Tracking smart grid hackers

John Hastings*, David M. Laverty, D. John Morrow

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)


The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.

Original languageEnglish
Title of host publicationPower Engineering Conference (UPEC), 2014 49th International Universities
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages5
ISBN (Print)978-1-4799-6556-4
Publication statusPublished - Sep 2014
Event49th International Universities Power Engineering Conference, UPEC 2014 - Cluj-Napoca, Romania
Duration: 02 Sep 201405 Sep 2014


Conference49th International Universities Power Engineering Conference, UPEC 2014
Abbreviated titleUPEC 2014


  • Communications
  • Hackers
  • Honeypot
  • Information
  • Networks
  • Security
  • Smart Grid

ASJC Scopus subject areas

  • Energy Engineering and Power Technology


Dive into the research topics of 'Tracking smart grid hackers'. Together they form a unique fingerprint.

Cite this