What is Spoofing?

Spoofing is a collective term for attacks in which an attacker poses as a trusted device, user, or service. The aim is to create deception in order to gain access to systems, information, or process control.

In OT networks, spoofing can lead to data falsification, unauthorised control of equipment, or undermining of network security.


🧠 Common types of spoofing in OT

Type of spoofing Description
MAC spoofing Attacker copies the MAC address of an existing device (e.g. PLC)
IP spoofing Attacker uses the same IP address as a legitimate system
ARP spoofing Misleads other devices about which MAC corresponds to which IP → Man-In-The-Middle
DNS spoofing A wrong DNS response routes traffic to malicious systems
Protocol spoofing Emulating industrial protocols such as Modbus or OPC to send false signals

🎯 Spoofing in the OT context

Scenario Consequence
MAC spoofing of a SCADA server Network traffic is rerouted or sabotaged
IP spoofing of an HMI Operators receive false visualisations or controls
ARP spoofing between PLC and Historian Man-in-the-middle attack on production data
Fake Modbus traffic Unauthorised control of actuators or sensors

🛡️ Protective measures

Measure Description
MAC Binding Bind known MAC addresses to fixed ports
Port Security Limit the number of allowed devices per switch port
802.1X Requires authentication before network access
DHCP Snooping Verifies which IPs were obtained by which MAC address
IP Source Guard Blocks IP packets without a valid DHCP binding
Anomaly detection Recognises spoofing attempts via behaviour patterns or duplicate addresses
Zero Trust Architecture Trust nothing, verify everything — even within the internal network

🔍 Detection of spoofing

  • ARP inspection: Detect duplicate IP/MAC bindings
  • IDS/IPS such as Suricata or Zeek can flag active spoofing attempts
  • Network monitoring tools can visualise anomalies in traffic patterns
  • SIEM collects and correlates spoofing-related logs from switches/firewalls

📌 In summary

Spoofing is a fundamental threat in OT networks, since trust in identity is crucial. By blocking spoofing through network security and behavioural detection, you prevent systems from being misled or hijacked.