[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2179298.2179327acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

A testbed for SCADA control system cybersecurity research and pedagogy

Published: 12 October 2011 Publication History
First page of PDF

Supplementary Material

Supplemental material. (a27-morris_slide.pdf)

References

[1]
Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program. Idaho National Laboratory. Idaho Falls, Idaho 83415. November 2008.
[2]
H. Christiansson and E. Luiijf. Creating a European SCADA Security Testbed. In IFIP International Federation for Information Processing, Volume 253, Critical Infrastructure Protection, Boston Springer, pp.237-247
[3]
C. Davis, J. Tate, H. Okhravi, C. Grier, T. Overbye, and D. Nicol, "SCADA Cyber Security Testbed Development," in Power Symposium, 2006. NAPS 2006. 38th North American, pp. 483-488, 2006.
[4]
C. Queiroz, A. Mahmood, Jiankun Hu, Z. Tari, and Xinghuo Yu, "Building a SCADA Security Testbed," in Network and System Security, 2009. NSS '09. Third International Conference on, pp. 357-364, 2009.
[5]
I. Fovino, M. Masera, L. Guidi, and G. Carpi, "An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants," in 2010 Human System Interactions (HSI), pp. 679-686, 2010.
[6]
A. Hahn et al., "Development of the PowerCyber SCADA security testbed," in Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10, p. 1, 2010.
[7]
Industrial Instrumentation Process Lab. http://www.bcit.ca/appliedresearch/tc/facilities/industrial.shtml
[8]
T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu, R. Reddi, A control system testbed to validate critical infrastructure protection concepts, International Journal of Critical Infrastructure Protection (IJCIP), Volume 4, Issue 2, August 2011, Pages 88-103.
[9]
R. McGrew and R. Vaughn. 2009. Discovering vulnerabilities in control system human-machine interface software. Journal of Systems and Software. 82, 4 (April 2009), 583-589.
[10]
MU Dynamics, Inc. http://www.mudynamics.com/

Cited By

View all
  • (2025)Smart Grids Transmission Network Testbed: Design, Deployment, and BeyondIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.35173406(51-76)Online publication date: 2025
  • (2024)Hybridization of Learning Techniques and Quantum Mechanism for IIoT Security: Applications, Challenges, and ProspectsElectronics10.3390/electronics1321415313:21(4153)Online publication date: 23-Oct-2024
  • (2023)SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issuesComputers & Security10.1016/j.cose.2022.103028125(103028)Online publication date: Feb-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '11: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
October 2011
18 pages
ISBN:9781450309455
DOI:10.1145/2179298
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Eurosis: Eurosis
  • Oak Ridge National Laboratory
  • University of Tennessee: University of Tennessee

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

CSIIRW '11
Sponsor:
  • Eurosis
  • University of Tennessee

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)54
  • Downloads (Last 6 weeks)6
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Smart Grids Transmission Network Testbed: Design, Deployment, and BeyondIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.35173406(51-76)Online publication date: 2025
  • (2024)Hybridization of Learning Techniques and Quantum Mechanism for IIoT Security: Applications, Challenges, and ProspectsElectronics10.3390/electronics1321415313:21(4153)Online publication date: 23-Oct-2024
  • (2023)SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issuesComputers & Security10.1016/j.cose.2022.103028125(103028)Online publication date: Feb-2023
  • (2023)A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learningDiscover Data10.1007/s44248-023-00003-x1:1Online publication date: 6-Apr-2023
  • (2023)A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learningCluster Computing10.1007/s10586-023-04028-426:5(2947-2973)Online publication date: 4-Jun-2023
  • (2023)A personalized learning theory-based cyber-security training exerciseInternational Journal of Information Security10.1007/s10207-023-00704-z22:6(1531-1546)Online publication date: 2-Jun-2023
  • (2022)A Primer on the Factories of the FutureSensors10.3390/s2215583422:15(5834)Online publication date: 4-Aug-2022
  • (2022)Design of Platforms for Experimentation in Industrial CybersecurityApplied Sciences10.3390/app1213652012:13(6520)Online publication date: 27-Jun-2022
  • (2021)A Survey on Industrial Control System Testbeds and Datasets for Security ResearchIEEE Communications Surveys & Tutorials10.1109/COMST.2021.309436023:4(2248-2294)Online publication date: Dec-2022
  • (2021)Architecture and security of SCADA systemsInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2021.10043334:COnline publication date: 1-Sep-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media