Review of SCADA systems and IoT honeypots

Internet of Things (IoT) is a massive technology that is being improved day by day. It connects different types of devices to the internet so that they can interchange data. The most feild that has been improved by implementing IoT’s technology is Supervisory Control and Data Acquisition (SCADA...

Full description

Saved in:
Bibliographic Details
Main Authors: Alquwatli, Mohammed H., Habaebi, Mohamed Hadi, Khan, Sheroz
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2020
Subjects:
Online Access:http://irep.iium.edu.my/80899/7/80899%20Review%20of%20SCADA%20Systems%20and%20IoT%20Honeypots.pdf
http://irep.iium.edu.my/80899/13/80899_Review%20of%20SCADA%20Systems%20and%20IoT%20Honeypots_scopus.pdf
http://irep.iium.edu.my/80899/
https://ieeexplore.ieee.org/abstract/document/9117330
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Internet of Things (IoT) is a massive technology that is being improved day by day. It connects different types of devices to the internet so that they can interchange data. The most feild that has been improved by implementing IoT’s technology is Supervisory Control and Data Acquisition (SCADA) Systems, or Industrial Control Systems (ICS). The application of these systems is to be used in controlling different elements that is connected to it (sensors, devices, and machines). However, connecting different types of devices of different physical circuitry and different communication technology, together raises various security issues that has been a place of concern for years. A famous technique that has been implemented in the field of security to further study Cyber Attacks, its causes, and effects is Honeypots. The Aim from this paper is to categorize Cyber -physical attacks and their effects, study SCADA/ICS systems’ architecture, highlight its security weaknesses, and how Cyber/Physical attacks make use of these weaknesses. Finally, a break down Honeypots and understand its implementation and effectiveness in the Field of Cyber Security.