Author
Listed:
- Maxim Kalinin
(Cybersecurity Department, Peter the Great St. Petersburg Polytechnic University, 195251 St. Petersburg, Russia)
- Dmitry Zegzhda
(Cybersecurity Department, Peter the Great St. Petersburg Polytechnic University, 195251 St. Petersburg, Russia)
- Evgenii Zavadskii
(Cybersecurity Department, Peter the Great St. Petersburg Polytechnic University, 195251 St. Petersburg, Russia)
Abstract
Rapid progress of computing and info-communication technologies (ICT) has changed the ecosystem of power production and delivery. Today, an energy network is a complex set of interrelated devices and information systems covering all areas of electric power operations and applying ICT based on open standards, such as IEC 60870, IEC 61850, and IEC 61970. According to IEC 62351, the energy networks are faced with high cybersecurity risks caused by open communications, security requirements rarely considered in the energy facilities, partial and difficult upgrades, and incompatibility of secure tools with industrial solutions. This situation results in new security challenges, e.g., denial of service attacks on the connected controllers, dispatching centers, process control systems, and terminals. IEC 62351 describes possible ways to comprehensive security in the energy networks. Most of them used in traditional networks (e.g., firewalls, intrusion detection systems) can be adapted to the energy networks. Honeypot systems as a protection measure help us to mitigate the attacks and maintain necessary security in the networks. Due to the large scale of an energy network and heterogeneity of its components, a new design, deployment, and management strategy for the honeypot systems are required. The paper suggests a new method for organizing a virtual network infrastructure of a hybrid honeypot system and a dynamic management method that adapts the network topology to the attacker’s actions according to the development graph of potential attacks. This technique allows us to dynamically build virtual networks of arbitrary scale. Because of the similarity of the virtual network to the virtualized origin and providing the level of interactivity of its nodes corresponding to real devices, this technique deploys an energy network indistinguishable from the real one for the attackers. A prototype of our honeypot system has been implemented, and experiments on it have demonstrated the more efficient use of the computing resources, the faster reaction to the attacker’s actions, and the deployment of different sizes of virtual networks for the given limits of the computing resources.
Suggested Citation
Maxim Kalinin & Dmitry Zegzhda & Evgenii Zavadskii, 2022.
"Protection of Energy Network Infrastructures Applying a Dynamic Topology Virtualization,"
Energies, MDPI, vol. 15(11), pages 1-18, June.
Handle:
RePEc:gam:jeners:v:15:y:2022:i:11:p:4123-:d:831225
Download full text from publisher
References listed on IDEAS
- Winn, Michael & Rice, Mason & Dunlap, Stephen & Lopez, Juan & Mullins, Barry, 2015.
"Constructing cost-effective and targetable industrial control system honeypots for production networks,"
International Journal of Critical Infrastructure Protection, Elsevier, vol. 10(C), pages 47-58.
Full references (including those not matched with items on IDEAS)
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:15:y:2022:i:11:p:4123-:d:831225. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.