[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3626205.3659148acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open access

Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise

Published: 01 July 2024 Publication History

Abstract

Industrial Control Systems (ICS) are integral to critical infrastructure, necessitating advanced cybersecurity training. Addressing the urgent need for specialized cybersecurity training, this paper details the UK's first Capture-The-Flag (CTF) event tailored to ICS. This event, held in 2023, was designed in a jeopardy-style format, featuring a comprehensive suite of challenges that mirrored real-world industrial vulnerabilities. It targeted a diverse audience, encompassing participants from both industrial and academic spheres, and emphasized the need for practical, hands-on experience in ICS cybersecurity. This paper describes the design considerations, experience, and recommendations to designing similar CTF events. The event highlighted the benefits of incorporating pre-event training to better acquaint participants with terminologies and protocols, specific to Critical National Infrastructure (CNI) and Operational Technology (OT). Providing insights into the event's design, execution, and the unique learning opportunities it presented, this paper contributes valuable perspectives for future cybersecurity education and training initiatives, particularly in enhancing practical skills in ICS security.

References

[1]
2018 ICS Cyber Security Conference. ICS CTF Challenge. https://ics2022.sched.com/event/1Ba28/capture-the-flag-ctf-opens, 2018.
[2]
Sridhar Adepu and Aditya Mathur. Assessing the effectiveness of attack detection at a hackfest on industrial control systems. IEEE Transactions on Sustainable Computing, 6(2):231--244, 2021.
[3]
Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martin Ochoa, and Nils Ole Tippenhauer. Gamifying ics security training and research: Design, implementation, and results of s3. In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS '17, page 93--102, New York, NY, USA, 2017. Association for Computing Machinery.
[4]
Alexandrine Torrents Arnaud Soullié. Pentesting Industrial Control Systems 101: Capture the Flag! https://infocondb.org/con/def-con/def-con-30/pentesting-industrial-control-systems-101-capture-the-flag, 2022.
[5]
Def Con. Red Alert ICS CTF. http://icssecurity.net/ctf, 2017.
[6]
Israel Barbosa de Brito and Rafael T. de Sousa. Development of an open-source testbed based on the modbus protocol for cybersecurity analysis of nuclear power plants. Applied Sciences, 12(15), 2022.
[7]
Barbara E. Endicott-Popovsky and Viatcheslav M. Popovsky. Application of pedagogical fundamentals for the holistic development of cybersecurity professionals. ACM Inroads, 5(1):57--68, mar 2014.
[8]
Simon N. Foley, Fabien Autrel, Edwin Bourget, Thomas Cledel, Stephane Grunenwald, Jose Rubio Hernan, Alexandre Kabil, Raphael Larsen, Vivien M. Rooney, and Kirsten Vanhulst. Science hackathons for cyberphysical system security research: Putting cps testbed platforms to good use. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC '18, page 102--107, New York, NY, USA, 2018. Association for Computing Machinery.
[9]
iTrust. SUTD Security Showdown S317 Reports. https://itrust.sutd.edu.sg/research/reports/, 2017. Accessed: 2023-09-17.
[10]
iTrust. The Critical Infrastructure Security Showdown 2022. https://itrust.sutd.edu.sg/ciss-2022/, 2022.
[11]
iTrust. The Critical Infrastructure Security Showdown 2023. https://itrust.sutd.edu.sg/ciss-2023/, 2022.
[12]
Markus Mueller Jackson Evans-Davies. Building the SANS ICS Summit Capture the Flag (CTF) Competition, 2022.
[13]
William Jardine. Offensive ICS Exploitation: A Description of an ICS CTF. https://labs.withsecure.com/publications/offensive-ics-exploitation-a-technical-description, 2017.
[14]
Ge Jin, Manghui Tu, Tae-Hoon Kim, Justin Heffron, and Jonathan White. Evaluation of game-based learning in cybersecurity education for high school students. Journal of Education and Learning (EduLearn), 12:150, 02 2018.
[15]
Mika Karjalainen, Tero Kokkonen, and Samir Puuska. Pedagogical aspects of cyber security exercises. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 103--108, 2019.
[16]
Kaspersky ICS CERT. Capture the Flag in ICS. https://ics.kaspersky.com/media/KL-CTF-for-ICS.pdf, 2018. Accessed: 2023-10-15.
[17]
Menelaos Katsantonis, Panayotis Fouliras, and Ioannis Mavridis. Conceptual analysis of cyber security education based on live competitions. In 2017 IEEE Global Engineering Education Conference (EDUCON), pages 771--779, 2017.
[18]
Matthew E. Luallen and Jean-Philippe Labruyere. Developing a critical infrastructure and control systems cybersecurity curriculum. In 2013 46th Hawaii International Conference on System Sciences, pages 1782--1791, 2013.
[19]
Fred B. Schneider. Cybersecurity education in universities. IEEE Security & Privacy, 11(4):3--4, 2013.

Cited By

View all
  • (2024)"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag CompetitionsProceedings of the Sixth Workshop on CPS&IoT Security and Privacy10.1145/3690134.3694818(27-40)Online publication date: 19-Nov-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CPSS '24: Proceedings of the 10th ACM Cyber-Physical System Security Workshop
July 2024
116 pages
ISBN:9798400704208
DOI:10.1145/3626205
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2024

Check for updates

Author Tags

  1. CTF
  2. capture the flag
  3. critical infrastructure protection
  4. cybersecurity
  5. industrial control systems
  6. security training

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • PETRAS National Centre of Excellence on Cyber Security of IoT

Conference

ASIA CCS '24
Sponsor:

Acceptance Rates

CPSS '24 Paper Acceptance Rate 10 of 22 submissions, 45%;
Overall Acceptance Rate 43 of 135 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)369
  • Downloads (Last 6 weeks)64
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag CompetitionsProceedings of the Sixth Workshop on CPS&IoT Security and Privacy10.1145/3690134.3694818(27-40)Online publication date: 19-Nov-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media