An isolated virtual cluster for SCADA network security research
نویسندگان
چکیده
Research aimed at securing the SCADA and ICS networks has taken off in the wake of Stuxnet. Unfortunately, it is difficult for researchers to fully capture the integration between cyber and physical components that is intrinsic to these systems. To enable researchers to perform network security experiments while taking into account the physical component of ICS networks, we propose the use of the ICS sandbox. The ICS sandbox uses the proven virtualized cluster approach to emulate SCADA networks with high fidelity. The virtualized cluster is interfaced with an electrical power flow simulator to integrate the physical component of an ICS network controlling electrical grid critical infrastructure without imposing scale constraints. Parts of the proposed sandbox were validated in a training session offered to industry professionals where a satisfaction survey indicated that hands-on session with the ICS sandbox provided significant training value to the participants that could not have been obtained in traditional training.
منابع مشابه
Security Through VLAN Segmentation: Isolating and Securing Critical Assets Without Loss of Usability
SCADA infrastructures, which traditionally were isolated from outside systems, have now become highly integrated via internal and external communication paths. These integrations increased efficiency greatly but introduced security vulnerabilities. This paper presents a solution for mitigating those security vulnerabilities by integrating VLAN and VPN technologies. VLAN segmentation provides vi...
متن کاملSecurity Strategies for SCADA Networks
SCADA systems have historically been isolated from other computing resources. However, the use of TCP/IP as a carrier protocol and the trend to interconnect SCADA systems with enterprise networks introduce serious security threats. This paper describes two strategies for securing SCADA networks, both of which have been implemented in a laboratory-scale Modbus network. The first utilizes a secur...
متن کاملUtilization of different Encryption Schemes for Securing SCADA Component Communication
This dissertation is a study on the comparison of different Encryption Schemes for Securing SCADA Component Communication. SCADA Communication is a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. Today, it is much more...
متن کاملConnecting SCADA Systems to Corporate IT Networks Using Security-Enhanced Linux
Substation networks have traditionally been isolated from corporate Information Technology (IT) networks. Hence, the security of substation networks has depended heavily upon limited access points and the use of point-to-point Supervisory Control and Data Acquisition (SCADA) specific protocols. With the introduction of Ethernet into substations, pressure to reduce expenses and provide Internet ...
متن کاملProviding SCADA Network Data Sets for Intrusion Detection Research
High profile attacks such as Stuxnet and the cyber attack on the Ukrainian power grid have increased research in Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) network security. However, due to the sensitive nature of these networks, there is little publicly available data for researchers to evaluate the effectiveness of the proposed solution. The lack of r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013