The Dos and Don'ts of Industrial Network Simulation: A Field Report

作者: Hans D. Schotten , Michael Karrenbauer , Daniel Fraunholz , Simon Duque Anton , Dennis Krummacker

DOI: 10.1145/3284557.3284716

关键词:

摘要: Advances in industrial control lead to increasing incorporation of intercommunication technologies and embedded devices into the production environment. In addition that, rising complexity automation tasks creates demand for extensive solutions. Standardised protocols commercial off shelf aid providing these Still, setting up communication networks is a tedious high effort task. This justifies need simulation environments context, as they provide cost-, resource- time-efficient evaluation solution approaches. this work, use cases are identified according requirements derived. Furthermore, available emulation tools analysed. They mapped onto applications, so that an expressive assignment solutions application domains given.

参考文章(47)
Thomas Morris, Wei Gao, Industrial Control System Traffic Data Sets for Intrusion Detection Research international conference on critical infrastructure protection. pp. 65- 78 ,(2014) , 10.1007/978-3-662-45355-1_5
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
M. Dornseif, C.N. Klein, T. Holz, NoSEBrEaK - attacking honeynets Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.. pp. 123- 129 ,(2004) , 10.1109/IAW.2004.1437807
Dina Hadiosmanovic, Damiano Bolzoni, Pieter Hartel, Sandro Etalle, MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures EC2ND '11 Proceedings of the 2011 Seventh European Conference on Computer Network Defense. pp. 41- 48 ,(2011) , 10.1109/EC2ND.2011.10
Sethalat Rodhetbhai, Anirban Basu, Barnaby Livingston, Stephen Naicken, A Survey of Peer-to-Peer Network Simulators ,(2006)
Amit Kleinmann, Avishai Wool, ACCURATE MODELING OF THE SIEMENS S7 SCADA PROTOCOL FOR INTRUSION DETECTION AND DIGITAL FORENSICS The Journal of Digital Forensics, Security and Law. ,vol. 9, pp. 37- 50 ,(2014) , 10.15394/JDFSL.2014.1169
T. Holz, F. Raynal, Detecting honeypots and other suspicious environments systems man and cybernetics. pp. 29- 36 ,(2005) , 10.1109/IAW.2005.1495930
Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 303- 336 ,(2014) , 10.1109/SURV.2013.052213.00046
Chunlei Wang, Lan Fang, Yiqi Dai, A Simulation Environment for SCADA Security Analysis and Assessment international conference on measuring technology and mechatronics automation. ,vol. 1, pp. 342- 347 ,(2010) , 10.1109/ICMTMA.2010.603
Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera, A cyber-physical experimentation environment for the security analysis of networked industrial control systems Computers & Electrical Engineering. ,vol. 38, pp. 1146- 1161 ,(2012) , 10.1016/J.COMPELECENG.2012.06.015