2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2013
DOI: 10.1109/iih-msp.2013.111
|View full text |Cite
|
Sign up to set email alerts
|

The Design of ICS Testbed Based on Emulation, Physical, and Simulation (EPS-ICS Testbed)

Abstract: This paper begins with a discussion of the role and value of industrial control system (ICS) testbed which apply a universal, controllable, realistic, and repeatable experimental platform to SCADA control system cybersecurity research. According to ICS layered architecture, ICS testbed based on emulation, physical, and simulation (EPS-ICS Testbed) is designed and implemented. EPS-ICS Testbed enables experimenters to create experiments with varying levels of fidelity and is widely used in vulnerability digging,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…EPS-ICS [67] is a framework to implement a hybrid testbed, principally developed by the Technical Assessment Research Lab (CNITSEC) in Beijing, China. The testbed implements a multi-level design approach where Level 3, the corporate network, and Level 2, the supervisory control LAN, are emulated.…”
Section: F Hybridmentioning
confidence: 99%
“…EPS-ICS [67] is a framework to implement a hybrid testbed, principally developed by the Technical Assessment Research Lab (CNITSEC) in Beijing, China. The testbed implements a multi-level design approach where Level 3, the corporate network, and Level 2, the supervisory control LAN, are emulated.…”
Section: F Hybridmentioning
confidence: 99%
“…Thus, the security of SCADA system is extremely important, as well as of national concern (Coletta and Armando, 2016;Shukla, 2016). In fact, the recent cyber-attacks on SCADA systems (Li et al, 2015;Gao et al, 2013) have drawn attention to the significance of vulnerability assessments and penetration testing exercises in SCADA systems, especially to detect potential vulnerabilities, security loopholes and threat agents. Figure 1 illustrates the SCADA network architecture and several components.…”
Section: Overview Of Scada Systemsmentioning
confidence: 99%
“…ICS testbeds generally consist of two main components, namely the physical process and the field devices such as PLC, HMI, RTU, etc. Depending on implementation methods, ICS testbeds are classified into three main categories as follows [1]: I) simulation testbed in which both components of the ICS are solely based on computer simulation [2], II) physical testbed where real physical parts are used in both components [3], and III) hybrid testbed in which a combination of simulation and physical testbed is considered where some components of the testbed such as the physical process is simulated and the rest are based on actual physical parts [4], [5].…”
Section: Introductionmentioning
confidence: 99%
“…Denial of Service,2 False Data Injection,3 Intrusion Detection System,4 Logistic Regression,5 Naïve Bayes ,6 Not Available,7 Auto-Associative Kernel Regression, 8 k-Nearest-Neighbors,9 Decision Tree,10 Random Forest,11 Man In The Middle,12 Firmware Reverse Engineering,13 Protocol Weakness Based,14 Principal Component Analysis ,15 One-Class Support Vector Machines ,16 Local Outlier Factor ,17 Isolation Forest,…”
mentioning
confidence: 99%