SHaPe: A Honeypot for Electric Power Substation

Authors

  • Kamil Kołtyś
  • Robert Gajewski

DOI:

https://doi.org/10.26636/jtit.2015.4.983

Keywords:

cybersecurity, IEC 61850, honeypots, SCADA

Abstract

Supervisory Control and Data Acquisition (SCADA) systems play a crucial role in national critical infrastructures, and any failure may result in severe damages. Initially SCADA networks were separated from other networks and used proprietary communications protocols that were well known only to the device manufacturers. At that time such isolation and obscurity ensured an acceptable security level. Nowadays, modern SCADA systems usually have direct or indirect Internet connection, use open protocols and commercial-off-the-shelf hardware and software. This trend is also noticeable in the power industry. Present substation automation systems (SASs) go beyond traditional SCADA and employ many solutions derived from Information and Communications Technology (ICT). As a result electric power substations have become more vulnerable for cybersecurity attacks and they need ICT security mechanisms adaptation. This paper shows the SCADA honeypot that allows detecting unauthorized or illicit traffic in SAS which communication architecture is defined according to the IEC 61850 standard.

Downloads

Download data is not yet available.

Downloads

Published

2015-12-30

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
K. Kołtyś and R. Gajewski, “SHaPe: A Honeypot for Electric Power Substation”, JTIT, vol. 62, no. 4, pp. 37–43, Dec. 2015, doi: 10.26636/jtit.2015.4.983.