Cyber Wargaming on SCADA Systems

被引:0
|
作者
Colbert, Edward [1 ]
Sullivan, Daniel [2 ]
Kott, Alexander [2 ]
机构
[1] US Army Res Lab, Comp Secur Res, Adelphi, MD 20783 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017) | 2017年
关键词
SCADA; ICS; wargaming; red team; blue team; cyber defense;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present general strategies for cyber wargaming of SCADA (Supervisory Control and Data Acquisition) systems that are used for cyber security research at the US Army Research Laboratory (ARL). Since SCADA and other Industrial Control Systems (ICSs) are operational systems, it is difficult or impossible to perform security experiments on actual systems. We use a hardware SCADA/ICS test bed to configure various live systems for the purpose of cyber wargaming and cyber-defense research and development experiments. The hardware testbed is part of the Army Cyber-research and Analytics Laboratory (ACAL) that is hosted at the Adelphi, Maryland site. We describe how table-top strategy sessions and live wargames on real SCADA systems can be conducted between red (attack) and blue (defense) teams. We also describe how the recoded actions of the wargame activity can be used to test and validate cyber-defense models. We describe a game theoretic SCADA security model that includes three distinct simultaneous games at the physical, cyber, and management layer.
引用
收藏
页码:96 / 104
页数:9
相关论文
共 50 条
  • [1] Analysis on Cyber Threats to SCADA systems
    Kang, Dong-Joo
    Lee, Jong-Joo
    Kim, Seog-Joo
    Park, Jong-Hyuk
    T& D ASIA: 2009 TRANSMISSION & DISTRIBUTION CONFERENCE & EXPOSITION: ASIA AND PACIFIC, 2009, : 14 - +
  • [2] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [3] Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)
    Sogut, Esra
    Erdem, O. Ayhan
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2020, 23 (02): : 557 - 566
  • [4] Cyber Threats and Defence Approaches in SCADA systems
    Kang, Dong-Ho
    Kim, Byoung-Koo
    Na, Jung-Chan
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 324 - 327
  • [5] The game-theoretic model and experimental investigation of cyber wargaming
    Colbert, Edward J. M.
    Kott, Alexander
    Knachel, Lawrence P.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2020, 17 (01): : 21 - 38
  • [6] A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure
    Eden, Peter
    Blyth, Andrew
    Burnap, Pete
    Cherdantseva, Yulia
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 27 - 39
  • [7] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [8] Strategic Foresight and Resilience Through Cyber-Wargaming
    Ormrod, David
    Scott, Keith
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 319 - 327
  • [9] On SCADA PLC and Fieldbus Cyber-Security
    Davidson, Cordell
    Andel, Todd
    Yampolskiy, Mark
    McDonald, Todd
    Glisson, Brad
    Thomas, Tom
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 140 - 148
  • [10] Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
    Zhang, Taimin
    Wang, Yinan
    Liang, Xiao
    Zhuang, Zhou
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6847 - 6852