Publication:
A practical SCADA testbed in electrical power system environment for cyber-security exercises

dc.contributor.authorJamil N.en_US
dc.contributor.authorQassim Q.en_US
dc.contributor.authorDaud M.en_US
dc.contributor.authorAbidin I.Z.en_US
dc.contributor.authorJaaffar N.en_US
dc.contributor.authorKamarulzaman W.A.W.en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid36613541700en_US
dc.contributor.authorid57193904391en_US
dc.contributor.authorid35606640500en_US
dc.contributor.authorid57204109050en_US
dc.contributor.authorid6505975029en_US
dc.date.accessioned2023-05-29T06:56:24Z
dc.date.available2023-05-29T06:56:24Z
dc.date.issued2018
dc.descriptionCritical infrastructures; Cryptography; Electric power systems; Electric power transmission networks; Legacy systems; Public works; SCADA systems; Security of data; Testbeds; Critical infrastructure systems; Cyber security exercise; Electric power grids; Electrical power system; SCADA security; Security countermeasures; Unintended consequences; Vulnerability assessments; Electric power system securityen_US
dc.description.abstractThe impact from Stuxnet worm to SCADA systems in 2010 has been one of the most significant signals of a well-coordinated cyber-Attack is now towards disrupting national critical infrastructures such as power grid governed by SCADA system. The discovery of this worm has put a lot of attention on the strength and security level of security countermeasures of existing critical infrastructure systems such as SCADA that has been long used as a legacy system. One way to assess the strength and security level of a system is through penetration testing and vulnerability assessment that would help in determining weaknesses, loopholes and potential breaches for exploitation in system defences. However, performing a real penetration test and vulnerability assessment in a real critical infrastructure system is infeasible and unlikely to happen because an unintended consequence that might occur can propagate its effect to a wider scale. On the other hand, a replicated system is also infeasible due to the high cost and huge effort required. Therefore, developing a realistic SCADA testbed is the best available option for the cyber-security exercise to take place. This paper describes in-detail a scalable and reconfigurable SCADA testbed for cyber-security analysis. � 2018 Penerbit Universiti All rights reserved.en_US
dc.description.natureFinalen_US
dc.identifier.epage188
dc.identifier.scopus2-s2.0-85054529092
dc.identifier.spage176
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85054529092&partnerID=40&md5=c70d96d62988828665f89f214cc0856f
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24172
dc.publisherInstitute for Mathematical Research (INSPEM)en_US
dc.sourceScopus
dc.sourcetitleProceedings of the 6th International Cryptology and Information Security Conference 2018, CRYPTOLOGY 2018
dc.titleA practical SCADA testbed in electrical power system environment for cyber-security exercisesen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections