Visible to the public Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems

TitleLightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Publication TypeConference Paper
Year of Publication2020
AuthorsKhan, M., Rehman, O., Rahman, I. M. H., Ali, S.
Conference Name2020 International Conference on Computing and Information Technology (ICCIT-1441)
Date PublishedSept. 2020
PublisherIEEE
ISBN Number978-1-7281-2680-7
KeywordsARP Spoofing, computer network security, computer security, container-based SCADA testbed, Containers, critical infrastructure, critical infrastructures, cyber physical systems, cyber-attacks, cybersecurity experiments, Docker, experimental testbeds, financial damages, interoperable platform, learning (artificial intelligence), machine learning, man in the middle attack, MITM Attack, network classification model, Network reconnaissance, network scanning, network traffic, Open area test sites, pattern classification, physical damages, Protocols, pubcrawl, reconnaissance attack, resilience, Resiliency, SCADA, SCADA systems, SCADA-based Systems, Scalability, telecommunication traffic, testbed
Abstract

A rapid rise in cyber-attacks on Cyber Physical Systems (CPS) has been observed in the last decade. It becomes even more concerning that several of these attacks were on critical infrastructures that indeed succeeded and resulted into significant physical and financial damages. Experimental testbeds capable of providing flexible, scalable and interoperable platform for executing various cybersecurity experiments is highly in need by all stakeholders. A container-based SCADA testbed is presented in this work as a potential platform for executing cybersecurity experiments. Through this testbed, a network traffic containing ARP spoofing is generated that represents a Man in the middle (MITM) attack. While doing so, scanning of different systems within the network is performed which represents a reconnaissance attack. The network traffic generated by both ARP spoofing and network scanning are captured and further used for preparing a dataset. The dataset is utilized for training a network classification model through a machine learning algorithm. Performance of the trained model is evaluated through a series of tests where promising results are obtained.

URLhttps://ieeexplore.ieee.org/document/9213791/
DOI10.1109/ICCIT-144147971.2020.9213791
Citation Keykhan_lightweight_2020