Taxonomy of SCADA systems security testbeds Online publication date: Wed, 14-Jan-2015
by Antonio Di Pietro; Stefano Panzieri
International Journal of Critical Infrastructures (IJCIS), Vol. 10, No. 3/4, 2014
Abstract: Considerable research has focused on developing simulation environments to study the effects of cyber-attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and classifying specific contributions on the development of SCADA security testbed according to the reference model. Specific techniques and experiments used to recreate cyber-attacks on the de facto standard communication protocol Modbus are also presented. This paper also explores the possibility of integrating specific simulation models into a SCADA security testbed to assess the impact of cyber-attacks on the physical system.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Critical Infrastructures (IJCIS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com