Taxonomy of SCADA systems security testbeds
by Antonio Di Pietro; Stefano Panzieri
International Journal of Critical Infrastructures (IJCIS), Vol. 10, No. 3/4, 2014

Abstract: Considerable research has focused on developing simulation environments to study the effects of cyber-attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and classifying specific contributions on the development of SCADA security testbed according to the reference model. Specific techniques and experiments used to recreate cyber-attacks on the de facto standard communication protocol Modbus are also presented. This paper also explores the possibility of integrating specific simulation models into a SCADA security testbed to assess the impact of cyber-attacks on the physical system.

Online publication date: Wed, 14-Jan-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Critical Infrastructures (IJCIS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com