2012
DOI: 10.1016/j.compeleceng.2012.06.015
|View full text |Cite
|
Sign up to set email alerts
|

A cyber-physical experimentation environment for the security analysis of networked industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 68 publications
(25 citation statements)
references
References 18 publications
0
25
0
Order By: Relevance
“…Genge et al [3] have proposed a framework based on Emulab and Simulink to recreate cyber components and physical processes when conducting security analyses of industrial control networks. The underlying architecture strikes a balance between experiments that consist entirely of physical components as in [2] and experiments that are based entirely on simulated components.…”
Section: Related Workmentioning
confidence: 99%
“…Genge et al [3] have proposed a framework based on Emulab and Simulink to recreate cyber components and physical processes when conducting security analyses of industrial control networks. The underlying architecture strikes a balance between experiments that consist entirely of physical components as in [2] and experiments that are based entirely on simulated components.…”
Section: Related Workmentioning
confidence: 99%
“…The previously developed framework [7] follows a hybrid approach, where the Emulab-based testbed recreates the control and process network of NICS, including PLCs and SCADA servers, and a software simulation reproduces the physical processes. The architecture, as shown in Figure 1, clearly distinguishes 3 layers: the cyber layer, the physical layer and a link layer in between.…”
Section: Framework Architecturementioning
confidence: 99%
“…The attack scenario has been implemented with the help of our previously developed framework [7] that uses simulation for the physical components and an emulation testbed based on Emulab [8,9] to recreate the cyber part of NICS, e.g., SCADA servers, corporate network, etc. In the implemented scenario we have used the model of a Boiling Water Power Plant developed by Bell and Åström [10].…”
Section: Introductionmentioning
confidence: 99%
“…Especially, the Industry 4.0 revolution, defined by Germany, further emphasizes the essential role of networking technology in the networked control system [2]. However, the application of networking technology has broken the original closure of industrial control systems, such as SCADA (supervisory control and data acquisition), DCS (distributed control system) and PLC (programmable logic controller), and the accompanying security issues are increasing exposed [3][4][5]. The research reports of the USA ICS-CERT (industrial control systems cyber emergency response team) point out in recent years the number of security incidents in industrial control systems show a sensible rise, and only in 2014 the attack number against critical infrastructures reaches 245 [6].…”
Section: Introductionmentioning
confidence: 99%