Cyber Wargaming on SCADA Systems

被引:0
|
作者
Colbert, Edward [1 ]
Sullivan, Daniel [2 ]
Kott, Alexander [2 ]
机构
[1] US Army Res Lab, Comp Secur Res, Adelphi, MD 20783 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017) | 2017年
关键词
SCADA; ICS; wargaming; red team; blue team; cyber defense;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present general strategies for cyber wargaming of SCADA (Supervisory Control and Data Acquisition) systems that are used for cyber security research at the US Army Research Laboratory (ARL). Since SCADA and other Industrial Control Systems (ICSs) are operational systems, it is difficult or impossible to perform security experiments on actual systems. We use a hardware SCADA/ICS test bed to configure various live systems for the purpose of cyber wargaming and cyber-defense research and development experiments. The hardware testbed is part of the Army Cyber-research and Analytics Laboratory (ACAL) that is hosted at the Adelphi, Maryland site. We describe how table-top strategy sessions and live wargames on real SCADA systems can be conducted between red (attack) and blue (defense) teams. We also describe how the recoded actions of the wargame activity can be used to test and validate cyber-defense models. We describe a game theoretic SCADA security model that includes three distinct simultaneous games at the physical, cyber, and management layer.
引用
收藏
页码:96 / 104
页数:9
相关论文
共 50 条
  • [31] Research on Systems Modeling and Analysis Method Based on Wargaming
    Li, Xiaolei
    Zhao, Jie
    Li, Huan
    Cheng, Mingang
    Fan, Zhongqi
    2013 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2013, : 242 - 247
  • [32] Stealthy Deception Attacks Against SCADA Systems
    Kleinmann, Amit
    Amichay, Ori
    Wool, Avishai
    Tenenbaum, David
    Bar, Ofer
    Lev, Leonid
    COMPUTER SECURITY, 2017, 2018, 10683 : 93 - 109
  • [33] Detecting the Network Attack Vectors on SCADA Systems
    Ramachandruni, Ram Sandesh
    Poornachandran, Prabaharan
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 707 - 712
  • [34] A SCADA Testbed for Investigating Cyber Security Vulnerabilities in Critical Infrastructures
    Tesfahun, Abebe
    Bhaskari, D. Lalitha
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (01) : 54 - 62
  • [35] Cyber Security Risk Management in the SCADA Critical Infrastructure Environment
    Henrie, Morgan
    ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 38 - 45
  • [36] Control systems/SCADA forensics, what's the difference?
    van der Knijff, R. M.
    DIGITAL INVESTIGATION, 2014, 11 (03) : 160 - 174
  • [37] The Application of AlphaZero to Wargaming
    Moy, Glennn
    Shekh, Slava
    AI 2019: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, 11919 : 3 - 14
  • [38] Enhancing Suricata Intrusion Detection System for Cyber Security in SCADA Networks
    Wong, Kevin
    Dillabaugh, Craig
    Seddigh, Nabil
    Nandy, Biswajit
    2017 IEEE 30TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2017,
  • [39] A proposed cyber-terrorism SCADA risk framework concept for Australia
    Beggs, Christopher
    Warren, Matt
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 17 - +
  • [40] SCADA systems in the industrial automation
    Perez-Lopez, Esteban
    TECNOLOGIA EN MARCHA, 2015, 28 (04): : 3 - 14