A cyber-physical experimentation environment for the security analysis of networked industrial control systems

被引:52
作者
Genge, Bela [1 ]
Siaterlis, Christos [1 ]
Fovino, Igor Nai [1 ]
Masera, Marcelo [1 ]
机构
[1] Joint Res Ctr, Inst Protect & Secur Citizen, I-21027 Ispra, Italy
关键词
Malware - Cybersecurity - Networked control systems;
D O I
10.1016/j.compeleceng.2012.06.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1146 / 1161
页数:16
相关论文
共 27 条
[1]  
[Anonymous], 2008, SAND20085954 SAND NA
[2]  
[Anonymous], IEEE COMMUN SURV TUT
[3]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[4]  
[Anonymous], 2010, SYMANTEC SECURITY RE
[5]  
[Anonymous], 2010, 1 WORKSH SEC CONTR S
[6]  
Bell R., 1987, TFRT3192 LUNDT I TEC
[7]   An autonomous control system for boiler-turbine units [J].
BenAbdennour, A ;
Lee, KY .
IEEE TRANSACTIONS ON ENERGY CONVERSION, 1996, 11 (02) :401-406
[8]  
Chertov R, 2009, ACM T MODEL COMPUT S, V19, P29
[9]   Fidelity of Network Simulation and Emulation: A Case Study of TCP-Targeted Denial of Service Attacks [J].
Chertov, Roman ;
Fahmy, Sonia ;
Shroff, Ness B. .
ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION, 2008, 19 (01)
[10]   Four-mobile-beacon assisted localization in three-dimensional wireless sensor networks [J].
Cui, Huanqing ;
Wang, Yinglong .
COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) :652-661