Cyber Wargaming on SCADA Systems

被引:0
|
作者
Colbert, Edward [1 ]
Sullivan, Daniel [2 ]
Kott, Alexander [2 ]
机构
[1] US Army Res Lab, Comp Secur Res, Adelphi, MD 20783 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017) | 2017年
关键词
SCADA; ICS; wargaming; red team; blue team; cyber defense;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present general strategies for cyber wargaming of SCADA (Supervisory Control and Data Acquisition) systems that are used for cyber security research at the US Army Research Laboratory (ARL). Since SCADA and other Industrial Control Systems (ICSs) are operational systems, it is difficult or impossible to perform security experiments on actual systems. We use a hardware SCADA/ICS test bed to configure various live systems for the purpose of cyber wargaming and cyber-defense research and development experiments. The hardware testbed is part of the Army Cyber-research and Analytics Laboratory (ACAL) that is hosted at the Adelphi, Maryland site. We describe how table-top strategy sessions and live wargames on real SCADA systems can be conducted between red (attack) and blue (defense) teams. We also describe how the recoded actions of the wargame activity can be used to test and validate cyber-defense models. We describe a game theoretic SCADA security model that includes three distinct simultaneous games at the physical, cyber, and management layer.
引用
收藏
页码:96 / 104
页数:9
相关论文
共 50 条
  • [21] Cyber Threat Investigation of SCADA Modbus Activities
    Fachkha, Claude
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [22] TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM
    Banga, Aashima
    Gupta, Deep A.
    Bathla, Ruchika
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 343 - 347
  • [23] A Testbed for SCADA Cyber Security and Intrusion Detection
    Singh, Prateek
    Garg, Saurabh
    Kumar, Vinod
    Saquib, Zia
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [24] Ontology-based Detection of Cyber-Attacks to SCADA-Systems in critical Infrastructures
    Krauss, Daniel
    Thomalla, Christoph
    2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2016, : 70 - 73
  • [25] Towards Cyber-Security Protection of Critical Infrastructures by Generating Security Policy for SCADA Systems
    Feltus, Christophe
    Ouedraogo, Moussa
    Khadraoui, Djamel
    2014 1ST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM), 2014, : 1 - 8
  • [26] C-SEC (Cyber SCADA Evaluation Capability): Securing Critical Infrastructures
    Romero-Mariona, Jose
    Kline, Megan
    Miguel, John San
    2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2015, : 38 - 38
  • [27] Assessing and augmenting SCADA cyber security: A survey of techniques
    Nazir, Sajid
    Patel, Shushma
    Patel, Dilip
    COMPUTERS & SECURITY, 2017, 70 : 436 - 454
  • [28] Cyber security risk assessment method for SCADA system
    Hossain, Nazmul
    Das, Taposh
    Islam, Tariqul
    Alam Hossain, Md
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 499 - 510
  • [29] Cyber security risk assessment for SCADA and DCS networks
    Ralston, P. A. S.
    Graham, J. H.
    Hieb, J. L.
    ISA TRANSACTIONS, 2007, 46 (04) : 583 - 594
  • [30] Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 242 - 249