Abstract
Honeypots are versatile cyber-deception tools used to detect and analyze malicious activity across various environments, including operational technology (OT) systems that support critical infrastructure. Their effectiveness, however, depends on remaining undetectable to increasingly sophisticated attackers who employ fingerprinting techniques. This work introduces Aletheia, a framework for fingerprinting OT honeypots agnostically, by reversing the TCP/IP stack. We conduct an Internet-wide scan targeting the Modbus and S7comm protocols, identifying approximately 6 million responsive IPv4 addresses. Applying only a subset of our methodology, we uncover around 7,000 potential honeypot instances—including custom implementations—demonstrating, even at this preliminary stage, how our holistic framework combines established techniques with novel fingerprinting methods to reveal previously unidentified honeypots.
Original language | English |
---|---|
Title of host publication | Proceedings of the 9th Network Traffic Measurement and Analysis Conference (TMA conference 2025) |
Number of pages | 4 |
Publisher | IFIP |
Publication status | Accepted/In press - 2025 |
Event | 9th Network Traffic Measurement and Analysis Conference - Copenhagen, Denmark Duration: 10 Jun 2025 → 13 Jun 2025 |
Conference
Conference | 9th Network Traffic Measurement and Analysis Conference |
---|---|
Country/Territory | Denmark |
City | Copenhagen |
Period | 10/06/2025 → 13/06/2025 |
Keywords
- Fingerprinting
- Internet scan
- Honeypot
- OT
- Cyber-defense