Considerable research has focused on developing simulation environments to study the effects of cyber-attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and classifying specific contributions on the development of SCADA security testbed according to the reference model. Specific techniques and experiments used to recreate cyber-attacks on the de facto standard communication protocol Modbus are also presented. This paper also explores the possibility of integrating specific simulation models into a SCADA security testbed to assess the impact of cyber-attacks on the physical system.
Taxonomy of SCADA systems security testbeds
Di Pietro, A.
2014-01-01
Abstract
Considerable research has focused on developing simulation environments to study the effects of cyber-attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and classifying specific contributions on the development of SCADA security testbed according to the reference model. Specific techniques and experiments used to recreate cyber-attacks on the de facto standard communication protocol Modbus are also presented. This paper also explores the possibility of integrating specific simulation models into a SCADA security testbed to assess the impact of cyber-attacks on the physical system.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.