Authors
Kuan-Chu Lu1, I-Hsien Liu1, Jia-Wei Liao1, Shao-Chun Wu1, Zong-Chao Liu1,
Jung-Shian Li1, *, Chu-Fen Li2
1Department of Electrical Engineering, Institute of Computer and Communication
Engineering, National Cheng Kung University, Tainan City 70101, Taiwan
2Department of Finance, National Formosa University, Yunlin County 632,
Taiwan
*Corresponding author. Email: [email protected]
Corresponding Author
Jung-Shian Li
Received 26 April 2019, Accepted 22 May 2019, Available Online 16 December
2019.
DOI
https://doi.org/10.2991/jrnal.k.191202.008
Keywords
Industrial control systems; honeymap; honeypot
Abstract
Under the trend of intelligent industrial control systems, it is very important
to prevent network hackers from invading the system to attack devices.
In particular, today’s hackers have multiple attacks and the number of
attacks has increased year-by-year. How to stop hackers from attacking
the system has become the main goal of this research. In this study, we
explore how to build and evaluate Arduino and Raspberry Pi were used as
real-world programmable logic controllers and camouflaged honeypots to
simulate the honeymap of the industrial control system. And simulate the
common sensors of industrial control systems, such as temperature, humidity,
pressure sensors, to send the same type of signal as the real sensors to
deceive the hacker, so the hacker will attack the simulated sensor with
a high probability. After receiving the hacker’s attack signal, returns
the spoofed attack result, which makes the hacker mistakenly think that
the attack is successful, and no longer causes further damage to the system,
and achieves the purpose of protecting the system. At the same time, record
the attack means by honeypot to prevention other similar attacks.
Copyright
© 2019 The Authors. Published by ALife Robotics Corp. Ltd.
Open Access
This is an open access article distributed under the CC BY-NC 4.0 license
(http://creativecommons.org/licenses/by-nc/4.0/).
Download article (PDF)