2019
DOI: 10.1007/978-3-030-12786-2_3
|View full text |Cite
|
Sign up to set email alerts
|

EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 33 publications
0
24
0
Order By: Relevance
“…According to [30], the communication layout of EPIC is shown in Figure 2, which is composed of a SCADA workstation, historian, programmable logic controller (PLC), intelligent electrical devices (IEDs), access points (APs), and switches (SWs), and redundancy in the ring network is achieved using high availability seamless redundancy (HSR) and media redundancy protocol (MRP).…”
Section: Cskg Structure Definitionmentioning
confidence: 99%
“…According to [30], the communication layout of EPIC is shown in Figure 2, which is composed of a SCADA workstation, historian, programmable logic controller (PLC), intelligent electrical devices (IEDs), access points (APs), and switches (SWs), and redundancy in the ring network is achieved using high availability seamless redundancy (HSR) and media redundancy protocol (MRP).…”
Section: Cskg Structure Definitionmentioning
confidence: 99%
“…The robust satisfaction value can be used to measure the distance of the current trace to the error state. The error state could be an unsafe state that may cause a physical safety problem, such as aircraft collision, water overflowing in a water treatment facility [25]. Or the error state is a state that could avoid the attack detection mechanisms [26].…”
Section: B Threat Modelmentioning
confidence: 99%
“…The Center for Cybersecurity Research, iTrust [20], also developed several datasets for different ICS. The most important datasets they developed are: Secure Water Treatment (SwaT) [21], Water Distribution (WADI) [22] and Electric Power and Intelligent Control (EPIC) [23]. The three datasets contain normal and malicious samples from false injection attacks.…”
Section: A Datasetsmentioning
confidence: 99%