skip to main content
10.1145/2459976.2459997acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Development & expansion of an industrial control system security laboratory and an international research collaboration

Published: 08 January 2013 Publication History

Abstract

In this paper, we describe the incremental building of a unique industrial control system laboratory designed to investigate security vulnerabilities and to support development of mitigating tools and techniques. The laboratory has been built over time in a modular fashion with representative sectors of the critical infrastructure included. For two years, a strong collaboration with universities in Australia has been established and is described. The work has been supported by the Department of Homeland Security, the National Science Foundation, and the National Security Agency as well as by participating industrial partners. While the laboratory does offer limited teaching support, its primary purpose is research. The authors have found the lab to be affordable, effective, and representative of systems employed in the nation's critical infrastructure.

References

[1]
http://www.wired.com/threatlevel/2011/03/ghostexodus2/
[2]
McGrew, R. W., and Vaughn, R. B., "Discovering vulnerabilities in control system human machine interface software," Journal of Systems and Software, Volume 82, Issue 4, pp. 583--589, April 2009.
[3]
Morris, T., Pavurapu, K. A Retrofit Network Transaction Data Logger and Intrusion Detection System for Transmission and Distribution Substations, in the Proceedings of 2010 IEEE International Power and Energy Conference. Kuala Lumpur, Malaysia. Nov 29, 2010.
[4]
Morris, T., Vaughn, R., Dandass, Y. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. Proceedings of the 45th IEEE Hawaii International Conference on System Sciences (HICSS -- 45). January 4--7, 2012. Grand Wailea, Maui.
[5]
Morris, T., Vaughn, R., and Dandass, Y., "A Testbed for SCADA Control System Cybersecurity Research and Pedagogy," Proceedings of the 7th (2011) Cyber Security and Information Intelligence Research Workshop, Oak Ridge National Laboratory, October 11--14, 2011.
[6]
Slay, J & Miller 2007, 'The Maroochy Water SCADA Breach: Implications of Lessons Learned for Research', in Advances in Critical Infrastructure Protection. Springer, Boston, USA, pp. 73--82.
[7]
Reaves, B., Morris, T. Discovery, Infiltration, and Denial of Service in a Process Control System Wireless Network.

Cited By

View all
  • (2017)SMART: A System-Level Manufacturing and Automation Research TestbedSmart and Sustainable Manufacturing Systems10.1520/SSMS201700061:1(232-261)Online publication date: 27-Oct-2017
  • (2016)Teaching Industrial Control System Security Using Collaborative ProjectsSecurity of Industrial Control Systems and Cyber Physical Systems10.1007/978-3-319-40385-4_2(16-30)Online publication date: 18-Jun-2016
  • (2015)A Survey of Industrial Control System TestbedsSecure IT Systems10.1007/978-3-319-26502-5_2(11-26)Online publication date: 2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SCADA
  2. critical infrastructure security
  3. industrial control systems
  4. test bed

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)SMART: A System-Level Manufacturing and Automation Research TestbedSmart and Sustainable Manufacturing Systems10.1520/SSMS201700061:1(232-261)Online publication date: 27-Oct-2017
  • (2016)Teaching Industrial Control System Security Using Collaborative ProjectsSecurity of Industrial Control Systems and Cyber Physical Systems10.1007/978-3-319-40385-4_2(16-30)Online publication date: 18-Jun-2016
  • (2015)A Survey of Industrial Control System TestbedsSecure IT Systems10.1007/978-3-319-26502-5_2(11-26)Online publication date: 2015
  • (2013)The Power of Hands-On Exercises in SCADA Cyber Security EducationInformation Assurance and Security Education and Training10.1007/978-3-642-39377-8_9(83-94)Online publication date: 2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media