Publication: A practical SCADA testbed in electrical power system environment for cyber-security exercises
| dc.contributor.author | Jamil N. | en_US |
| dc.contributor.author | Qassim Q. | en_US |
| dc.contributor.author | Daud M. | en_US |
| dc.contributor.author | Abidin I.Z. | en_US |
| dc.contributor.author | Jaaffar N. | en_US |
| dc.contributor.author | Kamarulzaman W.A.W. | en_US |
| dc.contributor.authorid | 36682671900 | en_US |
| dc.contributor.authorid | 36613541700 | en_US |
| dc.contributor.authorid | 57193904391 | en_US |
| dc.contributor.authorid | 35606640500 | en_US |
| dc.contributor.authorid | 57204109050 | en_US |
| dc.contributor.authorid | 6505975029 | en_US |
| dc.date.accessioned | 2023-05-29T06:56:24Z | |
| dc.date.available | 2023-05-29T06:56:24Z | |
| dc.date.issued | 2018 | |
| dc.description | Critical infrastructures; Cryptography; Electric power systems; Electric power transmission networks; Legacy systems; Public works; SCADA systems; Security of data; Testbeds; Critical infrastructure systems; Cyber security exercise; Electric power grids; Electrical power system; SCADA security; Security countermeasures; Unintended consequences; Vulnerability assessments; Electric power system security | en_US |
| dc.description.abstract | The impact from Stuxnet worm to SCADA systems in 2010 has been one of the most significant signals of a well-coordinated cyber-Attack is now towards disrupting national critical infrastructures such as power grid governed by SCADA system. The discovery of this worm has put a lot of attention on the strength and security level of security countermeasures of existing critical infrastructure systems such as SCADA that has been long used as a legacy system. One way to assess the strength and security level of a system is through penetration testing and vulnerability assessment that would help in determining weaknesses, loopholes and potential breaches for exploitation in system defences. However, performing a real penetration test and vulnerability assessment in a real critical infrastructure system is infeasible and unlikely to happen because an unintended consequence that might occur can propagate its effect to a wider scale. On the other hand, a replicated system is also infeasible due to the high cost and huge effort required. Therefore, developing a realistic SCADA testbed is the best available option for the cyber-security exercise to take place. This paper describes in-detail a scalable and reconfigurable SCADA testbed for cyber-security analysis. � 2018 Penerbit Universiti All rights reserved. | en_US |
| dc.description.nature | Final | en_US |
| dc.identifier.epage | 188 | |
| dc.identifier.scopus | 2-s2.0-85054529092 | |
| dc.identifier.spage | 176 | |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054529092&partnerID=40&md5=c70d96d62988828665f89f214cc0856f | |
| dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/24172 | |
| dc.publisher | Institute for Mathematical Research (INSPEM) | en_US |
| dc.source | Scopus | |
| dc.sourcetitle | Proceedings of the 6th International Cryptology and Information Security Conference 2018, CRYPTOLOGY 2018 | |
| dc.title | A practical SCADA testbed in electrical power system environment for cyber-security exercises | en_US |
| dc.type | Conference Paper | en_US |
| dspace.entity.type | Publication |