+ All Categories
Home > Documents > ICS_Cybersecurity_FINAL

ICS_Cybersecurity_FINAL

Date post: 13-Apr-2017
Category:
Upload: steve-markey
View: 125 times
Download: 0 times
Share this document with a friend
34
Designing & Deploying ICS Honeypots Steven C. Markey, MSIS, PMP, CISSP, CIPP/US , CISM, CISA, STS-EV, CCSK, CCSP, Cloud + Principal, nControl, LLC Adjunct Professor
Transcript
Page 1: ICS_Cybersecurity_FINAL

Designing & Deploying ICS Honeypots

Steven C. Markey, MSIS, PMP, CISSP, CIPP/US , CISM, CISA, STS-EV, CCSK, CCSP, Cloud +

Principal, nControl, LLCAdjunct Professor

Page 2: ICS_Cybersecurity_FINAL

Source: Drupal

ICS Honeypots

Page 3: ICS_Cybersecurity_FINAL

Source: Wikipedia

ICS Honeypots

Page 4: ICS_Cybersecurity_FINAL

• ICS Componentry– Programmable Logic Controller (PLC)– Distributed Control Systems (DCS)– Embedded Control– Safety Instrumented Systems (SIS)

ICS Honeypots

Page 5: ICS_Cybersecurity_FINAL

Source: Purdue

Page 6: ICS_Cybersecurity_FINAL

Source: MOXA

Page 7: ICS_Cybersecurity_FINAL

Source: MTS

Page 8: ICS_Cybersecurity_FINAL

Source: Open

Page 9: ICS_Cybersecurity_FINAL

Source: Flickr

Page 10: ICS_Cybersecurity_FINAL

Source: Minded Security

Page 11: ICS_Cybersecurity_FINAL

Source: Microsoft

Page 12: ICS_Cybersecurity_FINAL

Source: IEEE

Page 13: ICS_Cybersecurity_FINAL

Source: SAFECode & Microsoft

Page 14: ICS_Cybersecurity_FINAL
Page 15: ICS_Cybersecurity_FINAL

• Honeypot Strategies– Thick Deployments

• Small Scale: Each Entity Contains Whole Logic / Stack

– Thin Deployments• Larger Scale: Traffic Reflector

ICS Honeypots

Page 16: ICS_Cybersecurity_FINAL

• Honeypot Solution Options– Open-Source

• T-Pot– ELK

• HoneyDrive Framework – Kippo, Conpot, Dionaea, Honeyd, Glastopf, Amun, Wordpot, LaBrea– LAMP, ELK & Other Analytics

– Commercial• Offensive & Deceptive

– Ridgeback

• Traditional Deception– Deception Tool Kit (DTK)– KFSensor– HoneyPoint Security Server

ICS Honeypots

Page 17: ICS_Cybersecurity_FINAL

• One-Off Deception Maneuvers– Bastion Hosts

• Windows Environment: Telnet / SSH (like Kippo)• Linux Environment: RDP / RDC

– VLANs• Passive Sniffers

– Proxies• Forward• Reverse• Dual (WAF-like, LaBrea / Glastopf)

ICS Honeypots

Page 18: ICS_Cybersecurity_FINAL
Page 19: ICS_Cybersecurity_FINAL

ICS Honeypots

Page 20: ICS_Cybersecurity_FINAL

ICS Honeypots

Page 21: ICS_Cybersecurity_FINAL

ICS Honeypots

Page 22: ICS_Cybersecurity_FINAL

ICS Honeypots

Page 23: ICS_Cybersecurity_FINAL

ICS Honeypots

Source: RSSing

Page 24: ICS_Cybersecurity_FINAL

ICS Honeypots

Source: Charlie Scott

Page 25: ICS_Cybersecurity_FINAL

Source: Charlie Scott

Page 26: ICS_Cybersecurity_FINAL

ICS Honeypots

Page 27: ICS_Cybersecurity_FINAL

ICS Honeypots

Page 28: ICS_Cybersecurity_FINAL

Source: Levenetep

ICS Honeypots

Page 29: ICS_Cybersecurity_FINAL
Page 30: ICS_Cybersecurity_FINAL

Source: Jason Lefkovitz

Page 31: ICS_Cybersecurity_FINAL

ICS Honeypots

Page 32: ICS_Cybersecurity_FINAL

ICS Honeypots

Source: Ridgeback

Page 33: ICS_Cybersecurity_FINAL

• Demo TimeICS Honeypots

Source: Baseball Brains

Page 34: ICS_Cybersecurity_FINAL

• Questions?• Contact

– Email: [email protected]– Twitter: @markes1– LI: http://www.linkedin.com/in/smarkey