Team for Research in
Ubiquitous Secure Technology

Simulation of Network Attacks on SCADA Systems
Andrew Davis

Citation
Andrew Davis. "Simulation of Network Attacks on SCADA Systems". Talk or presentation, 10, November, 2010.

Abstract
Network security is a major issue affecting SCADA systems designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in several domains and simulation environments. Here we demonstrate the use of the C2WindTunnel to simulate a plant and its controller, and the Ethernet network that connects them, in different simulation environments. We also simulate DDOS-like attacks on a few of the routers to observe and analyze the effects of a network attack on such a system.

Electronic downloads

Citation formats  
  • HTML
    Andrew Davis. <a
    href="http://www.truststc.org/pubs/759.html"
    ><i>Simulation of Network Attacks on SCADA
    Systems</i></a>, Talk or presentation,  10,
    November, 2010.
  • Plain text
    Andrew Davis. "Simulation of Network Attacks on SCADA
    Systems". Talk or presentation,  10, November, 2010.
  • BibTeX
    @presentation{Davis10_SimulationOfNetworkAttacksOnSCADASystems,
        author = {Andrew Davis},
        title = {Simulation of Network Attacks on SCADA Systems},
        day = {10},
        month = {November},
        year = {2010},
        abstract = {Network security is a major issue affecting SCADA
                  systems designed and deployed in the last decade.
                  Simulation of network attacks on a SCADA system
                  presents certain challenges, since even a simple
                  SCADA system is composed of models in several
                  domains and simulation environments. Here we
                  demonstrate the use of the C2WindTunnel to
                  simulate a plant and its controller, and the
                  Ethernet network that connects them, in different
                  simulation environments. We also simulate
                  DDOS-like attacks on a few of the routers to
                  observe and analyze the effects of a network
                  attack on such a system.},
        URL = {http://www.truststc.org/pubs/759.html}
    }
    

Posted by Larry Rohrbough on 7 Dec 2010.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.