SHaPe: a Honeypot for Electric Power Substation

Kołtyś, K; Gajewski, R

  • Journal of Telecommunications and Information Technologies;
  • Tom: 4;
  • Strony: 37-43;
  • 2015;

Supervisory Control and Data Acquisition (SCADA) systems play a crucial role in national critical infrastructures, and any failure may result in severe damages. Initially SCADA networks were separated from other networks and used proprietary communications protocols that were well known only to the device manufacturers. At that time such isolation and obscurity ensured an acceptable security level. Nowadays, modern SCADA systems usually have direct or indirect Internet connection, use open protocols and commercial-o -the-shelf hardware and software. This trend is also noticeable in the power industry. Present substation automation systems (SASs) go beyond traditional SCADA and employ many solutions derived from Information and Communications Technology (ICT). As a result electric power substations have become more vulnerable for cybersecurity attacks and they need ICT security mechanisms adaptation. This paper shows the SCADA honeypot that allows detecting unauthorized or illicit trac in SAS which communication architecture is de ned according to the IEC 61850 standard.

Słowa kluczowe: cybersecurity, honeypots