Cyber Wargaming on SCADA Systems

被引:0
|
作者
Colbert, Edward [1 ]
Sullivan, Daniel [2 ]
Kott, Alexander [2 ]
机构
[1] US Army Res Lab, Comp Secur Res, Adelphi, MD 20783 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017) | 2017年
关键词
SCADA; ICS; wargaming; red team; blue team; cyber defense;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present general strategies for cyber wargaming of SCADA (Supervisory Control and Data Acquisition) systems that are used for cyber security research at the US Army Research Laboratory (ARL). Since SCADA and other Industrial Control Systems (ICSs) are operational systems, it is difficult or impossible to perform security experiments on actual systems. We use a hardware SCADA/ICS test bed to configure various live systems for the purpose of cyber wargaming and cyber-defense research and development experiments. The hardware testbed is part of the Army Cyber-research and Analytics Laboratory (ACAL) that is hosted at the Adelphi, Maryland site. We describe how table-top strategy sessions and live wargames on real SCADA systems can be conducted between red (attack) and blue (defense) teams. We also describe how the recoded actions of the wargame activity can be used to test and validate cyber-defense models. We describe a game theoretic SCADA security model that includes three distinct simultaneous games at the physical, cyber, and management layer.
引用
收藏
页码:96 / 104
页数:9
相关论文
共 50 条
  • [41] Wireless Vulnerability of SCADA Systems
    Francia, Guillermo, III
    Thornton, David
    Brookshire, Thomas
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [42] SCADA Design in Automation Systems
    Ponsa, Pere
    Vilanova, Ramon
    Perez, Alex
    Andonovski, Bojan
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 695 - 700
  • [43] The Methodological Machinery of Wargaming: A Path toward Discovering Wargaming's Epistemological Foundations
    Banks, David E.
    INTERNATIONAL STUDIES REVIEW, 2023, 26 (01)
  • [44] Attacking and Defending DNP3 ICS/SCADA Systems
    Kelli, Vasiliki
    Radoglou-Grammatikis, Panagiotis
    Sesis, Achilleas
    Lagkas, Thomas
    Fountoukidis, Eleftherios
    Kafetzakis, Emmanouil
    Giannoulakis, Ioannis
    Sarigiannidis, Panagiotis
    18TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2022), 2022, : 183 - 190
  • [45] The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems
    Balla, Asaad
    Habaebi, Mohamed Hadi
    Elsheikh, Elfatih A. A.
    Islam, Md. Rafiqul
    Suliman, F. M.
    SENSORS, 2023, 23 (02)
  • [46] Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
    Awad, Rima Asmar
    Beztchi, Saeed
    Smith, Jared M.
    Lyles, Bryan
    Prowell, Stacy
    4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018), 2018, : 1 - 8
  • [47] The Political Economy of Wargaming
    Wood, Garrett R.
    DEFENCE AND PEACE ECONOMICS, 2024, 35 (02) : 160 - 173
  • [48] Stuxnet Vulnerabilities Analysis of SCADA Systems
    Wang, Yong
    Gu, Dawu
    Peng, DaoGang
    Chen, Shuai
    Yang, Heng
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 640 - +
  • [49] Object attachment of devices in SCADA systems
    Kurnasov E.V.
    Russian Engineering Research, 2013, 33 (03) : 152 - 155
  • [50] PatchRank: Ordering updates for SCADA systems
    Yadav, Geeta
    Paul, Kolin
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 110 - 117