Institutional Repository
Technical University of Crete
EN  |  EL

Search

Browse

My Space

Study of ICS/SCADA Honeypots and modern automatic deployment methods

Karatsoris Irodotos

Full record


URI: http://purl.tuc.gr/dl/dias/72A8458A-E372-4EF1-B348-51CC5E6C5D25
Year 2022
Type of Item Diploma Work
License
Details
Bibliographic Citation Irodotos Karatsoris, "Study of ICS/SCADA Honeypots and modern automatic deployment methods", Diploma Work, School of Electrical and Computer Engineering, Technical University of Crete, Chania, Greece, 2022 https://doi.org/10.26233/heallink.tuc.93277
Appears in Collections

Summary

When Industrial Control Systems (ICS) started to be developed, their security was not considered to be a priority, because they were isolated from other networks. Nowadays ICS networks are connected to other networks, even to the internet. Making sure these networks are protected from malicious attacks is an important issue. One of the ways to protect an ICS network is with the use of honeypots. This dissertation describes, at first, the known classifications of honeypots and the communication protocols that are used mostly in ICS networks. Based on the bibliography there are honeypots that can simulate these protocols in various combinations. These honeypots are described and categorized according to certain attributes. Concerning the modern deployment methods, after the reference of all known deployment methods, containerized application deployment is the most time and cost efficient method, according to the bibliography. Kubernetes is a container orchestration system for managing, scaling, and deploying software. And by combining Kubernetes with HoneyChart, we were able to achieve fast and automatic deployment of containerized honeypots.

Available Files

Services

Statistics