Browse > Article
http://dx.doi.org/10.5207/JIEIE.2010.24.4.050

A SCADA Testbed Implementation Architecture for Security Assessment  

Lee, Jong-Joo (한국전기연구원)
Kim, Seog-Joo (한국전기연구원)
Kang, Dong-Joo (한국전기연구원)
Publication Information
Journal of the Korean Institute of Illuminating and Electrical Installation Engineers / v.24, no.4, 2010 , pp. 50-56 More about this Journal
Abstract
Supervisory Control and Data Acquisition Systems (SCADAs) is real-time monitor and control systems. SCADA systems are used to monitor or control chemical and transportation processes, in municipal water supply systems, electric power generation, transmission and distribution, gas and oil pipelines, and other distributed processes. SCADA refers to a large-scale distributed system. The supervisory control system is placed on top of a real time control system to control external processes. Emerging security technologies and security devices are decreasing the vulnerability of the power system against cyber threats. Dealing with these threats and analyzing vulnerabilities is an important task for equipment such as RTU, IED and FEP. To reduce such risks, we develop such a SCADA testbed. This paper presents the development of a testbed designed to assess the vulnerabilities SCADA networks(including serial communication).
Keywords
SCADA Security; SCADA Testbed; Security Assessment; SCADA Testbed Structure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ray Parks, Jason Hills, Sammy Smith, Tom Davis, Ana Baros, Patricia Cordeiro, “Network Security Infrastructure Testing”, Sandia National Laboratories’ Center for SCADA Security, October 12, 2005.
2 Idaho National Engineering and Environmental Laboratory, Control Systems Security and Test Center, “A Comparison of Oil and Gas Segment Cyber Security Standards”, U.S. Department of Homeland Security, November 3, 2004.
3 Centre for the Protection of National Infrastructure, PA Consulting Group, “PROCESS CONTROL AND SCADA SECURITY - GUIDE 2. IMPLEMENT SECURE ARCHITECTURE”.
4 Julio Rodriguez, “SCADA-EMS Test Bed - INL Case Study on Current Vendor Partnerships”, Idaho National Laboratory, May 23, 2007.
5 Annarita Giani, Gabor Karsai, Tanya Roosta, Aakash Shah, Bruno Sinopoli, Jon Wiley, “A Testbed for Secure and Robust SCADA Systems”, Special issue on the the 14th IEEE real-time and embedded technology and applications symposium (RTAS'08), Volume 5, Issue 2, Article No. 4, July 2008.
6 C. M. Davis, J. E. Tate, H. Okhravi, C. Grier, T. J. Overbye, and D. Nicol, “SCADA Cyber Security Testbed Development”, Power Symposium, 2006. NAPS 2006. 38th North American, pp 483-488, Sept. 2006.
7 P.A.S. Ralston, J.H. Graham, J.L. Hieb, “Cyber security risk assessment for SCADA and DCS networks”, ISA Trans. Volume 46, Issue 4, pp 583-594, October 2007.   DOI
8 이철원, “주요 제어시설의 사이버 보안 동향”, 국가보안 기술연구소, 2007년 4월.
9 이철수, “원방감시제어자료수집(SCADA) 시스템 보안성 강화 방안”, 국가사이버안전센터, 사이버 시큐리티, pp.8-17, 2005년 12월호.
10 Erik Johansson, Teodor Sommestad, Mathias Ekstedt, “SECURITY ISSUES FOR SCADA SYSTEMS. WITHIN POWER DISTRIBUTION”,.
11 U.S. Separtment of Energy, Office of Energy Assurance, “21 Steps to Improve Cyber Security of SCADA Networks”, 2003.
12 Information of Tenable Network Security, Inc., “Protecting Critical Infrastructure SCADA Network Security Monitoring”, August 1, 2008.
13 Hugh Njemanze, “SCADA Security Protections Are On The Increase”, Pipeline & Gas Journal, February 2007.
14 Gordon Clarke, Deon Reynders, “PRACTICAL MODERN SCADA PROTOCOLS”, Newnes, 1 edition, September 2004.
15 Krutz, R., “Securing SCADA Systems”, Wiley Publishing, Indianapolis, Indiana, 2006.
16 National Infrastructure Security Coordination Centre, “The electronic Attack (eA) Threat to Supervisory Control and Data Acquisition(SCADA) Control & Automation Systems”, “NISCC Briefing 02/04, 2004.