2021
DOI: 10.48550/arxiv.2102.05631
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Industrial Control System Testbeds and Datasets for Security Research

Mauro Conti,
Denis Donadel,
Federico Turrin

Abstract: The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs) open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore, since ICSs are often employed in critical infrastructures (e.g., nuclear plants) and manufacturing companies (e.g., chemical industries), attacks can lead to devastating physical damages. In dealing with this security requirement, the research community focuses on developing new security mechanisms such as Intrusion Detection Sys… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 102 publications
(163 reference statements)
0
8
0
Order By: Relevance
“…Modbus is the most commonly used communication protocol in ICS and BAS [9]. It lacks proper authentication and authorization mechanism.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Modbus is the most commonly used communication protocol in ICS and BAS [9]. It lacks proper authentication and authorization mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…These devices are connected by communication medium which can be serial lines, Ethernet links, cellular networks and various types of radio signals. In 2021, Conti M et al [9] provided a comprehensive survey of ICS. The also focused on architecture, employed devices, used protocols, testbeds and ICS datasets.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, depending on public datasets, in contrast to getting access to relevant use case-specific data from collaborators, introduces its own caveats. For instance, the number of available datasets for cybersecurity research of industrial systems is limited, and the available datasets are usually either not a perfect fit for the use case at hand or only contain poor documentation of the underlying setup [30]. The scarcity of datasets partially follows from the fact that the behavior of CPS is best captured by physical testbeds that are expensive to setup and maintain, and partially from the mindset that the generation of a high-quality dataset is not very rewarding for researchers and practitioners alike when weighing the required effort [30], [80].…”
Section: ) Bootstrappingmentioning
confidence: 99%
“…For instance, the number of available datasets for cybersecurity research of industrial systems is limited, and the available datasets are usually either not a perfect fit for the use case at hand or only contain poor documentation of the underlying setup [30]. The scarcity of datasets partially follows from the fact that the behavior of CPS is best captured by physical testbeds that are expensive to setup and maintain, and partially from the mindset that the generation of a high-quality dataset is not very rewarding for researchers and practitioners alike when weighing the required effort [30], [80]. Finally, scaled-down testbeds are also not necessarily representative of larger, real-world systems, which they intend to mimic, further limiting the credibility of these datasets [2].…”
Section: ) Bootstrappingmentioning
confidence: 99%