Blog
About

157
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      An isolated virtual cluster for SCADA network security research

      , ,

      1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) (ICSCSR)

      ICS & SCADA Cyber Security Research 2013

      16-17 September 2013

      Experimental research, Security Training, SCADA security, power grid security

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Research aimed at securing the SCADA and ICS networks has taken off in the wake of Stuxnet. Unfortunately, it is difficult for researchers to fully capture the integration between cyber and physical components that is intrinsic to these systems. To enable researchers to perform network security experiments while taking into account the physical component of ICS networks, we propose the use of the ICS sandbox. The ICS sandbox uses the proven virtualized cluster approach to emulate SCADA networks with high fidelity. The virtualized cluster is interfaced with an electrical power flow simulator to integrate the physical component of an ICS network controlling electrical grid critical infrastructure without imposing scale constraints. Parts of the proposed sandbox were validated in a training session offered to industry professionals where a satisfaction survey indicated that hands-on session with the ICS sandbox provided significant training value to the participants that could not have been obtained in traditional training.

          Related collections

          Most cited references 4

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          SCADA Cyber Security Testbed Development

           C. Davis,  J Tate,  H. Okhravi (2006)
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Staying in control: Cybersecurity and the modern electric grid

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2013
                September 2013
                : 88-96
                Affiliations
                École Polytechnique de Montréal

                2500, Chemin de Polytechnique

                Montreal, Qc, CA

                H3T1J4
                Royal Military College of Canada

                13 General Crerar Cres

                Kingston, ON, CA

                K7K 7B4
                Article
                10.14236/ewic/ICSCSR2013.10
                © Antoine Lemay et al. Published by BCS Learning and Development Ltd. 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Leicester, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013)
                ICSCSR
                1
                Leicester, UK
                16-17 September 2013
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research 2013
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article