Access the full text.
Sign up today, get DeepDyve free for 14 days.
Abdallah Moubayed, A. Refaey, A. Shami (2019)
Software-Defined Perimeter (SDP): State of the Art Secure Solution for Modern NetworksIEEE Network, 33
(2020)
Cyber Security of Industrial Control Systems in the Future Internet EnvironmentAdvances in Information Security, Privacy, and Ethics
Simulating Industrial Control Systems Using Mininet , Ecole Polytechnique de Louvain , 2018
John Hale, Abraham Habib, Rujit Raval, Ryan Irvin, P. Hawrylak (2020)
A Cyber-Physical System Testbed for Security Experimentation
(2019)
Zero trust architecture, National Institute of Standards and Technology, 2019
Clare Stevens (2019)
Assembling cybersecurity: The politics and materiality of technical malware reports and the case of StuxnetContemporary Security Policy, 41
(2020)
FCTaaS: Federated cybersecurity testbed as a service
Abebe Tesfahun, D. Bhaskari (2016)
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructuresAutomatic Control and Computer Sciences, 50
Anti - DDoS : Software - defined perimeter as a DDoS prevention mechanism
S. Rose, O. Borchert, S. Mitchell, S. Connelly (2019)
10.6028/NIST.SP.800-207Zero trust architecture
Hannes Holm, Martin Karresand, Arne Vidström, Erik Westring (2015)
A Survey of Industrial Control System Testbeds
Marcus Geiger, Jochen Bauer, M. Masuch, Jörg Franke (2020)
An Analysis of Black Energy 3, Crashoverride, and Trisis, Three Malware Approaches Targeting Operational Technology Systems2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 1
(2016)
Software defined perimeter for infrastructure as a service
H. Ghaeini, Nils Tippenhauer (2016)
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
Chaoqun Kang, Lian-jie He, Zi-long Han, Ye Xia (2020)
Cyber Security Risk Analysis and Protection Structure Design for Power Distribution IoT2020 2nd International Conference on Smart Power & Internet Energy Systems (SPIES)
A. Mathur, Nils Tippenhauer (2016)
SWaT: a water treatment testbed for research and training on ICS security2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater)
Rogerio Oliveira, A. Shinoda, C. Schweitzer, Ligia Prete (2014)
Using Mininet for emulation and prototyping Software-Defined Networks2014 IEEE Colombian Conference on Communications and Computing (COLCOM)
Integration of IT and OT blurs the concept of “network perimeter”. This will result in increasing the attack surface in industrial control system (ICS). Zero trust architecture (ZTA) has become a new and alternative network security model to protect an enterprise network. The software-defined perimeter (SDP) is an instance that implemented the concept of ZTA. In this paper, a security framework SDPICS for ICS based on SDP is firstly proposed. In contrast with of security policy based on the perimeter defense security model, SDPICS will not grant implicit trust to any user or device based on their location in the network. In addition, the existing ICS simulation platforms don’t support the idea of SDP. This paper extends the network simulation tool Mininet to design a new ICS simulation platform MiniICS that can support our security framework SDPICS. The simulation modules for ICS and SDP components are implemented in MiniICS. Finally, our security framework SDPICS is tested by performing these popular attacks such as DDoS and etc. in MiniICS. The experimental results show the reliability and availability of the novel security framework SDPICS.
Automatic Control and Computer Sciences – Springer Journals
Published: Feb 1, 2023
Keywords: cybersecurity; industrial control system; zero trust architecture; software defined perimeter (SDP)
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.