Towards agnostic Operational Technology (OT) honeypot fingerprinting

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

37 Downloads (Orbit)

Abstract

Honeypots are versatile cyber-deception tools used to detect and analyze malicious activity across various environments, including operational technology (OT) systems that support critical infrastructure. Their effectiveness, however, depends on remaining undetectable to increasingly sophisticated attackers who employ fingerprinting techniques. This work introduces Aletheia, a framework for fingerprinting OT honeypots agnostically, by reversing the TCP/IP stack. We conduct an Internet-wide scan targeting the Modbus and S7comm protocols, identifying approximately 6 million responsive IPv4 addresses. Applying only a subset of our methodology, we uncover around 7,000 potential honeypot instances—including custom implementations—demonstrating, even at this preliminary stage, how our holistic framework combines established techniques with novel fingerprinting methods to reveal previously unidentified honeypots.
Original languageEnglish
Title of host publicationProceedings of the 9th Network Traffic Measurement and Analysis Conference (TMA conference 2025)
Number of pages4
PublisherIFIP
Publication statusAccepted/In press - 2025
Event9th Network Traffic Measurement and Analysis Conference - Copenhagen, Denmark
Duration: 10 Jun 202513 Jun 2025

Conference

Conference9th Network Traffic Measurement and Analysis Conference
Country/TerritoryDenmark
CityCopenhagen
Period10/06/202513/06/2025

Keywords

  • Fingerprinting
  • Internet scan
  • Honeypot
  • OT
  • Cyber-defense

Fingerprint

Dive into the research topics of 'Towards agnostic Operational Technology (OT) honeypot fingerprinting'. Together they form a unique fingerprint.

Cite this