Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
RICS-el: Building a National Testbed for Research and Training on SCADA Security
Department of computer science and engineering, Chalmers university of technology, Gothenburg.
FOI, Swedish Defence Research Agency, Linköping, Sweden.
Stockholms stad / Kungliga Tekniska Högskolan, KTH, Stockholm.
Industrial Information and Control Systems, Royal Institute of Technology, KTH, Stockholm.
Show others and affiliations
2019 (English)In: Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers / [ed] Eric Luiijf, Inga Žutautaitė and Bernhard Hämmerli, Springer, 2019, p. 219-225Chapter in book (Refereed)
Abstract [en]

Trends show that cyber attacks targeting critical infrastructures are increasing, but security research for protecting such systems are challenging. There is a gap between the somewhat simplified models researchers at universities can sustain contra the complex systems at infrastructure owners that seldom can be used for direct research. There is also a lack of common datasets for research benchmarking. This paper presents a national experimental testbed for security research within supervisory control and data acquisition systems (SCADA), accessible for both research training and experiments. The virtualized testbed has been designed and implemented with both vendor experts and security researchers to balance the goals of realism with specific research needs. It includes a real SCADA product for energy management, a number of network zones, substation nodes, and a simulated power system. This environment enables creation of scenarios similar to real world utility scenarios, attack generation, development of defence mechanisms, and perhaps just as important: generating open datasets for comparative research evaluation.

Place, publisher, year, edition, pages
Springer, 2019. p. 219-225
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 11260
Keywords [en]
Cyber security in C(I)I systems; Modelling; Simulation Analysis and Validation approaches to C(I)IP Training for C(I)IP and effective intervention
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-154379DOI: 10.1007/978-3-030-05849-4_17ISBN: 9783030058487 (print)ISBN: 9783030058494 (electronic)ISBN: 9783030058494 (electronic)OAI: oai:DiVA.org:liu-154379DiVA, id: diva2:1287507
Available from: 2019-02-11 Created: 2019-02-11 Last updated: 2019-02-26Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Search in DiVA

By author/editor
Nadjm-Tehrani, Simin
By organisation
Software and SystemsFaculty of Science & Engineering
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 160 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf