A Simulation Environment for SCADA Security Analysis and Assessment

Published on Mar 13, 2010 in ICMTMA (International Conference on Measuring Technology and Mechatronics Automation)
路 DOI :10.1109/ICMTMA.2010.603
Chun Lei Wang1
Estimated H-index: 1
(THU: Tsinghua University),
Lan Fang1
Estimated H-index: 1
(THU: Tsinghua University),
Yiqi Dai1
Estimated H-index: 1
(THU: Tsinghua University)
Sources
Abstract
Simulation experiment is an important means of analyzing and assessing the security of SCADA (Supervisory Control and Data Acquisition) system, however, the existing simulation environments have some limitations in flexibility and extensibility. According to the type of industrial infrastructure and the structure of SCADA system, the abstract models of SCADA system are established, the reference architecture of SCADA system simulation environment is proposed, and the simulation environment for analyzing and assessing the security of SCADA system is designed and implemented. This simulation environment has the characteristics of extensibilities and adaptability, and integrated several components including the simulated enterprise network, OPC Client/HMI, industrial OPC server, SCADA protocol tester, SCADA RTUs, and the sensors and actuators, etc. Finally, experiment on the representative SCADA system attack scenario of has been conducted in this simulation environment to analyze and assess their security status, and the results demonstrate the effectiveness and practicability of the simulation environment.
馃摉 Papers frequently viewed together
2009NSS: Network and System Security
5 Authors (Carlos Queiroz, ..., Xinghuo Yu)
2010
4 Authors (Igor Nai Fovino, ..., Giorgio Carpi)
2006
References6
Newest
#1Carlo BellettiniH-Index: 14
#2Julian L. RrushiH-Index: 9
Pointer taintedness is a concept which has been successfully employed as basis for vulnerability analysis of C/C ++ source code, and as a run-time mitigation technique against memory corruption attacks. Nevertheless, pointer taintedness interferes with the specification of several industrial control protocols. As a consequence it is not directly usable in detecting memory corruption vulnerabilities in implementations of those industrial control protocols. Furthermore, source-code analysis may ha...
Source
Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean ...
Source
#1Yacov Y. HaimesH-Index: 62
#2Joost R. SantosH-Index: 26
Last. Zhenyu YanH-Index: 14
view all 6 authors...
A light source includes a substrate; an array of un-packaged light emitting semiconductor devices (LESDs), each of the LESDs having at least one surface for emitting light and a substrate surface being attached to the substrate; and a plurality of electrical connections, each electrical connection coupled for providing electrical power to a respective LESD. The LESDs are arranged on the substrate with sufficient density and light generating capability to provide a predetermined irradiation from ...
#1E. J. ByresH-Index: 1
#2D. HuffmanH-Index: 1
Last. N. KubeH-Index: 1
view all 3 authors...
The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control prot...
Many automation and modernization programs are now employing Intranet/Internet technologies in industrial control strategies. The ensuing systems are a mixture of state-of-the-art and legacy installations and create challenges in the implementation and enforcement of security measures. Control system intrusions can cause environmental damage, safety risks, poor quality and lost production. This paper presents methods to determine and reduce the vulnerability of networked control systems to unint...
Source
#1Yacov Y. HaimesH-Index: 62
A first-phase development of a mathematical theory for a new modeling schema that is termed hierarchical holographic modeling is presented. This theory will provide a methodology for capturing and dealing with a fundamental, but heretofore neglected, characteristic of large-scale systems-their multifarious nature. Truly large-scale systems reflect a bewildering variety of resources and capabilities and respond to an equally wide variety of objectives in response to the action of diverse users. M...
Source
Cited By61
Newest
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes electrical power systems, water distribution systems, nuclear power plants, etc. The growing interconnectivity, standardization of communication protocols and remote accessibility of modern SCADA systems have contributed massively to the exposure of SCADA systems and CIs to various forms of security challenges. Any fo...
Source
#1Dario GuidottiH-Index: 3
#2Giuseppe CicalaH-Index: 2
Last. Armando TacchellaH-Index: 31
view all 4 authors...
Source
#1Abdallah A. SmadiH-Index: 3
#2Babatunde AjaoH-Index: 2
Last. Qasem Abu Al-HaijaH-Index: 5
view all 6 authors...
