Vol. 39, No. 1 (2016) (11)

The Development of Cyber Security Testbed for Networked Mechatronics Monitoring and Control System Based on DETER

H. P. Huang, S. D. Xiao, J. Duan

Electromechanical and Control Department, Mechanical Engineering College, Southwest Jiaotong University, Chengdu 610031, China

Cite this paper
H. P. Huang, S. D. Xiao, J. Duan, “The Development of Cyber Security Testbed for Networked Mechatronics Monitoring and Control System Based on DETER”, Journal of Mechanical Engineering Research and Developments, vol. 39, no. 1, pp. 75-82, 2016. DOI: 10.7508/jmerd.2016.01.011

ABSTRACT: A kind of cyber security testbed for networked mechatronics monitoring and control system based on DETERlab infrastructure is designed and implemented in this paper. It is a novel platform on which researchers can do the system cyber security evaluation and countermeasures investigation. A typical networked mechatronics system architecture is emulated according to the submitted ns script file. DETERlab servers use the hardware resources to setup the test nodes such as PLC, Master IPC and etc. A kind of software tool is developed to make the test nodes can communicate with each other according to the Modbus TCP protocol. Some other software are also applied in this testbed for generating attack and monitoring the network communication status. This testbed is applied to do Dos attack test successfully. The results show that the testbed proposed in this paper has high practicability, reality and scalability. It can do great help for the cybersecurity research work about the networked mechatronics system.

Keywords : Networked Mechatronics Monitoring and Control System; Cyber Security; Testbed.

[1] Stouffer, Keith, Joe Falco, and Karen Scarfone. “Guide to industrial control systems (ICS) security.” NIST special publication (2011): 800-82.
[2] Reaves, Bradley, and Thomas Morris. “An open virtual testbed for industrial control system security research.” International Journal of Information Security 11.4 (2012): 215-229.
[3] Xiong Qi, Peng Yong, Dai Zhong-hua. Safety risk assessment of industrial control system. China Cyber Security, 2012,27(03):57-59. (in Chinese)
[4] Wei, Qin Zhi. “Industrial Network Control System Security and Management.” Measurement & Control Technology 32.2(2013): 87-92.
[5] Peng, Yong, et al. “Industrial control system cybersecurity research.” Journal of Tsinghua University Science and Technology 52.10 (2012): 1396-1408.
[6] INL’s SCADA Test Bed. http://www4vip.inl.gov/research/national-supervisory-control-and-data-acquisition-test-bed/
[7] Morris, Thomas, et al. “A control system testbed to validate critical infrastructure protection concepts.” International Journal of Critical Infrastructure Protection 4.2 (2011): 88-103.
[8] Chabukswar, Rohan, et al. “Simulation of network attacks on SCADA systems.” First Workshop on Secure Control Systems. 2010.
[9] Bergman, David C. “Power grid simulation, evaluation, and test framework.” (2010).
[10] Emulab – Network Emulation Testbed Home. http://www.emulab.net/
[11] Benzel, Terry, et al. “Experience with deter: a testbed for security research.”Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006. 2nd International Conference on. IEEE, 2006.
[12] SEER Experimental Workbench, https://seer.isi.deterlab.net
[13] Schwab, Stephen, et al. “Seer: A security experimentation environment for deter.” Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007. USENIX Association, 2007.
[14] Viswanathan, Arun, et al. “A Semantic Framework for Data Analysis in Networked Systems.” NSDI. 2011.
[15] Benzel, Terry. “The science of cyber security experimentation: the DETER project.” Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 2011.
[16] Knapp, Eric D., and Joel Thomas Langill. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014.
[17] Hussain, Alefiya, John Heidemann, and Christos Papadopoulos. “A framework for classifying denial of service attacks.” Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2003.
[18] Hussain, Alefiya, and Saurabh Amin. “NCS security experimentation using DETER.” Proceedings of the 1st international conference on High Confidence Networked Systems. ACM, 2012.