skip to main content
10.1145/2808705.2808715acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

MiniCPS: A Toolkit for Security Research on CPS Networks

Authors Info & Claims
Published:16 October 2015Publication History

ABSTRACT

In recent years, tremendous effort has been spent to modernizing communication infrastructure in Cyber-Physical Systems (CPS) such as Industrial Control Systems (ICS) and related Supervisory Control and Data Acquisition (SCADA) systems. While a great amount of research has been conducted on network security of office and home networks, recently the security of CPS and related systems has gained increased attention. Unfortunately, real-world CPS are often not open to security researchers, and as a result very few reference physical-layer processes, control systems and communication topologies are available.

In this work, we present MiniCPS, a toolkit intended to alleviate this problem. The goal of MiniCPS is to create an extensible, reproducible research environment for network communications, control systems, and physical-layer interactions in CPS. Instead of focusing on a customized simulation settings for specific subsystems, the main goal is to establish a framework to connect together real CPS soft- and hardware, simulation scripts for such components, and physical-layer simulation engines. MiniCPS builds on Mininet to provide lightweight real-time network emulation, and extends Mininet with tools to simulate typical CPS components such as programmable logic controllers, which use industrial protocols (eg. EtherNet/IP, Modbus/TCP). To capture physical-layer interactions, MiniCPS defines a simple API to connect to physical-layer simulations. We demonstrate applications of MiniCPS in two example scenarios, and show how MiniCPS can be used to develop attacks and defenses that are directly applicable to real systems.

