Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3
نویسندگان
چکیده
In this work, we consider challenges relating to security for Industrial Control Systems (ICS) in the context of ICS security education and research targeted both to academia and industry. We propose to address those challenges through gamified attack training and countermeasure evaluation. We tested our proposed ICS security gamification idea in the context of the (to the best of our knowledge) first Capture-The-Flag (CTF) event targeted to ICS security called SWaT Security Showdown (S3). Six teams acted as attackers in a security competition leveraging an ICS testbed, with several academic defense systems attempting to detect the ongoing attacks. The event was conducted in two phases. The online phase (a jeopardy-style CTF) served as a training session. The live phase was structured as an attack-defense CTF. We acted as judges and we assigned points to the attacker teams according to a scoring system that we developed internally based on multiple factors, including realistic attacker models. We conclude the paper with an evaluation and discussion of the S3, including statistics derived from the data collected in each phase of S3.
منابع مشابه
طراحی و کاربست نرمافزار بازیوارسازیشده وبسایت کتابخانهای و بررسی تأثیر کاربرد آن بر مؤلفههای خودتعیینگری کاربران کتابخانه
Nowadays, libraries face the “engagement crisis” according to the development of information and communication technologies as well as the presence of electronic information providers in digital environments. Accordingly, one of the most new presence concepts in this field is “gamifying the library services”. Gamification has been defined as a process of enhancing services with motivational aff...
متن کاملA Rising Tide: Design Exploits in Industrial Control Systems
Security is an emergent property. It is the outcome of an interaction between many sub-components and processes. One of the biggest problems of ICS security today is that systems undergo security assessments without recognizing the environment in which they are used. This has led to a situation where many systems have undergone cyber security assessments without addressing the ICS component, le...
متن کاملTitle Design, implementation and evaluation of e-learning based on Paradigm 3 and Paradigm 4 of Kashman's theory and their comparison (in terms of academic achievement, motivation and satisfaction of medical education students).
The purpose of this study was to design, implement and evaluate e-learning based on the third and fourth Paradigms of Kashman's theory. The research method was quasi-experimental and mixed (qualitative and quantitative). The statistical population of the undergraduate students of Shahid Beheshti Medical Education Faculty of Tehran was selected by sampling method available to students of medical...
متن کاملNetwork security monitoring and anomaly detection in industrial control system networks
Industrial control system (ICS) networks used to be isolated environments, typically separated by physical air gaps from the wider area networks. This situation has been changing and the change has brought with it new cybersecurity issues. The process has also exacerbated existing problems that were previously less exposed due to the systems’ relative isolation. This process of increasing conne...
متن کاملInstructional Design, Implementation, and Evaluation of an E-Learning System, an Experience in Tehran University of Medical Sciences
Introduction: Designing e-learning systems based on the principles and prerequisites of teaching and learning theories requires a comprehensive and systematic approach to instructional design procedure. An experience of instructional design, implementation and evaluation of an e-learning system is represented in this study. Methods: In the present action research study, five steps of systemati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1702.03067 شماره
صفحات -
تاریخ انتشار 2017