Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices

Authors
Kuan-Chu Lu1, I-Hsien Liu1, Jia-Wei Liao1, Shao-Chun Wu1, Zong-Chao Liu1, Jung-Shian Li1, *, Chu-Fen Li2
1Department of Electrical Engineering, Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan City 70101, Taiwan
2Department of Finance, National Formosa University, Yunlin County 632, Taiwan
*Corresponding author. Email: [email protected]
Corresponding Author
Jung-Shian Li
Received 26 April 2019, Accepted 22 May 2019, Available Online 16 December 2019.
DOI
https://doi.org/10.2991/jrnal.k.191202.008
Keywords
Industrial control systems; honeymap; honeypot
Abstract
Under the trend of intelligent industrial control systems, it is very important to prevent network hackers from invading the system to attack devices. In particular, today’s hackers have multiple attacks and the number of attacks has increased year-by-year. How to stop hackers from attacking the system has become the main goal of this research. In this study, we explore how to build and evaluate Arduino and Raspberry Pi were used as real-world programmable logic controllers and camouflaged honeypots to simulate the honeymap of the industrial control system. And simulate the common sensors of industrial control systems, such as temperature, humidity, pressure sensors, to send the same type of signal as the real sensors to deceive the hacker, so the hacker will attack the simulated sensor with a high probability. After receiving the hacker’s attack signal, returns the spoofed attack result, which makes the hacker mistakenly think that the attack is successful, and no longer causes further damage to the system, and achieves the purpose of protecting the system. At the same time, record the attack means by honeypot to prevention other similar attacks.
Copyright
© 2019 The Authors. Published by ALife Robotics Corp. Ltd.
Open Access
This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)