@inproceedings{a0a1f3d335ce4a69b5cb81abb9954720,
title = "SCADA honeypots: An in-depth analysis of Conpot",
abstract = "Supervisory Control and Data Acquisition (SCADA) honeypots are key tools not only for determining threats which pertain to SCADA devices in the wild, but also for early detection of potential malicious tampering within a SCADA device network. An analysis of one such SCADA honeypot, Conpot, is conducted to determine its viability as an effective SCADA emulating device. A long-Term analysis is conducted and a simple scoring mechanism leveraged to evaluate the Conpot honeypot.",
keywords = "Conpot, Supervisory Control and Data Acquisition systems, honeypots, network security",
author = "Arthur Jicha and Mark Patton and Hsinchun Chen",
note = "Publisher Copyright: {\textcopyright} 2016 IEEE.; 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 ; Conference date: 28-09-2016 Through 30-09-2016",
year = "2016",
month = nov,
day = "15",
doi = "10.1109/ISI.2016.7745468",
language = "English (US)",
series = "IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "196--198",
editor = "Wenji Mao and Wang, {G. Alan} and Lina Zhou and Lisa Kaati",
booktitle = "IEEE International Conference on Intelligence and Security Informatics",
}