
decoy attackers away from the production system, provide warning of an intrusion,
or allow attacker behaviour to be studied [12], [13]. Honeypots have been designed
to emulate individual computers, such as laptops, servers, IoT and ICS devices [12],
[14], and larger systems, such as electrical substations [15]. As a security device,
they can be used as part of a defence-in-depth strategy alongside anti-virus software,
segmented networks and firewalls. As a research tool, they are often used as stand-
alone devices directly connected to the internet.
Honeypots can be characterised by their purpose and level of interaction [12]. The
purpose of interaction refers to whether the honeypot is part of a production system,
designed as part of a security solution for a given network or device, or a research device
designed to attract attackers and study their behaviour [16]. The level of interaction
refers to how well the honeypot emulates the target device, which determines how
easy it is for the attacker to identify that they are interacting with a honeypot. The
level of interaction is generally categorised as low, medium, or high, though these
categories are not well-defined. A low-interaction honeypot may be a simple script
that only emulates a login screen but no stateful device behaviour. A high-interaction
honeypot may be an actual device or system, not an emulation, which is instrumented
to record details of attacker behaviour on the system [17], [18].
Within the ICS community, there are several, open-source honeypots available. Conpot
is a low-interaction honeypot capable of responding accurately to network scans [14].
It is easy to set up and scales well, making it a good candidate to research internet-
278
wide scanning [19] – [21]; however, its inability to interact with an attacker limits its
utility in detecting and characterising ICS attacks, and studies using Conpot have yet
to identify any new or targeted ICS attacks [19] – [21]. MiniCPS is a framework for
higher-interaction honeypots and runs actual programmable logic [22]; however, it has
yet to be used in a study to detect previously unknown ICS attacks, and its hardware
emulation may be detectable by a capable attacker [12]. We provide a comparison of
several ICS honeypot studies against our own in Section 4.
The lack of criminal or other large-scale malicious interest in vulnerable ICS devices
can be attributed to several economic factors:
• High cost of entry: The cost of hardware for development and testing and the
time to gain sufficient knowledge and experience to exploit such devices are
significantly higher than in other domains (e.g., IoT).
• Fragmented population: While there may be over 100,000 internet-connected
ICS devices, the population is divided amongst dozens of manufacturers
running proprietary or bare-metal software on different chipsets.
279
• Limited resources: ICS devices have limited compute and memory
resources, making them poor hosts for resource-intensive tasks such as
cryptomining, and they are unlikely to store sensitive information typically
used in ransomware attacks. Limited resources and proprietary software
make general computing malware unlikely to succeed on ICS devices.
These economic factors are changing as industry seeks new ways to use digital
technology. Industry 4.0 and Industrial IoT (IIoT) are converging with the IoT domain
[25], creating a larger, more homogeneous environment of low-cost devices with
general purpose compute and memory resources. In short, these changes are expected
to overcome the economic factors currently inhibiting large-scale malicious interest
in the ICS domain. As IIoT and IoT converge and industrial environments become
increasingly attractive to cybercriminals and others looking to exploit devices at scale,
ICS honeypots will be effective tools to identify and profile these attacks, as they are
currently within the IoT domain.
A. ICS Honeypots
Previous ICS honeypot studies were limited in ways that reduced the likelihood of
an attacker being deceived into interacting with the honeypot, such as geographic
concentration, the use of cloud hosts, the use of low-interaction honeypots, and short
study durations. In this paper, we demonstrate that these limitations can be overcome,
showing that a sufficiently-sized, internet-connected ICS honeypot network can be
effective in detecting and monitoring previously unknown, targeted attacks.
B. SecuriOT Honeypots
Low-interaction honeypots can be inexpensively deployed at scale, but they are easy
to identify. Further, because they do not emulate device state, they cannot be used to
profile an attacker’s behaviour (e.g., attempts to modify programmable logic). High-
interaction honeypots overcome these limitations, but can be expensive to develop,
deploy, and maintain. To address the limitations of both low- and high-interaction
honeypots, SecuriOT developed a reconfigurable device that supports multiple
interaction levels with a common interface and management framework [26]. The
device can be configured with templates to emulate an ICS device for low-interaction
contexts, like Conpot [14], but can also act as a proxy to a production device. When
acting as a proxy, the honeypot redirects traffic to a production device and acts as
a man-in-the-middle between the network and the device. This proxy mode allows
an adversary to exercise the full behaviour of the target device while providing the
honeypot’s full logging and alert functionality.
