Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices
- DOI
- 10.2991/jrnal.k.191202.008How to use a DOI?
- Keywords
- Industrial control systems; honeymap; honeypot
- Abstract
Under the trend of intelligent industrial control systems, it is very important to prevent network hackers from invading the system to attack devices. In particular, today’s hackers have multiple attacks and the number of attacks has increased year-by-year. How to stop hackers from attacking the system has become the main goal of this research. In this study, we explore how to build and evaluate Arduino and Raspberry Pi were used as real-world programmable logic controllers and camouflaged honeypots to simulate the honeymap of the industrial control system. And simulate the common sensors of industrial control systems, such as temperature, humidity, pressure sensors, to send the same type of signal as the real sensors to deceive the hacker, so the hacker will attack the simulated sensor with a high probability. After receiving the hacker’s attack signal, returns the spoofed attack result, which makes the hacker mistakenly think that the attack is successful, and no longer causes further damage to the system, and achieves the purpose of protecting the system. At the same time, record the attack means by honeypot to prevention other similar attacks.
- Copyright
- © 2019 The Authors. Published by Atlantis Press SARL.
- Open Access
- This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/).
Download article (PDF)
View full text (HTML)
Cite this article
TY - JOUR AU - Kuan-Chu Lu AU - I-Hsien Liu AU - Jia-Wei Liao AU - Shao-Chun Wu AU - Zong-Chao Liu AU - Jung-Shian Li AU - Chu-Fen Li PY - 2019 DA - 2019/12/16 TI - Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices JO - Journal of Robotics, Networking and Artificial Life SP - 157 EP - 161 VL - 6 IS - 3 SN - 2352-6386 UR - https://doi.org/10.2991/jrnal.k.191202.008 DO - 10.2991/jrnal.k.191202.008 ID - Lu2019 ER -