A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures

Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocol...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automatic control and computer sciences 2016, Vol.50 (1), p.54-62
Hauptverfasser: Tesfahun, Abebe, Bhaskari, D. Lalitha
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 62
container_issue 1
container_start_page 54
container_title Automatic control and computer sciences
container_volume 50
creator Tesfahun, Abebe
Bhaskari, D. Lalitha
description Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.
doi_str_mv 10.3103/S0146411616010090
format Article
fullrecord <record><control><sourceid>crossref_sprin</sourceid><recordid>TN_cdi_crossref_primary_10_3103_S0146411616010090</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_3103_S0146411616010090</sourcerecordid><originalsourceid>FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</originalsourceid><addsrcrecordid>eNp9kE9LAzEQxYMoWKsfwFu-wOok2c1uj0v9C4KHKngQliQ7KSnrVibZQr-9KfUmeJoZfu8Nj8fYtYAbJUDdrkCUuhRCCw0CYAEnbCaqqikENB-nbHbAxYGfs4sYNwCZNXrGPlu-WrZ3LU8Yk8We-y3xMO7yFdYmhXHN3d4i8YhuopD2fDcNI5KxYQgpYMxi7jIIzgx592RiosmliTBesjNvhohXv3PO3h_u35ZPxcvr4_OyfSmcbJpUVB4AF31fqrIW3otaW61LBUpKb6oaZGl6h65HcM6iN7K3tlJGIpq6dlipORPHv462MRL67pvCl6F9J6A71NP9qSd75NETs3ZcI3Wb7URjjvmP6QdUaWmY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</title><source>SpringerLink Journals</source><creator>Tesfahun, Abebe ; Bhaskari, D. Lalitha</creator><creatorcontrib>Tesfahun, Abebe ; Bhaskari, D. Lalitha</creatorcontrib><description>Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.</description><identifier>ISSN: 0146-4116</identifier><identifier>EISSN: 1558-108X</identifier><identifier>DOI: 10.3103/S0146411616010090</identifier><language>eng</language><publisher>New York: Allerton Press</publisher><subject>Computer Science ; Control Structures and Microprogramming</subject><ispartof>Automatic control and computer sciences, 2016, Vol.50 (1), p.54-62</ispartof><rights>Allerton Press, Inc. 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</citedby><cites>FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.3103/S0146411616010090$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.3103/S0146411616010090$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Tesfahun, Abebe</creatorcontrib><creatorcontrib>Bhaskari, D. Lalitha</creatorcontrib><title>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</title><title>Automatic control and computer sciences</title><addtitle>Aut. Control Comp. Sci</addtitle><description>Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.</description><subject>Computer Science</subject><subject>Control Structures and Microprogramming</subject><issn>0146-4116</issn><issn>1558-108X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LAzEQxYMoWKsfwFu-wOok2c1uj0v9C4KHKngQliQ7KSnrVibZQr-9KfUmeJoZfu8Nj8fYtYAbJUDdrkCUuhRCCw0CYAEnbCaqqikENB-nbHbAxYGfs4sYNwCZNXrGPlu-WrZ3LU8Yk8We-y3xMO7yFdYmhXHN3d4i8YhuopD2fDcNI5KxYQgpYMxi7jIIzgx592RiosmliTBesjNvhohXv3PO3h_u35ZPxcvr4_OyfSmcbJpUVB4AF31fqrIW3otaW61LBUpKb6oaZGl6h65HcM6iN7K3tlJGIpq6dlipORPHv462MRL67pvCl6F9J6A71NP9qSd75NETs3ZcI3Wb7URjjvmP6QdUaWmY</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Tesfahun, Abebe</creator><creator>Bhaskari, D. Lalitha</creator><general>Allerton Press</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>2016</creationdate><title>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</title><author>Tesfahun, Abebe ; Bhaskari, D. Lalitha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer Science</topic><topic>Control Structures and Microprogramming</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tesfahun, Abebe</creatorcontrib><creatorcontrib>Bhaskari, D. Lalitha</creatorcontrib><collection>CrossRef</collection><jtitle>Automatic control and computer sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tesfahun, Abebe</au><au>Bhaskari, D. Lalitha</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</atitle><jtitle>Automatic control and computer sciences</jtitle><stitle>Aut. Control Comp. Sci</stitle><date>2016</date><risdate>2016</risdate><volume>50</volume><issue>1</issue><spage>54</spage><epage>62</epage><pages>54-62</pages><issn>0146-4116</issn><eissn>1558-108X</eissn><abstract>Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.</abstract><cop>New York</cop><pub>Allerton Press</pub><doi>10.3103/S0146411616010090</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0146-4116
ispartof Automatic control and computer sciences, 2016, Vol.50 (1), p.54-62
issn 0146-4116
1558-108X
language eng
recordid cdi_crossref_primary_10_3103_S0146411616010090
source SpringerLink Journals
subjects Computer Science
Control Structures and Microprogramming
title A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T09%3A12%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20SCADA%20testbed%20for%20investigating%20cyber%20security%20vulnerabilities%20in%20critical%20infrastructures&rft.jtitle=Automatic%20control%20and%20computer%20sciences&rft.au=Tesfahun,%20Abebe&rft.date=2016&rft.volume=50&rft.issue=1&rft.spage=54&rft.epage=62&rft.pages=54-62&rft.issn=0146-4116&rft.eissn=1558-108X&rft_id=info:doi/10.3103/S0146411616010090&rft_dat=%3Ccrossref_sprin%3E10_3103_S0146411616010090%3C/crossref_sprin%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true