Tags:Biomedical, Capture, Honeypot, Network, Packet Analysis, Raspberry Pi and Virtual Honeypot
Abstract:
Our team will be discussing the design of a honeypot for infusion pump systems that are used to help administer nutrients to a patient in controlled doses. The specific device we chose to mimic is the Baxter SIGMA Infusion Pump which has vulnerabilities such as weak authentication and hard-coded passwords. In order to address these issues and find newer vulnerabilities, we are utilizing a Raspberry Pi which will be placed as a server on the network to deploy the virtual honeypots in the system. The Raspberry Pi also has an intrusion detection system (IDS), that can alert the security operators when an attacker interacts with the virtual honeypots. The logged information generated from the virtual honeypots will be sent to the security risk management team for further analysis. By employing this honeypot system into the network, a health organization will be able to deter attackers from their legitimate systems and be able to identify any malicious behavior, thus enabling them to better serve their patients. Our research paper will show our teams design and results.