Refine
Year of publication
Document Type
- Conference Proceeding (1393) (remove)
Has Fulltext
- no (1393) (remove)
Keywords
- Enterprise Architecture (5)
- Gamification (5)
- Energy storage (4)
- Natural language processing (4)
- Power plants (4)
- hydrogen (4)
- solar sail (4)
- Associated liquids (3)
- Concentrated solar power (3)
- Hybrid energy system (3)
- MASCOT (3)
- Out-of-plane load (3)
- Serious Game (3)
- earthquakes (3)
- Additive manufacturing (2)
- Adjacent buildings (2)
- BIM (2)
- Case Study (2)
- Clustering (2)
- Deep learning (2)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (280)
- Fachbereich Energietechnik (226)
- Fachbereich Luft- und Raumfahrttechnik (192)
- Fachbereich Maschinenbau und Mechatronik (188)
- Solar-Institut Jülich (164)
- Fachbereich Medizintechnik und Technomathematik (148)
- IfB - Institut für Bioengineering (113)
- Fachbereich Bauingenieurwesen (101)
- ECSM European Center for Sustainable Mobility (57)
- Fachbereich Wirtschaftswissenschaften (53)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (44)
- INB - Institut für Nano- und Biotechnologien (41)
- Fachbereich Chemie und Biotechnologie (33)
- Nowum-Energy (22)
- Kommission für Forschung und Entwicklung (16)
- Fachbereich Architektur (13)
- ZHQ - Bereich Hochschuldidaktik und Evaluation (8)
- Fachbereich Gestaltung (3)
- IaAM - Institut für angewandte Automation und Mechatronik (3)
- Institut fuer Angewandte Polymerchemie (2)
Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed