Open Access Open Access  Restricted Access Subscription Access

A Survey of SCADA Testbed Implementation Approaches


Affiliations
1 Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
2 Cyber Security Malaysia Seri Kembangan – 43300, Selangor, Malaysia
 

Objectives: SCADA systems are turning into the central nerve system of the electric power system critical infrastructure. With the increasing availability and use of computer networks and the Internet as well as the convenience of cloud computing, SCADA systems have increasingly adopted Internet-of-Things technologies to significantly reduce infrastructure costs and increase ease of maintenance and integration. However, SCADA systems are obvious targets for cyber attacks that would seek to disrupt the critical infrastructure systems thus are governed by a SCADA system. Methods/Statistical Analysis: Cyber attacks exploit SCADA security vulnerabilities in order to take control or disrupt the normal operation of the system. Analyzing security vulnerability and loopholes are critical in developing security solutions for such systems. It is also equally important to test security solutions developed to protect SCADA systems. Findings: Experimenting on live systems is generally not advisable and impractical as this may render the system unstable. Such situation calls for the need of an experimental setup equivalent or quite close to the real scenario for developing and testing security solutions. Application/Improvements: This paper reviews common SCADA implementation approaches utilized in previous related works.

Keywords

Cyber Attacks, Industrial Control, Power Systems, SCADA Systems, Security, Testbed.
User

Abstract Views: 182

PDF Views: 0




  • A Survey of SCADA Testbed Implementation Approaches

Abstract Views: 182  |  PDF Views: 0

Authors

Qais Qassim
Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
Norziana Jamil
Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
Izham Zainal Abidin
Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
Mohd. Ezanee Rusli
Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
Salman Yussof
Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
Roslan Ismail
Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
Fairuz Abdullah
Centre for Information and Network Security Universiti Tenaga Nasional (UNITEN) Kajang – 43000, Selangor, Malaysia
Norhamadi Ja’afar
Cyber Security Malaysia Seri Kembangan – 43300, Selangor, Malaysia
Hafizah Che Hasan
Cyber Security Malaysia Seri Kembangan – 43300, Selangor, Malaysia
Maslina Daud
Cyber Security Malaysia Seri Kembangan – 43300, Selangor, Malaysia

Abstract


Objectives: SCADA systems are turning into the central nerve system of the electric power system critical infrastructure. With the increasing availability and use of computer networks and the Internet as well as the convenience of cloud computing, SCADA systems have increasingly adopted Internet-of-Things technologies to significantly reduce infrastructure costs and increase ease of maintenance and integration. However, SCADA systems are obvious targets for cyber attacks that would seek to disrupt the critical infrastructure systems thus are governed by a SCADA system. Methods/Statistical Analysis: Cyber attacks exploit SCADA security vulnerabilities in order to take control or disrupt the normal operation of the system. Analyzing security vulnerability and loopholes are critical in developing security solutions for such systems. It is also equally important to test security solutions developed to protect SCADA systems. Findings: Experimenting on live systems is generally not advisable and impractical as this may render the system unstable. Such situation calls for the need of an experimental setup equivalent or quite close to the real scenario for developing and testing security solutions. Application/Improvements: This paper reviews common SCADA implementation approaches utilized in previous related works.

Keywords


Cyber Attacks, Industrial Control, Power Systems, SCADA Systems, Security, Testbed.



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i26%2F156389