ABSTRACT
In CPS security research, a test environment and datasets that reflect the real world are crucial. We have constructed the HAI testbed, which provides a function to automatically control all sensors and actuators. Moreover, we have published a control system dataset named HAI dataset, obtained from the testbed according to a premeditated physical attack scenario. Although the HAI dataset sufficiently simulates the behavior of the field devices, the dataset does not contain the phase of cyberattack propagation through the network. In this study, we expanded the HAI testbed to reproduce and analyze network attacks and verified an expanded HAI testbed.
- Jongwon Choi, HyungKwan Kim, Seungoh Choi, Jeong-Han Yun, Byung-Gil Min, and HyoungChun Kim. 2019. Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Auckland, New Zealand) (Asia CCS '19). Association for Computing Machinery, New York, NY, USA, 682--684. https://doi.org/10.1145/3321705.3331007Google ScholarDigital Library
- Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2017. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Critical Information Infrastructures Security, Grigore Havarneanu, Roberto Setola, Hypatia Nassopoulos, and Stephen Wolthusen (Eds.). Springer International Publishing, Cham, 88--99.Google Scholar
- A. P. Mathur and N. O. Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater). 31--36. https://doi.org/10.1109/CySWater.2016.7469060Google ScholarCross Ref
- Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, and HyoungChun Kim. 2019. Implementation of Programmable CPS Testbed for Anomaly Detection. In 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19). USENIX Association, Santa Clara, CA. https://www.usenix.org/conference/cset19/presentation/shinGoogle Scholar
Index Terms
- POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis
Recommendations
Building a SCADA Security Testbed
NSS '09: Proceedings of the 2009 Third International Conference on Network and System SecuritySCADA (Supervisory Control and Data Acquisition) systems control and monitor industrial and critical infrastructure functions, such as the electricity, gas, water, waste, railway and traffic. Recent attacks on SCADA systems highlight the need of a SCADA ...
Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course
ACMSE '13: Proceedings of the 51st ACM Southeast ConferenceCyber security is an area where much curriculum development is taking place, and it is important that such efforts be shared. In this work we describe three lab exercises developed at the United States Naval Academy for use in our fundamentals of cyber-...
Investigation Approach for Network Attack Intention Recognition
Sensitive information has critical risks when transmitted through computer networks. Existing protection systems still have limitations with treating network information with sufficient confidentiality, integrity, and availability. The rapid development ...
Comments