280
As shown in Figure 1, each physical device is capable of hosting multiple virtual IP
addresses and up to three templates simultaneously, allowing a single physical device
to appear as multiple devices on a given network.
Each physical honeypot interfaces with a Security Information and Event Management
(SIEM) system, which logs interactions and raises alerts. Since the honeypot is
passive and has no production function on the network, any interaction with a virtual
device is suspicious, as it implies that a host is either scanning the network segment
or directly interacting with the honeypot. The SIEM is also used to manage device
configurations, allowing the honeypots to maintain consistent configurations with the
production devices on the network.
281
BACnet is used in large-scale building automation. SOAP on port 37215 is used for
configuration and management of certain routers.
The honeypots perform full packet captures and SecuriOT performs post-processing,
such as fingerprinting the tool used to interact with the honeypot (e.g., NMAP
[27]), identifying campaigns, and classifying packets as either reconnaissance or
exploitation. The result is a dataset with the fields shown in Table I.
Our dataset consists of 13 months of packets captured between March 2018 and
April 2019 from SecuriOT’s network of 120, globally-distributed, high-interaction
ICS honeypots. The dataset consists of approximately 200,000 packets, which we
group into approximately 80,000 interactions. In this section, we present our analysis
of the data and discuss our findings. We start with a dataset overview, including a
comparison with previous, similar surveys. We then demonstrate malicious use of
industrial protocols and discuss the relationships between attackers and targets. We
conclude with a demonstration of large-scale attacks against non-industrial protocols
recorded by the honeypot network and present early evidence that the ICS domain is
affected by malicious, large-scale interest in IoT.
A. Dataset Overview
Table II provides a summary of the interactions with the SecuriOT network of
industrial honeypots over the period of observation. The data demonstrates the
breadth of interest in internet-connected ICS devices: thousands of individual hosts
(IP addresses) are scanning industrial protocols from dozens of Autonomous Systems
(ASes) in dozens of countries.
282
We find that a majority of these interactions originate from well-known research
scanners and are expected to be benign (e.g., Censys [28], Shodan [29]), which is
consistent with previous observations [19] – [21]. Both SecuriOT and the Cambridge
Cybercrime Centre (CCCC) [30] maintain lists of known scanners, against which
source IP addresses were compared to generate the ‘Known scanners’ percentages in
Table II. Similarly, Table II shows that a vast majority of interactions are initiated by
well-known scanning tools, such as NMAP [27].
283
study uses high-interaction honeypots. There is no comparable survey in the academic
literature of a large-scale, high-interaction ICS honeypot network.
Table III compares these surveys and data collection methods, showing broad
agreement in the observed scanning frequency against each protocol. Table III also
demonstrates that ranking based on interactions results in a different ordering than
ranking based on packets, as different protocols have different packet densities.
Dataset Dataset
Source Method Ranked popularity
type size
While the distribution of our scanning traffic is largely consistent with previous studies,
the data shows both growth and asymmetry in the DNP3 scanning traffic that has not
been previously identified or evaluated. Mirian et al. only identified 5.1% of network
telescope traffic as targeting DNP3 in 2015 [21], whereas Cabana et al. observed
over 22% of network telescope data targeting DNP3 in 2019 [20]. Similarly, over
16% of the interactions recorded by SecuriOT honeypots targeted the DNP3 protocol.
Furthermore, as shown in Table II, while the total number of DNP3 interactions is
only 70% of the number of Modbus interactions (13,283 vs. 18,980), the number of
IP addresses scanning for DNP3 is nearly 80% of that of Modbus (1,040 vs. 1,321),
and the number of ASes from which those IP addresses originate is 136% of those for
Modbus (124 vs 91). This statistic is also reflected in the number of source countries
in which those IP addresses are geolocated (42 vs. 31). The asymmetry is even more
pronounced when comparing DNP3 with BACnet or S7comm. Despite the challenges
in quantitative comparisons between studies, there is clear evidence from multiple
studies demonstrating a wider, as well as a growing, interest in DNP3 compared to
other industrial protocols.
