2017
DOI: 10.17485/ijst/2017/v10i26/116775
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of SCADA Testbed Implementation Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…Since SCADA systems are nowadays becoming an essential part of electric power systems, such as microgrids, it is essential to consider an accurate testbed development. Five main approaches for testbed developments, shown in Table 1, can be considered [10].…”
Section: Introductionmentioning
confidence: 99%
“…Since SCADA systems are nowadays becoming an essential part of electric power systems, such as microgrids, it is essential to consider an accurate testbed development. Five main approaches for testbed developments, shown in Table 1, can be considered [10].…”
Section: Introductionmentioning
confidence: 99%
“…We then added survey articles, which we got through references from articles on testbeds and from unstructured searches via google scholar. Thanks to that, we found another three relevant articles [26][27][28].…”
Section: Related Workmentioning
confidence: 96%
“…Qassim et al [27] deal mainly with the description of testbed approaches (such as physical, simulated, virtual, hybrid). The article also focused on essential parameters of testbeds: fidelity, repeatability, accuracy, safety, cost-effectiveness, reliability, and scalability.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the benefits of such strategies, such as remote maintenance, simpler adjustment of machines and a constant flow of information, the number of attacks against ICS networks has significantly increased, as reported by Kaspersky in its ICS-CERT annual report [7]. For these reasons, different types of testbeds are needed to measure the effects of cyber and physical attacks on industrial processes and to assess security countermeasures, as witnessed by the results reported in recent scientific literature [8], [9], [10]. Among the most widespread solutions to secure CPSs, we can mention Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) [13], for network monitoring (NIDS) and host monitoring (HIDS).…”
Section: Introductionmentioning
confidence: 99%