SCADASim-A Framework for Building SCADA Simulations

被引:96
作者
Queiroz, Carlos [1 ]
Mahmood, Abdun [1 ]
Tari, Zahir [1 ]
机构
[1] RMIT Univ, Sch Comp Sci & Informat Technol, Melbourne, Vic, Australia
基金
澳大利亚研究理事会;
关键词
Computer security; computer simulation; SCADA systems; smart grids; ATTACKS;
D O I
10.1109/TSG.2011.2162432
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway, and traffic. Recent attacks on SCADA systems highlight the need of stronger SCADA security. It is important to analyze the security risks and develop appropriate security solutions to protect such systems. However, a key problem is the lack of proper modeling tools to evaluate the security of SCADA systems. As widely accepted in academic and industrial communities, it is impractical to conduct security experiments on live systems. A modeling simulation tool would enable the simulation of SCADA systems with the benefit of testing different attack and security solutions. This paper proposes a simulation tool for building SCADA simulations that supports the integration of external devices and applications. A key benefit of this tool is the ability to test the effect of attacks on real devices and applications, even though using a simulated environment. The paper further describes two case studies that demonstrate how the tool can be efficiently used to create SCADA simulations and perform malicious attacks.
引用
收藏
页码:589 / 597
页数:9
相关论文
共 28 条
[1]  
[Anonymous], 2011, INTERNET BASES ATTAC
[2]  
[Anonymous], 2006, Securing SCADA Systems
[3]  
[Anonymous], 2006, P NAT WORKSH SCADA N, P1
[4]  
[Anonymous], 1999, The DoS project's 'trinoo'distributed denial of service attack tool
[5]  
[Anonymous], 2010, NATL SCADA TEST BED
[6]  
[Anonymous], 2000, SEC ENT COMP SOL 8 O
[7]  
[Anonymous], 2009, CSET 09
[8]   The Crutial Way of Critical Infrastructure Protection [J].
Bessani, Alysson Neves ;
Sousa, Paulo ;
Correia, Miguel ;
Neves, Nuno Ferreira ;
Verissimo, Paulo .
IEEE SECURITY & PRIVACY, 2008, 6 (06) :44-51
[9]   Security for Process Control Systems An Overview [J].
Brandle, Markus ;
Naedele, Martin .
IEEE SECURITY & PRIVACY, 2008, 6 (06) :24-29
[10]  
Cheung RWL, 1997, FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN POWER SYSTEM CONTROL, OPERATION & MANAGEMENT, VOLS 1 AND 2, P609