284
from vendors and vulnerability databases, four of the nine interactions represent
previously unknown attacks, or zero days, and one represents the first documentation
of a previously-identified proof-of-concept attack in the wild [32]. The attack types
include denial of service (DoS) and command replay attacks.
TABLE IV: ATTACKS USING INDUSTRIAL PROTOCOLS. THE PACKET COUNT DOES NOT INCLUDE
TRANSPORT LAYER HANDSHAKES (E.G., INITIAL SYN PACKET FOR PROTOCOLS LAYERED ON
TCP).
Number
Source Destination Attack Source AS
Date Protocol of pac-
country country type number
kets
The DoS attacks took several forms. In one case, a specially crafted packet forced
a device to violate its real-time constraints, providing a low-bandwidth DoS attack
on the process control. In another case, the attack targeted devices with incomplete
implementations of the protocol stack; the attack provided valid, but unimplemented
commands, and adversely affected the device’s process control. The attacker
specifically targeted vulnerable device types, so this was not a case of accidental
DoS. In a third case, a buffer overflow affected the device’s network communication
capability, but did not affect the device’s process control.
Since many industrial protocols lack authentication or encryption, the receipt of any
packet with a parsable command may be considered valid. In some cases, though,
manufacturers have implemented protection to prevent a replay of previous commands
or commands recorded in a test environment. The replay attack identified by SecuriOT
was successful against a device for which the manufacturer claimed replay protection.
For most of the attacks, the source IP address was only active for the attack itself; the
honeypot network had no record of other interactions from that IP address. This is
not unexpected: an attacker may use one or multiple IP addresses for reconnaissance
and then use a fresh IP address for the actual attack, to avoid blacklists. For three of
285
the attacks, however, consistent activity was observed from the source IP address.
Specifically, the IP addresses used for the attacks originating in Vietnam, Ukraine, and
the Seychelles performed regular scanning over the entire study duration.
While Okiru-Satori does not target industrial protocols, the convergence of IIoT
and IoT domains may result in industrial devices being included in large-scale, non-
industrial attacks. This is already the case for Windows-based industrial infrastructure.
For example, the ransomware attack against the Windows-based infrastructure at
Norsk Hydro in early 2019 prevented the safe and effective use of industrial devices
[33]. As IIoT devices incorporate common operating systems with general purpose
processing (e.g., Linux-based Azure Sphere [34]), they are more likely to become
inadvertent victims of large-scale botnet or ransomware attacks targeting the IoT
population. In this section, we discuss interactions with Mirai hosts and show that
overlap already exists with industrial protocol scanners.
The Mirai botnet emerged in 2016 and used aggressive scanning and brute force
password searches to infect hundreds of thousands of Linux-based IoT devices. At its
peak, an estimated 600,000 hosts were infected [35]. At the time of writing, the CCCC
[30] observes approximately 150,000 infected hosts per day scanning IP addresses in
a monitored /14 network. The scanning packet used by Mirai is distinctive, allowing
the CCCC to identify suspected Mirai hosts and record data such as the source and
destination IP addresses and port numbers.
Many Mirai variants emerged after the public release of the Mirai source code. Variants
target different device types and architectures and exploit different vulnerabilities. The
Okiru-Satori variant was identified in 2017 and targeted Huawei routers on port 37215
using a previously unidentified vulnerability (CVE-2017-17215) [36]. As shown in
Table V, SecuriOT’s honeypots recorded 7,403 interactions from 337 IP addresses
on port 37215. Of these, SecuriOT identified 222 malicious interactions, based on
286
attempts to brute force passwords, make use of the vulnerabilities exploited by Okiru-
Satori, or modify firmware. While the malicious packets make up more than 30% of
the total traffic on port 37215, only 3.0% of the total interactions are malicious, as
password searches and firmware downloads necessarily require more packets than
scanning.
