Cyber Wargaming on SCADA Systems

被引:0
|
作者
Colbert, Edward [1 ]
Sullivan, Daniel [2 ]
Kott, Alexander [2 ]
机构
[1] US Army Res Lab, Comp Secur Res, Adelphi, MD 20783 USA
[2] US Army Res Lab, Adelphi, MD USA
关键词
SCADA; ICS; wargaming; red team; blue team; cyber defense;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present general strategies for cyber wargaming of SCADA (Supervisory Control and Data Acquisition) systems that are used for cyber security research at the US Army Research Laboratory (ARL). Since SCADA and other Industrial Control Systems (ICSs) are operational systems, it is difficult or impossible to perform security experiments on actual systems. We use a hardware SCADA/ICS test bed to configure various live systems for the purpose of cyber wargaming and cyber-defense research and development experiments. The hardware testbed is part of the Army Cyber-research and Analytics Laboratory (ACAL) that is hosted at the Adelphi, Maryland site. We describe how table-top strategy sessions and live wargames on real SCADA systems can be conducted between red (attack) and blue (defense) teams. We also describe how the recoded actions of the wargame activity can be used to test and validate cyber-defense models. We describe a game theoretic SCADA security model that includes three distinct simultaneous games at the physical, cyber, and management layer.
引用
收藏
页码:96 / 104
页数:9
相关论文
共 50 条
  • [21] An Overview About Detection of Cyber-Attacks on Power SCADA Systems
    de Figueiredo, Hugo F. M.
    Ferst, Matheus K.
    Denardin, Gustavo W.
    2019 IEEE 15TH BRAZILIAN POWER ELECTRONICS CONFERENCE AND 5TH IEEE SOUTHERN POWER ELECTRONICS CONFERENCE (COBEP/SPEC), 2019,
  • [22] Statistical Detection and Isolation of Cyber-Physical Attacks on SCADA Systems
    Van Long Do
    IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, : 3524 - 3529
  • [23] Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems
    Woo, Pil Sung
    Kim, Balho H.
    Hur, Don
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2015, 10 (03) : 888 - 894
  • [24] The game-theoretic model and experimental investigation of cyber wargaming
    Colbert, Edward J. M.
    Kott, Alexander
    Knachel, Lawrence P.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2020, 17 (01): : 21 - 38
  • [25] Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
    Hernandez, Jarilyn M.
    Chen, Qian
    Calhoun, Chelsea
    Nichols, Jeffrey A.
    Sykes, Summer
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2915 - 2921
  • [26] SCADA Systems Cyber Security for Critical infrastructures: Case Studies in the Transport Sector
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 425 - 433
  • [27] Protocols, Solutions, and Testbeds for Cyber-Attack Prevention in Industrial SCADA Systems
    Kumar A.
    Bhushan B.
    Malik A.
    Kumar R.
    Studies in Big Data, 2021, 99 : 355 - 380
  • [28] SCADA modeling for performance and vulnerability assessment of integrated cyber-physical systems
    Stefanov, Alexandru
    Liu, Chen-Ching
    Govindarasu, Manimaran
    Wu, Shinn-Shyan
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2015, 25 (03): : 498 - 519
  • [29] Cyber Security Modeling for SCADA Systems Using Stochastic Game Nets Approach
    El Bouchti, Abdelali
    Nahhal, Tarik
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 42 - 47
  • [30] SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2016, 6 (03) : 79 - 95