Abstract

Supervisory Control and Data Acquisition (SCADA) honeypots are key tools not only for determining threats which pertain to SCADA devices in the wild, but also for early detection of potential malicious tampering within a SCADA device network. An analysis of one such SCADA honeypot, Conpot, is conducted to determine its viability as an effective SCADA emulating device. A long-term analysis is conducted and a simple scoring mechanism leveraged to evaluate the Conpot honeypot.

Keywords:
SCADA Honeypot Computer science Computer security Key (lock) Embedded system Engineering Electrical engineering

Metrics

76
Cited By
4.83
FWCI (Field Weighted Citation Impact)
5
Refs
0.96
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Smart Grid Security and Resilience
Physical Sciences →  Engineering →  Control and Systems Engineering
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Specialized Honeypots for SCADA Systems

Paulo SimõesTiago CruzJorge ProençaEdmundo Monteiro

International series on intelligent systems, control and automation: science and engineering Year: 2015 Pages: 251-269
JOURNAL ARTICLE

Review of SCADA Systems and IoT Honeypots

Mohammed H. AlquwatliMohamed Hadi HabaebiSheroz Khan

Journal:   2019 IEEE 6th International Conference on Engineering Technologies and Applied Sciences (ICETAS) Year: 2019 Pages: 1-6
JOURNAL ARTICLE

Industrial Control Systems Honeypot: A Formal Analysis of Conpot

Sheetal GokhaleAshwini DalviIrfan Siddavatam

Journal:   International Journal of Computer Network and Information Security Year: 2020 Vol: 12 (6)Pages: 44-56
© 2026 ScienceGate Book Chapters — All rights reserved.