References

  1. D. C. Bergman and D. M. Nicol. Test bed for evaluation of power grid cyber-infrastructure. In P. M. K Popovici, editor, Real-Time Simulation Technologies Principles, Methodologies, and Applications. CRC Press, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  2. T. Bhat and N. Nagappan. Evaluating the efficacy of test-driven development: industrial case studies. In Proceedings of symposium on Empirical Software Engineering (ISESE), pages 1--8, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker. SANE: a protection architecture for enterprise networks. In Proc. of the USENIX Security Symposium, pages 137--151, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Chabukswar, B. Sinópoli, G. Karsai, A. Giani, H. Neema, and A. Davis. Simulation of network attacks on scada systems. First Workshop on Secure Control Systems, 2010.Google ScholarGoogle Scholar
  5. CISCO. Industrial ethernet: A control engineer's guide. www.cisco.com/web/strategy/docs/manufacturing/industrial_ethernet.pdf.Google ScholarGoogle Scholar
  6. R. de Oliveira, A. Shinoda, C. Schweitzer, and L. Rodrigues Prete. Using Mininet for emulation and prototyping software-defined networks. In Proceedings of Conference on Communications and Computing (COLCOM), pages 1--6, June 2014.Google ScholarGoogle ScholarCross RefCross Ref
  7. X. Dong, H. Lin, R. Tan, R. K. Iyer, and Z. Kalbarczyk. Software-defined networking for smart grid resilience: Opportunities and challenges. In In Proceedings of The Cyber-Physical System Security Workshop (CPSS), April 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ettercap Project. Ettercap. https://ettercap.github.io/ettercap/.Google ScholarGoogle Scholar
  9. N. Feamster, J. Rexford, and E. Zegura. The road to SDN. ACM Queue, 11(12):20--40, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Galloway and G. P. Hancke. Introduction to industrial control networks. IEEE Communications Surveys & Tutorials, 15(2):860--880, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  11. N. Handigol, B. Heller, V. Jeyakumar, B. Lantz, and N. McKeown. Reproducible network experiments using container-based emulation. In Proceedings of Conference on Emerging Networking Experiments and Technologies (CoNEXT), CoNEXT '12, pages 253--264, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Issariyakul and E. Hossain. Introduction to Network Simulator NS2. Springer Publishing Company, Incorporated, 1 edition, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Kundert. Communications protocol python parser and originator. https://github.com/pjkundert/cpppo. {Online; accessed 14-June-2015}.Google ScholarGoogle Scholar
  14. B. Lantz, B. Heller, and N. McKeown. A network in a laptop: Rapid prototyping for software-defined networks. In Proc. of the SIGCOMM Workshop on Hot Topics in Networks, pages 19:1--19:6, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Liljenstam, J. Liu, D. Nicol, Y. Yuan, G. Yan, and C. Grier. RINSE: The real-time immersive network simulation environment for network security exercises. In Proceedings of Workshop on Principles of Advanced and Distributed Simulation (PADS), pages 119--128, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao. On false data injection attacks against distributed energy routing in smart grid. In Conference on Cyber-Physical Systems (ICCPS), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Mckeown, T. Anderson, H. Balakrishnan, G. M. Parulkar, L. L. Peterson, J. Rexford, S. Shenker, J. S. Turner, and S. Louis. OpenFlow: enabling innovation in campus networks. Computer Communication Review, 38(2):69--74, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. R. Moyne and D. Tilbury. The emergence of industrial control networks for manufacturing control, diagnostics, and safety data. Proceedings of the IEEE, 95(1):29--47, Jan 2007.Google ScholarGoogle ScholarCross RefCross Ref
  19. NOXRepo.org. The pox controller. https://github.com/noxrepo/pox. {Online; accessed 14-June-2015}.Google ScholarGoogle Scholar
  20. ODVA. Ethernet/ip technology overview. https://www.odva.org/Home/ODVATECHNOLOGIES/EtherNetIP.aspx.Google ScholarGoogle Scholar
  21. Open Networking Foundation. Software-Defined Networking: The New Norm for Networks {white paper}. ONF White Paper, pages 1--12, 2012.Google ScholarGoogle Scholar
  22. T. Phinney. IEC 62443: Industrial network and system security. https://www.isa.org/pdfs/autowest/phinneydone/.Google ScholarGoogle Scholar
  23. A. Ruscito. Pycomm: a collection of modules used to communicate with plcs. https://github.com/ruscito/pycomm. {Online; accessed 14-June-2015}.Google ScholarGoogle Scholar
  24. Thenewstack.io. SDN Series, 2015.Google ScholarGoogle Scholar
  25. A. Varga et al. The OMNeT+discrete event simulation system. In Proc. of the European simulation multiconference (ESM), page 65. sn, 2001.Google ScholarGoogle Scholar
  26. E. Wang, Y. Ye, X. Xu, S. Yiu, L. Hui, and K. Chow. Security issues and challenges for cyber physical system. In Proceedings of Conference on Cyber, Physical and Social Computing (CPSCom), pages 733 --738, December 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Whalen. An introduction to arp spoofing. machacking.net/kb/files/arpspoof.pdf, 2001.Google ScholarGoogle Scholar
  28. W. You and K. Qian. OpenFlow security threat detection and defense services. Int. J. Advanced Networking and Applications, 2351:2347--2351, 2014.Google ScholarGoogle Scholar
  29. A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou. Orchsec: An orchestrator-based architecture for enhancing network-security using network monitoring and sdn control functions. In Network Operations and Management Symposium (NOMS), pages 1--9, May 2014.Google ScholarGoogle ScholarCross RefCross Ref
  30. B. Zhu, A. Joseph, and S. Sastry. A taxonomy of cyber attacks on SCADA systems. In Proceedings of Conference on Cyber, Physical and Social Computing, pages 380--388, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Zonouz, K. Rogers, R. Berthier, R. Bobba, W. Sanders, and T. Overbye. SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures. Smart Grid, IEEE Transactions on, 3(4):1790--1799, Dec 2012.Google ScholarGoogle Scholar

Index Terms

  1. MiniCPS: A Toolkit for Security Research on CPS Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CPS-SPC '15: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy
      October 2015
      132 pages
      ISBN:9781450338271
      DOI:10.1145/2808705

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 October 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CPS-SPC '15 Paper Acceptance Rate11of20submissions,55%Overall Acceptance Rate53of66submissions,80%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader