A survey on SCADA security and honeypot in industrial control system

Kuan Chu Lu, I. Hsien Liu, Meng Wei Sun, Jung Shian Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Nowadays, the infrastructure employs SCADA (supervisory control and data acquisition) system for monitoring, such as power plants, reservoir, manufacturing, and logistics industry. With the rapid development of the internet, IOT (internet of things) makes every massive infrastructure more convenient to be control and monitoring. However, the convenience of remote controlling to the infrastructure may cause serious damage which could affect people’s livelihood. Consequently, an effective and protective mechanism to protect the SCADA system is necessary. We have investigated the related attacks and defensive methods. This paper surveys varying SCADA system and the honeypot system of SCADA. Then we proposed a defensive architecture with honeypot system to protect the SCADA system.

Original languageEnglish
Title of host publicationRecent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018
EditorsFathey Mohammed, Faisal Saeed, Nadhmi Gazem, Abdelsalam Busalim
PublisherSpringer Verlag
Pages598-604
Number of pages7
ISBN (Print)9783319990064
DOIs
Publication statusPublished - 2019 Jan 1
Event3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 - Kuala Lumpur, Malaysia
Duration: 2018 Jun 232018 Jun 24

Publication series

NameAdvances in Intelligent Systems and Computing
Volume843
ISSN (Print)2194-5357

Other

Other3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
CountryMalaysia
CityKuala Lumpur
Period18-06-2318-06-24

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A survey on SCADA security and honeypot in industrial control system'. Together they form a unique fingerprint.

  • Cite this

    Lu, K. C., Liu, I. H., Sun, M. W., & Li, J. S. (2019). A survey on SCADA security and honeypot in industrial control system. In F. Mohammed, F. Saeed, N. Gazem, & A. Busalim (Eds.), Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018 (pp. 598-604). (Advances in Intelligent Systems and Computing; Vol. 843). Springer Verlag. https://doi.org/10.1007/978-3-319-99007-1_56