Modbus Packet Analysis and Attack Mode for SCADA System

  • Cheng-Hui Chou Institute of Department of Electrical Engineering, National Cheng Kung University, Tainan, Taiwan
  • Chi-Che Wu Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan
  • Kuan-Chu Lu Institute of Department of Electrical Engineering, National Cheng Kung University, Tainan, Taiwan
  • I-Hsien Liu Institute of Department of Electrical Engineering, National Cheng Kung University, Tainan, Taiwan
  • Tien-Hsiang Chang Department of Information Management, National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan
  • Chu-Fen Li Department of Finance, National Formosa University, Huwei, Taiwan
  • Jung-Shian Li Institute of Department of Electrical Engineering, National Cheng Kung University, Tainan, Taiwan
Keywords: Industrial Control Systems, Modbus/TCP, IoT

Abstract

Internet of Things (IoT) and Industry 4.0 have become more and more common in recent years. In fact, smart houses that are common in the home, also include the monitor of the factory. Numerous IoT devices are developed on the basis of Linux. In view of this traditional network installation is more worthy of attention on the IoT. We remember to update the update of the home computer but often overlook the update of the IoT device because most of the IoT devices requires manual updates. Hackers often exploit this vulnerability to attack related devices. So, how to protect the IoT equipments is the topic of this study. This study proposes a honeypot search system based on self-study. The system can be used to search the honeypot system that may exist in the regional network, and design a smart honeypot system to confuse the attack of the hacker and protect the internal system of the enterprise.

Published
2018-12-28
How to Cite
[1]
Cheng-Hui Chou, “Modbus Packet Analysis and Attack Mode for SCADA System”, J. ICT des. eng. technol. sci., vol. 2, no. 2, pp. 30-35, Dec. 2018.
Section
Articles