Analysis of Conpot and Its BACnet features for cyber-deception
ORCID : 0000-0003-3368-2215
Advances in Security, Networks, and Internet of Things
Springer International Publishing
School of Science / ECU Security Research Institute
Cyber Security Research Centre
Australian Government's Cooperative Research Centres program
There is an increasing awareness of the cybersecurity issues around SCADA/ICS systems that are the cyber-physical connectors of our industrialized world to the Internet. Alerton’s BACtalk VAV-DD controller is an example of a multipurpose SCADA device that provides autonomous pressure control for any dual-duct VAV container using the BACnet protocol. The majority of devices functioning on the BACnet protocol are legacy deployments, which are difficult to secure. Therefore, SCADA honeypots such as Conpot are significant tools not only for regulating threats affecting SCADA devices such as the VAV-DD controller but also for the early detection of probable malicious tampering within a SCADA environment. This chapter analyzes the templates of the Conpot honeypot with special emphasis on the default template.xml file and the bacnet.xml protocol file and their potential to be used deceptively.