Source Dates of
Packets Interactions Source IP Addresses
ASes interaction
Notably, while the scanning of port 37215 was recorded on 266 days, the honeypots
were only configured as vulnerable routers over short periods in April and July 2018,
resulting in only 15 days of malicious interactions. As discussed below, some of the
apparently benign scanning might have transitioned to exploitation had the scanner
found the honeypot in a vulnerable configuration.
To study the overlap between Mirai hosts and hosts aware of industrial protocols, we
combined the CCCC database of suspected Mirai hosts [30] with SecuriOT’s honeypot
data, correlating source IP addresses and interaction dates. Table VI summarises
the results of this comparison from the perspective of the SecuriOT honeypots. For
example, the first row should be interpreted as 792 packets received by SecuriOT
honeypots on port 37215 from 26 IP addresses that the CCCC suspected to be hosting
Mirai on the day of the interaction with the honeypot.
TABLE VI: SECURIOT HONEYPOT DATA CORRESPONDING TO SOURCE IP ADDRESSES AND DATES
FROM THE CCCC MIRAI HOST DATASET.
287
Comparing 789 SOAP/37215 interactions in Table VI with 222 malicious interactions
in Table V demonstrates that the CCCC suspects many of the benign interactions
with SecuriOT honeypots to have originated from Mirai hosts that simply did not find
the SecuriOT honeypot to be vulnerable. This is consistent with the knowledge that
the SecuriOT honeypots were only configured as vulnerable routers during limited
periods.
Table VI also shows that the CCCC suspects 74 industrial protocol interactions (i.e.,
over DNP3, BACnet and Modbus) with SecuriOT honeypots to have originated from
IP addresses hosting Mirai. As there is no known variant of Mirai that targets ICS
devices, the scanning traffic by Mirai hosts against industrial protocols implies either
that these scanners share an IP address with a Mirai host (e.g., a scanner behind an
infected router) or that the scanner uses a similar technique to that employed by Mirai,
though we are not aware of any such benign, internet-wide scanners.
This overlap between SecuriOT’s honeypot data and the CCCC Mirai database, though
limited, suggests that the gap between ICS-aware and IoT-aware hosts is narrowing.
SecuriOT’s honeypot network exposed four zero-day attacks against devices running
common ICS protocols, such as S7comm and Modbus. By comparing our study with
previous studies that did not identify similar exploits (e.g., [19] – [21]), we provide
the following recommendations for deploying networks of ICS honeypots for security
research:
288
• Honeypot use should be systematic and continuous. This provides both
authenticity and a larger window for an attacker to identify and target a
given honeypot. Unlike large-scale attacks scanning for any vulnerable
device, targeted attackers are looking for specific devices and may take
considerable time before accidentally targeting a honeypot.
6. CONCLUSIONS
We have demonstrated that a network of high-interaction honeypots can identify and
profile previously unknown, targeted ICS attacks. Specifically, we exposed four zero-
day attacks against devices running common ICS protocols such as S7comm and
Modbus, which were disclosed to the applicable manufacturers.
We also demonstrated that the gap between ICS-aware and IoT-aware hosts is
narrowing, showing that IoT malware is co-located with ICS devices and scanners.
Bridging this gap is the first major hurdle in attacking ICS devices at scale. Thus far,
ICS devices have not been subjected to indiscriminate targeting, but the convergence
of IIoT and IoT domains will make industrial devices more attractive targets, even if
only as a vulnerable sub-population amongst the growing IoT population.
Finally, we discussed the limitations of previous ICS honeypot studies and provided
recommendations for developing effective ICS honeypot networks as intelligence-
gathering tools.
Acknowledgements
REFERENCES
[1] B. Seri, G. Vishnepolsky, and D. Zusman, “URGENT/11 technical white paper,” Armis [Online].
Available: https://go.armis.com/urgent11. [Accessed: 25-Nov-2019].
[2] A. Nochvay, “Security research: CODESYS runtime, a PLC control framework,” Kaspersky ICS CERT,
2019 [Online]. Available: https://perma.cc/325P-N7AV. [Accessed: 08-Nov-2019].
[3] Cybersecurity and Infrastructure Security Agency, (2013) “3S CoDeSys vulnerabilities,” [Online].
Available: https://perma.cc/F8W4-7H75. [Accessed: 28-Oct-2019].
