A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocol...
Gespeichert in:
Veröffentlicht in: | Automatic control and computer sciences 2016, Vol.50 (1), p.54-62 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 62 |
---|---|
container_issue | 1 |
container_start_page | 54 |
container_title | Automatic control and computer sciences |
container_volume | 50 |
creator | Tesfahun, Abebe Bhaskari, D. Lalitha |
description | Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security. |
doi_str_mv | 10.3103/S0146411616010090 |
format | Article |
fullrecord | <record><control><sourceid>crossref_sprin</sourceid><recordid>TN_cdi_crossref_primary_10_3103_S0146411616010090</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_3103_S0146411616010090</sourcerecordid><originalsourceid>FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</originalsourceid><addsrcrecordid>eNp9kE9LAzEQxYMoWKsfwFu-wOok2c1uj0v9C4KHKngQliQ7KSnrVibZQr-9KfUmeJoZfu8Nj8fYtYAbJUDdrkCUuhRCCw0CYAEnbCaqqikENB-nbHbAxYGfs4sYNwCZNXrGPlu-WrZ3LU8Yk8We-y3xMO7yFdYmhXHN3d4i8YhuopD2fDcNI5KxYQgpYMxi7jIIzgx592RiosmliTBesjNvhohXv3PO3h_u35ZPxcvr4_OyfSmcbJpUVB4AF31fqrIW3otaW61LBUpKb6oaZGl6h65HcM6iN7K3tlJGIpq6dlipORPHv462MRL67pvCl6F9J6A71NP9qSd75NETs3ZcI3Wb7URjjvmP6QdUaWmY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</title><source>SpringerLink Journals</source><creator>Tesfahun, Abebe ; Bhaskari, D. Lalitha</creator><creatorcontrib>Tesfahun, Abebe ; Bhaskari, D. Lalitha</creatorcontrib><description>Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.</description><identifier>ISSN: 0146-4116</identifier><identifier>EISSN: 1558-108X</identifier><identifier>DOI: 10.3103/S0146411616010090</identifier><language>eng</language><publisher>New York: Allerton Press</publisher><subject>Computer Science ; Control Structures and Microprogramming</subject><ispartof>Automatic control and computer sciences, 2016, Vol.50 (1), p.54-62</ispartof><rights>Allerton Press, Inc. 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</citedby><cites>FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.3103/S0146411616010090$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.3103/S0146411616010090$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Tesfahun, Abebe</creatorcontrib><creatorcontrib>Bhaskari, D. Lalitha</creatorcontrib><title>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</title><title>Automatic control and computer sciences</title><addtitle>Aut. Control Comp. Sci</addtitle><description>Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.</description><subject>Computer Science</subject><subject>Control Structures and Microprogramming</subject><issn>0146-4116</issn><issn>1558-108X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LAzEQxYMoWKsfwFu-wOok2c1uj0v9C4KHKngQliQ7KSnrVibZQr-9KfUmeJoZfu8Nj8fYtYAbJUDdrkCUuhRCCw0CYAEnbCaqqikENB-nbHbAxYGfs4sYNwCZNXrGPlu-WrZ3LU8Yk8We-y3xMO7yFdYmhXHN3d4i8YhuopD2fDcNI5KxYQgpYMxi7jIIzgx592RiosmliTBesjNvhohXv3PO3h_u35ZPxcvr4_OyfSmcbJpUVB4AF31fqrIW3otaW61LBUpKb6oaZGl6h65HcM6iN7K3tlJGIpq6dlipORPHv462MRL67pvCl6F9J6A71NP9qSd75NETs3ZcI3Wb7URjjvmP6QdUaWmY</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Tesfahun, Abebe</creator><creator>Bhaskari, D. Lalitha</creator><general>Allerton Press</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>2016</creationdate><title>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</title><author>Tesfahun, Abebe ; Bhaskari, D. Lalitha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c288t-5f00e9dd43471ff176b66430322fa57024adcecde0ccbefa2dbb53a2eea77ce53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer Science</topic><topic>Control Structures and Microprogramming</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tesfahun, Abebe</creatorcontrib><creatorcontrib>Bhaskari, D. Lalitha</creatorcontrib><collection>CrossRef</collection><jtitle>Automatic control and computer sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tesfahun, Abebe</au><au>Bhaskari, D. Lalitha</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures</atitle><jtitle>Automatic control and computer sciences</jtitle><stitle>Aut. Control Comp. Sci</stitle><date>2016</date><risdate>2016</risdate><volume>50</volume><issue>1</issue><spage>54</spage><epage>62</epage><pages>54-62</pages><issn>0146-4116</issn><eissn>1558-108X</eissn><abstract>Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.</abstract><cop>New York</cop><pub>Allerton Press</pub><doi>10.3103/S0146411616010090</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0146-4116 |
ispartof | Automatic control and computer sciences, 2016, Vol.50 (1), p.54-62 |
issn | 0146-4116 1558-108X |
language | eng |
recordid | cdi_crossref_primary_10_3103_S0146411616010090 |
source | SpringerLink Journals |
subjects | Computer Science Control Structures and Microprogramming |
title | A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T09%3A12%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20SCADA%20testbed%20for%20investigating%20cyber%20security%20vulnerabilities%20in%20critical%20infrastructures&rft.jtitle=Automatic%20control%20and%20computer%20sciences&rft.au=Tesfahun,%20Abebe&rft.date=2016&rft.volume=50&rft.issue=1&rft.spage=54&rft.epage=62&rft.pages=54-62&rft.issn=0146-4116&rft.eissn=1558-108X&rft_id=info:doi/10.3103/S0146411616010090&rft_dat=%3Ccrossref_sprin%3E10_3103_S0146411616010090%3C/crossref_sprin%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |