Cyber Wargaming on SCADA Systems

被引:0
|
作者
Colbert, Edward [1 ]
Sullivan, Daniel [2 ]
Kott, Alexander [2 ]
机构
[1] US Army Res Lab, Comp Secur Res, Adelphi, MD 20783 USA
[2] US Army Res Lab, Adelphi, MD USA
关键词
SCADA; ICS; wargaming; red team; blue team; cyber defense;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present general strategies for cyber wargaming of SCADA (Supervisory Control and Data Acquisition) systems that are used for cyber security research at the US Army Research Laboratory (ARL). Since SCADA and other Industrial Control Systems (ICSs) are operational systems, it is difficult or impossible to perform security experiments on actual systems. We use a hardware SCADA/ICS test bed to configure various live systems for the purpose of cyber wargaming and cyber-defense research and development experiments. The hardware testbed is part of the Army Cyber-research and Analytics Laboratory (ACAL) that is hosted at the Adelphi, Maryland site. We describe how table-top strategy sessions and live wargames on real SCADA systems can be conducted between red (attack) and blue (defense) teams. We also describe how the recoded actions of the wargame activity can be used to test and validate cyber-defense models. We describe a game theoretic SCADA security model that includes three distinct simultaneous games at the physical, cyber, and management layer.
引用
收藏
页码:96 / 104
页数:9
相关论文
共 50 条
  • [11] Strategic Foresight and Resilience Through Cyber-Wargaming
    Ormrod, David
    Scott, Keith
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 319 - 327
  • [12] Security of SCADA Systems Against Cyber-Physical Attacks
    Do, Van Long
    Fillatre, Lionel
    Nikiforov, Igor
    Willett, Peter
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) : 28 - 45
  • [13] How to protect SCADA systems from cyber-attack
    Rush, William F.
    Kinast, John A.
    Gas Utility Manager, 2003, 47 (09): : 12 - 18
  • [14] Host-Oriented Approach to Cyber Security for the SCADA Systems
    Lee, Jae-Myeong
    Hong, Sugwon
    2020 6TH IEEE CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'20), 2020, : 151 - 155
  • [15] Cyber Security in communication of SCADA systems using IEC 61850
    Czechowski, Robert
    Wicher, Pawel
    Wiecha, Bernard
    2015 MODERN ELECTRIC POWER SYSTEMS (MEPS), 2015,
  • [16] Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)
    Sogut, Esra
    Erdem, O. Ayhan
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2020, 23 (02): : 557 - 566
  • [17] Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
    Zhang, Taimin
    Wang, Yinan
    Liang, Xiao
    Zhuang, Zhou
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6847 - 6852
  • [18] Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 481 - 486
  • [19] Cyber security and communications network on SCADA systems in the context of Smart Grids
    Rizzetti, Tiago Antonio
    Wessel, Pedro
    Rodrigues, Alexandre Silva
    da Silva, Bolivar Menezes
    Milbradt, Rafael
    Canha, Luciane Neves
    2015 50TH INTERNATIONAL UNIVERSITIES POWER ENGINEERING CONFERENCE (UPEC), 2015,
  • [20] Evaluating Machine Learning approaches for Cyber and Physical anomalies in SCADA systems
    Faramondi, L.
    Flammini, F.
    Guarino, S.
    Setola, R.
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 412 - 417