289
[4] O. Karliner, “FreeRTOS TCP/IP stack vulnerabilities,” Zimperium Mobile Security Blog, 4 December
2018. [Online]. Available: https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/.
[Accessed: 18-Dec-2019].
[5] C. Mihalcik, “Microsoft aims for 1 billion devices running Windows 10,” CNET. [Online]. Available:
https://www.cnet.com/news/microsoft-aims-for-1-billion-devices-running-windows-10/. [Accessed: 26-
Feb-2020].
[6] É. Leverett, R. Clayton, and R. Anderson, “Standardisation and certification of the ‘Internet of Things’,”
Workshop on the Economics of Information Security (WEIS), 2017 [Online]. Available: https://perma.
cc/5Y9R-9DD3.
[7] Dragos Inc. “TRISIS malware: Analysis of safety system targeted malware”. [Online]. Available: https://
perma.cc/K9EM-CABV. [Accessed: 08-Nov-2019].
[8] D. Formby, S. Durbha, and R. Beyah, “Out of control: Ransomware for industrial control systems,” RSA
Conference, 2017 [Online]. Available: https://perma.cc/XD8V-LP5M.
[9] T. Chen and S. Abu-Nimeh, “Lessons from Stuxnet,” Computer, vol. 44, no. 4, 2011, doi: 10.1109/
MC.2011.115. [Online]. Available: http://ieeexplore.ieee.org/document/5742014/. [Accessed: 14-Jun-2019]
[10] R. M. Lee, “CRASHOVERRIDE: Analyzing the malware that attacks power grids,” Dragos Inc., 2017
[Online]. Available: https://dragos.com/resource/crashoverride-analyzing-the-malware-that-attacks-power-
grids/. [Accessed: 19-Jun-2019].
[11] Cybersecurity and Infrastructure Security Agency, “Russian Government Cyber Activity Targeting Energy
and Other Critical Infrastructure Sectors,” [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA18-
074A. [Accessed: 26-Feb-2020].
[12] A. Vetterl and R. Clayton, “Honware: A virtual honeypot framework for capturing CPE and IoT zero
days,” Symposium on Electronic Crime Research (eCrime), Pittsburgh, United States of America, 2019.
[13] W. Martin, “Honey pots and honey nets - security through deception,” SANS Institute, 2003 [Online].
Available: https://www.sans.org/reading-room/whitepapers/attacking/honey-pots-honey-nets-security-
deception-41. [Accessed: 08-Apr-2019].
[14] L. Rift, J. Vastergaard, D. Haslinger, A. Pasquale, and J. Smith, CONPOT ICS/SCADA honeypot..
[Online]. Available: http://conpot.org. [Accessed: 08-Apr-2019].
[15] R. Rustici and I. Barak, “ICS threat broadens: Nation-state hackers are no longer the only game in town,”
Cybereason. [Online]. Available: https://www.cybereason.com/blog/industrial-control-system-specialized-
hackers. [Accessed: 09-Dec-2019].
[16] L. Spitzner, “The value of honeypots, part one: Definitions and values of honeypots,” Symantec, 2001.
[Online]. Available: https://www.symantec.com/connect/articles/value-honeypots-part-one-definitions-and-
values-honeypots. [Accessed: 09-Dec-2019].
[17] N. Provos and T. Holz, Virtual honeypots: From botnet tracking to intrusion detection. Pearson Education,
2007.
[18] W. Fan, Z. Du, D. Fernández, and V. A. Villagrá, “Enabling an anatomic view to investigate honeypot
systems: A survey,” IEEE Systems Journal, vol. 12, no. 4, 2018, doi: 10.1109/JSYST.2017.2762161.
[19] P. Ferretti, M. Pogliani, and S. Zanero, “Characterizing background noise in ICS traffic through a set of
low interaction honeypots,” ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC),
2019, doi: 10.1145/3338499.3357361.
[20] O. Cabana, A. M. Youssef, M. Debbabi, B. Lebel, M. Kassouf, and B. L. Agba, “Detecting, fingerprinting
and tracking reconnaissance campaigns targeting industrial control systems,” International Conference on
Detection of Intrusions and Malware, and Vulnerability Assessment, 2019, doi: 10.1007/978-3-030-22038-
9_5. [Online]. Available: http://link.springer.com/10.1007/978-3-030-22038-9_5. [Accessed: 09-Aug-
2019].
