Irodotos Karatsoris, "Study of ICS/SCADA Honeypots and modern automatic deployment methods", Diploma Work, School of Electrical and Computer Engineering, Technical University of Crete, Chania, Greece, 2022
https://doi.org/10.26233/heallink.tuc.93277
When Industrial Control Systems (ICS) started to be developed, their security was not considered to be a priority, because they were isolated from other networks. Nowadays ICS networks are connected to other networks, even to the internet. Making sure these networks are protected from malicious attacks is an important issue. One of the ways to protect an ICS network is with the use of honeypots. This dissertation describes, at first, the known classifications of honeypots and the communication protocols that are used mostly in ICS networks. Based on the bibliography there are honeypots that can simulate these protocols in various combinations. These honeypots are described and categorized according to certain attributes. Concerning the modern deployment methods, after the reference of all known deployment methods, containerized application deployment is the most time and cost efficient method, according to the bibliography. Kubernetes is a container orchestration system for managing, scaling, and deploying software. And by combining Kubernetes with HoneyChart, we were able to achieve fast and automatic deployment of containerized honeypots.