35
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this work, we consider challenges relating to security for Industrial Control Systems (ICS) in the context of ICS security education and research targeted both to academia and industry. We propose to address those challenges through gamified attack training and countermeasure evaluation. We tested our proposed ICS security gamification idea in the context of the (to the best of our knowledge) first Capture-The-Flag (CTF) event targeted to ICS security called SWaT Security Showdown (S3). Six teams acted as attackers in a security competition leveraging an ICS testbed, with several academic defense systems attempting to detect the ongoing attacks. The event was conducted in two phases. The online phase (a jeopardy-style CTF) served as a training session. The live phase was structured as an attack-defense CTF. We acted as judges and we assigned points to the attacker teams according to a scoring system that we developed internally based on multiple factors, including realistic attacker models. We conclude the paper with an evaluation and discussion of the S3, including statistics derived from the data collected in each phase of S3.

          Related collections

          Most cited references10

          • Record: found
          • Abstract: not found
          • Article: not found

          Bro: a system for detecting network intruders in real-time

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Security and privacy challenges in industrial internet of things

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Attacks against process control systems

                Bookmark

                Author and article information

                Journal
                2017-02-10
                Article
                1702.03067
                a2987467-b3b4-43a2-81ae-c2fcca104b84

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article