Using Honeypots to Determine Who Is Targeting SCADA and Control Systems


Posted on in Presentations

Operational technology devices connected to the Internet can be used as a pivot for network ingress, or directly attacked to cause kinetic effect. The presenters deployed 12 ‘Conpot’ honeypots and collected data for 30 days, recording 40,163 interactions, with 93% of traffic initiated by cybersecurity providers, which raises a number of issues. This talk will discuss the significant implications for this activity.

Learning Objectives:
1: Understand the most commonly targeted control system protocols.
2: Find out the types of attackers targeting your network.
3: Learn how a honeypot can help to protect your systems.
Participants
Professor Andrew Woodward

Participant

Executive Dean of Science, Edith Cowan University


Share With Your Community