The integration of improved control techniques with advanced information technologies enables the rapid development of smart grids. The necessity of having an efficient, reliable, and flexible communication infrastructure is achieved by enabling real-time data exchange between numerous intelligent and traditional electrical grid elements. The performance and efficiency of the power grid are enhanced with the incorporation of communication networks, intelligent automation, advanced sensors, and i...
Source
#1Mauro ContiH-Index: 61
#2Denis DonadelH-Index: 1
Last. Federico TurrinH-Index: 3
view all 3 authors...
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs) open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore, since ICSs are often employed in critical infrastructures (e.g., nuclear plants) and manufacturing companies (e.g., chemical industries), attacks can lead to devastating physical damages. In dealing with this security requirement, the research community focuses on developing new security mechanisms such as Intrusio...
Source
#1Ahmad Abdullah Alqarni (Al Baha University)H-Index: 1
Information exchange is considered very critical in the smart grids for system control and management. Communications with supported network virtualization through widespread connection provides real-time services for multiple users. However, the challenge of security threats is the problem that occurred in this technology, which is the vulnerability of the Advanced Metering Infrastructure (AMI) in the smart grid over network virtualization. Hackers use it as an entrance point to the smart grid ...
Source
#1Mohsin Ullah Khan (BU: Bahria University)H-Index: 1
#2Osama M. Hussain Rehman (BU: Bahria University)H-Index: 6
Last. Saqib Ali (Sultan Qaboos University)H-Index: 10
view all 4 authors...
A rapid rise in cyber-attacks on Cyber Physical Systems (CPS) has been observed in the last decade. It becomes even more concerning that several of these attacks were on critical infrastructures that indeed succeeded and resulted into significant physical and financial damages. Experimental testbeds capable of providing flexible, scalable and interoperable platform for executing various cybersecurity experiments is highly in need by all stakeholders. A container-based SCADA testbed is presented ...
Source
#1Dawn Silverman (NSU: Norfolk State University)
#2Yen-Hung Hu (NSU: Norfolk State University)H-Index: 2
Last. Mary Ann Hoppa (NSU: Norfolk State University)H-Index: 1
view all 3 authors...
SCADA devices have increasingly become targets of malicious actors, alerting industries, governments and even private citizens to the need for more effective security measures, particularly for critical infrastructure and industrial control systems. To address concerns on this issue, a thorough survey and investigation was conducted on cyber-attacks targeting SCADA systems to propose solutions and recommendations for mitigating such attacks. This research first studied some historical perspectiv...
#1Konstantinos Demertzis (DUTH: Democritus University of Thrace)H-Index: 16
#2Lazaros S. Iliadis (DUTH: Democritus University of Thrace)H-Index: 21
Last. Ilias Bougoudis (University of Bremen)H-Index: 7
view all 3 authors...
The backbone of the economy, security and sustainability of a state is inseparably linked to the security of its critical infrastructure. Critical infrastructures define goods, systems or subsystems that are essential to maintain the vital functions of society, health, physical protection, security plus economic and social well-being of citizens. The digital security of critical infrastructures is a very important priority for the well-being of every country, especially nowadays, because of the ...
Source
#1Deval Bhamare (Karlstad University)H-Index: 12
#2Maede Zolanvari (WashU: Washington University in St. Louis)H-Index: 7
Last. Nader Meskin (Qatar University)H-Index: 27
view all 6 authors...
Abstract Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). ICSs are often found in the industrial sectors and critical infrastructures, such as nuclear and thermal plants, water treatment facilities, power generation, heavy industries, and distribution systems. Though ICSs were kept isolated from the Interne...
Source
#1Damjan Gogic (University of Novi Sad)H-Index: 1
#2Bojan Jelacic (University of Novi Sad)H-Index: 3
Last. Imre Lendak (University of Novi Sad)H-Index: 7
view all 3 authors...
The goal of this paper is to simulate the effects of different Distributed Denial of Service (DDoS) attack scenarios which might be launched against smart grid Supervisory Control and Data Acquisition systems, i.e. SCADAs. We will analyze attacks which are launched from compromised Remote Terminal Units (RTUs) located in the process environment. We created an ICS testbed and industrial DDoS simulator environment consisting of a single C&C server and a configurable number of bots. We simulated sc...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.