首页> 外文会议>International congress on advances in nuclear power plants >INDUSTRIAL CONTROL SYSTEM TESTBED FOR CYBERSECURITY RESEARCH WITH INDUSTRIAL PROCESS DATA
【24h】

INDUSTRIAL CONTROL SYSTEM TESTBED FOR CYBERSECURITY RESEARCH WITH INDUSTRIAL PROCESS DATA

机译:通过工业过程数据对用于网络安全性研究的工业控制系统进行了测试

获取原文

摘要

Cybersecurity of industrial control systems (ICS) is an essential research area due to increasing critical asset-targeted cyberattacks and their potential severe consequences. Current intrusion detection systems (IDS) are primarily based on network traffic monitoring, which may be not sufficient for detecting comprehensive and carefully prepared cyberattacks. In this situation, the combination of empirical monitoring with statistical anomaly detection technique is a promising and feasible approach to early detection of ICS cyberattack that takes advantage of numerous and various sensors used in industry; this may provide a complementary approach to traditional network-based intrusion detection to improve coverage of detectable cyberattacks. The motivation of this study is to generate ICS intrusion data to study the use of empirical models for ICS cybersecurity. In this paper, a real-time ICS test bed, which includes a physical two-loop forced flow system, LabVIEW-based supervisory control and data acquisition (SCADA) system, and Kali Linux-incorporated cyber network that conducts attacks within the local area network (LAN), is deployed to generate relevant data. Three cyberattacks scenarios are carried out in this paper, including packets sniffing with man-in-the-middle (MITM) attack; denial-of-service (DoS) attack to SCADA slave with spoofed IP address; and change command with spoofed SCADA master by MITM attack. Physical process data, including field sensor data, which represents industrial process data, are collected by the LabVIEW-based SCADA system. Network communication data are collected with Wireshark. The significance of this test bed is providing both industrial process data and network communication data of normal and under-attack situation, which will be useful in future empirical model based intrusion detection analysis. Future works will focus on improving the ICS test bed through integrating industrial protocols and collect more intrusion data for studying IDS.
机译:由于越来越多的针对关键资产的网络攻击及其潜在的严重后果,工业控制系统(ICS)的网络安全成为必不可少的研究领域。当前的入侵检测系统(IDS)主要基于网络流量监视,这可能不足以检测全面且经过精心准备的网络攻击。在这种情况下,将经验监视与统计异常检测技术相结合,是一种利用工业中大量使用的传感器对ICS网络攻击进行早期检测的有前途且可行的方法。这可以为传统的基于网络的入侵检测提供补充方法,以提高可检测的网络攻击的覆盖范围。这项研究的动机是生成ICS入侵数据,以研究ICS网络安全经验模型的使用。本文介绍了一个实时ICS测试平台,其中包括一个物理两回路强制流系统,基于LabVIEW的监督控制和数据采集(SCADA)系统以及结合Kali Linux的网络,该网络可以在本地进行攻击部署网络(LAN)来生成相关数据。本文执行了三种网络攻击方案,包括中间人(MITM)攻击引起的数据包嗅探;以及中间人(MITM)攻击引起的数据包嗅探。对具有伪造IP地址的SCADA从站的拒绝服务(DoS)攻击;并通过MITM攻击用欺骗的SCADA主设备更改命令。物理过程数据(包括代表工业过程数据的现场传感器数据)由基于LabVIEW的SCADA系统收集。网络通信数据是通过Wireshark收集的。该测试台的意义在于提供正常和攻击不足情况下的工业过程数据和网络通信数据,这将在将来基于经验模型的入侵检测分析中很有用。未来的工作将集中于通过集成工业协议来改进ICS测试平台,并收集更多入侵数据以研究IDS。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号