[21] A. Mirian et al., “An Internet-wide view of ICS devices,” Conference on Privacy, Security and Trust
(PST), Auckland, New Zealand, 2016, doi: 10.1109/PST.2016.7906943.
[22] D. Antonioli, A. Agrawal, and N. O. Tippenhauer, “Towards high-interaction virtual ICS honeypots-
in-a-box.” presented at ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC) ]
Vienna, Austria, 2016, doi: 10.1145/2994487.2994493. [Online]. Available: http://dl.acm.org/citation.
cfm?doid=2994487.2994493. [Accessed: 20-Dec-2019].
[23] R. Spenneberg, M. Brüggemann, and H. Schwartke, “PLC-Blaster: A worm living solely in the PLC,”
presented at Black Hat Asia Marina Bay Sands, Singapore, 2016 [Online]. Available: https://perma.cc/
XWU5-TZ7L. [Accessed: 28-Oct-2019].
[24] É. P. Leverett, “Quantitatively assessing and visualising industrial system attack surfaces,” University
of Cambridge MPhil Thesis, 2011 [Online]. Available: https://perma.cc/83Z9-Q5J9. [Accessed: 26-Feb-
2019].
290
[25] M. Wollschlaeger, T. Sauter, and J. Jasperneite, “The future of industrial communication: Automation
networks in the era of the internet of things and Industry 4.0,” IEEE Industrial Electronics Magazine,
2017, doi: 10.1109/MIE.2017.2649104. [Online]. Available: http://ieeexplore.ieee.org/document/7883994/.
[Accessed: 28-Oct-2019].
[26] SecuriOT, “SecuriOT honeypot: Powered by Industrial Defenica,” SecuriOT Honeypot - Powered by
Industrial Defenica. [Online]. Available: https://www.honeypot.dk. [Accessed: 28-Dec-2019].
[27] NMap Project, “Nmap: the network mapper,” NMap Project. [Online]. Available: https://nmap.org/.
[Accessed: 02-Dec-2019].
[28] “Censys,” Censys. [Online]. Available: https://censys.io/. [Accessed: 28-Dec-2019].
[29] “Shodan,” Shodan. [Online]. Available: https://www.shodan.io/. [Accessed: 28-Dec-2019].
[30] Cambridge Cybercrime Centre, “Computer Laboratory: Cambridge Cybercrime Centre: Description of
available datasets,” Cambridge Cybercrime Centre [Online]. Available: https://www.cambridgecybercrime.
uk/datasets.html. [Accessed: 01-May-2019].
[31] “The ZMap project,” ZMap Project. [Online]. Available: https://zmap.io/. [Accessed: 02-Dec-2019].
[32] Cybersecurity and Infrastructure Security Agency, “PLC cycle time influences (Update A)”. [Online].
Available: https://www.us-cert.gov/ics/advisories/ICSA-19-106-03. [Accessed: 29-Feb-2020].
[33] Norsk Hydro, “Cyber-attack on Hydro,” Norsk Hydro ASA, Oslo, Norway, 2019[Online]. Available:
https://www.hydro.com/en/media/on-the-agenda/cyber-attack/. [Accessed: 14-Dec-2019].
[34] Microsoft Azure, “Azure Sphere,” Microsoft Corporation, Redmond, WA,. [Online]. Available: https://
azure.microsoft.com/en-us/services/azure-sphere/. [Accessed: 13-Jun-2019].
[35] M. Antonakakis et al., “Understanding the Mirai botnet,” USENIX Security Symposium (USENIX
Security), Vancouver, Canada, 2017 [Online]. https://www.usenix.org/system/files/conference/
usenixsecurity17/sec17-antonakakis.pdf. [Accessed: 10-Jun-2019].
[36] Check Point Research, “Huawei home routers in botnet recruitment,” Check Point Software Technologies
Inc., San Carlos, CA , Dec. 2017 [Online]. Available: https://research.checkpoint.com/2017/good-zero-day-
skiddie/. [Accessed: 30-Nov-2019].
291