SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:kth-280129"
 

Search: onr:"swepub:oai:DiVA.org:kth-280129" > RICS-el :

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

RICS-el : Building a national testbed for research and training on SCADA security (short paper)

Almgren, Magnus, 1972 (author)
Chalmers tekniska högskola,Chalmers University of Technology,Department of computer science and engineering, Chalmers university of technology, Gothenburg
Andersson, P. (author)
Totalförsvarets forskningsinstitut (FOI),Swedish Defence Research Agency (FOI),FOI, Swedish Defence Research Agency, Linköping, Sweden
Björkman, Gunnar (author)
KTH,Nätverk och systemteknik,Kungliga Tekniska Högskolan (KTH),Royal Institute of Technology (KTH),Stockholms stad / Kungliga Tekniska Högskolan, KTH, Stockholm
show more...
Ekstedt, Mathias, 1975- (author)
KTH,Nätverk och systemteknik,Kungliga Tekniska Högskolan (KTH),Royal Institute of Technology (KTH),Industrial Information and Control Systems, Royal Institute of Technology, KTH, Stockholm
Hallberg, J. (author)
Totalförsvarets forskningsinstitut (FOI),Swedish Defence Research Agency (FOI),FOI, Swedish Defence Research Agency, Linköping, Sweden
Nadjm-Tehrani, Simin, 1958- (author)
Linköpings universitet,Programvara och system,Tekniska fakulteten,Real-time Systems Laboratory
Westring, E. (author)
Totalförsvarets forskningsinstitut (FOI),Swedish Defence Research Agency (FOI),FOI, Swedish Defence Research Agency, Linköping, Sweden
show less...
 (creator_code:org_t)
2018-12-30
2019
English.
In: Lect. Notes Comput. Sci.. - Cham : Springer Nature. ; 11260 LNCS, s. 219-225, s. 219-225
  • Conference paper (peer-reviewed)
Abstract Subject headings
Close  
  • Trends show that cyber attacks targeting critical infrastructures are increasing, but security research for protecting such systems are challenging. There is a gap between the somewhat simplified models researchers at universities can sustain contra the complex systems at infrastructure owners that seldom can be used for direct research. There is also a lack of common datasets for research benchmarking. This paper presents a national experimental testbed for security research within supervisory control and data acquisition systems (SCADA), accessible for both research training and experiments. The virtualized testbed has been designed and implemented with both vendor experts and security researchers to balance the goals of realism with specific research needs. It includes a real SCADA product for energy management, a number of network zones, substation nodes, and a simulated power system. This environment enables creation of scenarios similar to real world utility scenarios, attack generation, development of defence mechanisms, and perhaps just as important: generating open datasets for comparative research evaluation.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Datorsystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Computer Systems (hsv//eng)
NATURVETENSKAP  -- Data- och informationsvetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences (hsv//eng)
TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Kommunikationssystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Communication Systems (hsv//eng)
TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Inbäddad systemteknik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Embedded Systems (hsv//eng)

Keyword

Analysis and Validation approaches to C(I)IP
Cyber security in C(I)I systems
Modelling
Simulation
Training for C(I)IP and effective intervention
Critical infrastructures
Internet protocols
Models
Network security
SCADA systems
Testbeds
Comparative research
Cyber security
Experimental testbed
Real world utility
Research trainings
Supervisory Control and Data Acquisition (SCADA) systems
Validation approach
National security

Publication and Content Type

ref (subject category)
kon (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view