loading
Documents

Research.Publish.Connect.

Paper

Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures

Topics: Architecture for secure and interactive IoT; Emerging issues and recommendations for organizational security; Intrusion and detection techniques; Security as a Service including any Algorithms, Methodology and Software Proof-of-concepts; Testing (software engineering; penetration; product development)

Authors: Nicholas Cifranic 1 ; Jose Romero-Mariona 1 ; Brian Souza 1 and Roger Hallman 2

Affiliations: 1 Naval Information Warfare Center Pacific, San Diego, California, U.S.A. ; 2 Naval Information Warfare Center Pacific, San Diego, California, U.S.A., Thayer School of Engineering, Dartmouth College, Hanover, New Hampshire, U.S.A.

ISBN: 978-989-758-426-8

Keyword(s): Cybersecurity, Deception, Honeypots, Cyber-physical Systems, Supervisory Control and Data Acquisition (SCADA), Industrial Control Systems (ICS), Critical Infrastructure.

Abstract: Supervisory Control and Data Acquisition (SCADA) networks, which enable virtual components of critical infrastructures to connect to physical components, like the electrical grid, for example, are susceptible to cyber threats. This introductory paper discusses the application of deception as a technique for improving the cybersecurity posture of a network by using decoys to obfuscate the network and in turn make it harder for a potential adversary to find the real components. The Decepti-SCADA framework is introduced, which demonstrates multiple improvements over previous implementations of cyber deception strategies for SCADA systems. Decepti-SCADA has developed SCADA-specific decoys that can be used in a critical infrastructure environment. We detail Decepti-SCADA’s architecture, decoy generation and distribution, and ultimately explore what else can be done with cyber deception for critical infrastructures through early results.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.236.8.46

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Cifranic, N.; Romero-Mariona, J.; Souza, B. and Hallman, Roger A. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures.In Proceedings of the 5th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-426-8, pages 69-77. DOI: 10.5220/0009343300690077

@conference{iotbds20,
author={Nicholas Cifranic. and Jose Romero{-}Mariona. and Brian Souza. and Hallman, Roger A.},
title={Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures},
booktitle={Proceedings of the 5th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2020},
pages={69-77},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0009343300690077},
isbn={978-989-758-426-8},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures
SN - 978-989-758-426-8
AU - Cifranic, N.
AU - Romero-Mariona, J.
AU - Souza, B.
AU - Hallman, Roger A.
PY - 2020
SP - 69
EP - 77
DO - 10.5220/0009343300690077

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.