skip to main content
10.1145/2593783.2593790acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

A security test-bed for industrial control systems

Published:31 May 2014Publication History

ABSTRACT

Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA), Distributed Control Systems (DCS) and Distributed Automation Systems (DAS) control and monitor critical infrastructures. In recent years, proliferation of cyber-attacks to ICS revealed that a large number of security vulnerabilities exist in such systems. Excessive security solutions are proposed to remove the vulnerabilities and improve the security of ICS. However, to the best of our knowledge, none of them presented or developed a security test-bed which is vital to evaluate the security of ICS tools and products. In this paper, a test-bed is proposed for evaluating the security of industrial applications by providing different metrics for static testing, dynamic testing and network testing in industrial settings. Using these metrics and results of the three tests, industrial applications can be compared with each other from security point of view. Experimental results on several real world applications indicate that proposed test-bed can be successfully employed to evaluate and compare the security level of industrial applications.

References

  1. Duggan, D. P. 2005. Penetration Testing of Industrial Control Systems. Sandia National Laboratories, Report No. SAND2005-2846P.Google ScholarGoogle Scholar
  2. Permann, M. R., Rohde, K. 2005. Cyber Assessment Methods for SCADA Security. Idaho National Laboratory, Idaho Falls, Idaho 83415, Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference.Google ScholarGoogle Scholar
  3. Nelson, T. D. 2005. Common Control System Vulnerability. Idaho National Laboratory, Idaho Falls, Idaho 83415.Google ScholarGoogle Scholar
  4. Nelson, T. D. 2006. Mitigations for security vulnerabilities found in control system networks. In Proceedings of 16th Annual Joint ISA POWID/EPRI Controls Instrumentation Conference, pp. 1-12.Google ScholarGoogle Scholar
  5. Ten, C. W., Liu, C. C. and Manimaran, G. 2008. Vulnerability Assessment of Cyber security for SCADA Systems. IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, 1836 - 1846.Google ScholarGoogle Scholar
  6. Davis, C. M., Tate, J. E., Okhravi, H., Grier, C., Overbye, T. J., and Nicol, D. 2006. SCADA Cyber Security Test-bed Development. 38th North American Power Symposium, NAPS, 483-488.Google ScholarGoogle Scholar
  7. Cagalaban, G., Kim, T. and Kim, S. 2010. Improving SCADA Control Systems Security with Software Vulnerability Analysis. Proceedings of the 12th WSEAS International Conference on Automatic Control, Modelling & Simulation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Queiroz, C., Mahmood, A. and Tari, Z. 2011. SCADASim— A Framework for Building SCADA Simulations. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, 589 - 597.Google ScholarGoogle Scholar
  9. Nicholson, A. et al. 2012. SCADA security in the light of Cyber-Warfare. Elsevier computers & security journal, VOL. 31, NO. 4, 418 - 436. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Azuwa, M. P., Ahmad, R. and Sahib, S. 2012. A Propose Technical Security Metrics Model for SCADA Systems. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).Google ScholarGoogle Scholar
  11. Genge, B. et al. 2012. A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Elsevier Computers and Electrical Engineering, VOL. 38, NO. 5, 1146 - 1161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Common Weakness Enumeration (CWE). http://cwe.mitre.org/ {Accessed 12 October 2013}.Google ScholarGoogle Scholar
  13. Department of Homeland Security (DHS). 2009. Recommended Practice: improving industrial control systems cyber security with Defense-In-Depth strategies. DHS Documents.Google ScholarGoogle Scholar

Index Terms

  1. A security test-bed for industrial control systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MoSEMInA 2014: Proceedings of the 1st International Workshop on Modern Software Engineering Methods for Industrial Automation
              May 2014
              71 pages
              ISBN:9781450328517
              DOI:10.1145/2593783

              Copyright © 2014 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 31 May 2014

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Upcoming Conference

              ICSE 2025

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader