A cyber-physical experimentation environment for the security analysis of networked industrial control systems

作者: Béla Genge , Christos Siaterlis , Igor Nai Fovino , Marcelo Masera

DOI: 10.1016/J.COMPELECENG.2012.06.015

关键词:

摘要: Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure impact attacks against both physical and cyber parts these systems. This paper presents innovative framework for experimentation environment can reproduce concurrently The proposed approach uses emulation testbed based on Emulab recreate components a real-time simulator, Simulink, processes. main novelty is it provides set experimental capabilities are missing from other approaches, e.g. safe with real malware, flexibility use different feasibility confirmed by development fully functional prototype, while its applicability proven through two case industrial systems electrical chemical domain.

参考文章(23)
Samuel East, Jonathan Butts, Mauricio Papa, Sujeet Shenoi, A Taxonomy of Attacks on the DNP3 Protocol international conference on critical infrastructure protection. ,vol. 311, pp. 67- 81 ,(2009) , 10.1007/978-3-642-04798-5_5
Brian White, Jay Lepreau, Leigh Stoller, Robert Ricci, Shashi Guruprasad, Mac Newbold, Mike Hibler, Chad Barb, Abhijeet Joglekar, An integrated experimental environment for distributed systems and networks ACM SIGOPS Operating Systems Review. ,vol. 36, pp. 255- 270 ,(2002) , 10.1145/844128.844152
Chunlei Wang, Lan Fang, Yiqi Dai, A Simulation Environment for SCADA Security Analysis and Assessment international conference on measuring technology and mechatronics automation. ,vol. 1, pp. 342- 347 ,(2010) , 10.1109/ICMTMA.2010.603
Jelena Mirkovic, Terry V. Benzel, Ted Faber, Robert Braden, John T. Wroclawski, Stephen Schwab, The DETER project: Advancing the science of cyber security experimentation and test ieee international conference on technologies for homeland security. pp. 1- 7 ,(2010) , 10.1109/THS.2010.5655108
Roman Chertov, Sonia Fahmy, Ness B. Shroff, Fidelity of network simulation and emulation ACM Transactions on Modeling and Computer Simulation. ,vol. 19, pp. 1- 29 ,(2008) , 10.1145/1456645.1456649
J.J. Downs, E.F. Vogel, A plant-wide industrial process control problem Computers & Chemical Engineering. ,vol. 17, pp. 245- 255 ,(1993) , 10.1016/0098-1354(93)80018-I
C. M. Davis, J. E. Tate, H. Okhravi, C. Grier, T. J. Overbye, D. Nicol, SCADA Cyber Security Testbed Development north american power symposium. pp. 483- 488 ,(2006) , 10.1109/NAPS.2006.359615
Hua Guo, Chang Xu, Yi Mu, Zhoujun Li, A provably secure authenticated key agreement protocol for wireless communications Computers & Electrical Engineering. ,vol. 38, pp. 563- 572 ,(2012) , 10.1016/J.COMPELECENG.2011.10.015
Huanqing Cui, Yinglong Wang, Four-mobile-beacon assisted localization in three-dimensional wireless sensor networks Computers & Electrical Engineering. ,vol. 38, pp. 652- 661 ,(2012) , 10.1016/J.COMPELECENG.2011.10.012
Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry, Attacks against process control systems Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11. pp. 355- 366 ,(2011) , 10.1145/1966913.1966959