Research Article
BibTex RIS Cite
Year 2022, Volume: 11 Issue: 2, 52 - 68, 30.06.2022

Abstract

References

  • [1] U. ve Altyapi Bakanligi. Ulusal siber guvenlik stratejisi ve eylem stratejisi. [Online]. Available: https://hgm.uab.gov.tr//uploads/pages/siber-guvenlik/ ulusal-siber-guvenlik-stratejisi-ep-2020-2023.pdf
  • [2] O. o. t. P. S. The White House. Presidential policy directive 21 (ppd-21): Critical infrastructure security and resilience. [Online]. Available: https: //obamawhitehouse.archives.gov/the-press-office/2013/02/12/ presidential-policy-directive-critical-infrastructure-security-and-resil
  • [3] H. Holm, M. Karresand, A. Vidstr¨om, and E. Westring, “A survey of industrial control system testbeds,” in Secure IT Systems, S. Buchegger and M. Dam, Eds. Cham: Springer International Publishing, 2015, pp. 11–26.
  • [4] H. Gao, Y. Peng, Z. Dai, T. Wang, X. Han, and H. Li, “An industrial control system testbed based on emulation, physical devices and simulation,” vol. 441, 03 2014, pp. 79–91.
  • [5] U. P. D. Ani, J. M. Watson, B. Green, B. Craggs, and J. R. C. Nurse, “Design considerations for building credible security testbeds: Perspectives from industrial control system use cases,” Journal of Cyber Security Technology, vol. 5, no. 2, pp. 71–119, 2021. [Online]. Available: https://doi.org/10.1080/23742917.2020.1843822
  • [6] Y. Geng, Y. Wang, W. Liu, Q. Wei, K. Liu, and H. Wu, “A survey of industrial control system testbeds,” IOP Conference Series: Materials Science and Engineering, vol. 569, no. 4, p. 042030, jul 2019. [Online]. Available: https://doi.org/10.1088/1757-899x/569/4/042030
  • [7] Z. O’Toole, C. Moya, C. Rubin, A. Schnabel, and J. Wang, “A cyber-physical testbed design for the electric power grid,” in 2019 North American Power Symposium (NAPS), 2019, pp. 1–5.
  • [8] İ. Özçelik, M. İskefiyeli, M. Balta, K. O. Akpinar, and F. S. Toker, “Center water: A secure testbed infrastructure proposal for waste and potable water management,” in 2021 9th International Symposium on Digital Forensics and Security (ISDFS), 2021, pp. 1–7.
  • [9] İ. Özçelik, M. İskefiyeli, M. Balta, K. Ovaz Akpinar, and F. S. Toker, “Center energy: A secure testbed infrastructure proposal for electricity power grid,” in 2021 International Conference on Information Security and Cryptology (ISCTURKEY), 2021, pp. 149–154.
  • [10] National scada testbed. [Online]. Available: https://energy.gov/oe/technology-development/ energy-delivery-systems-cybersecurity/national-scada-test-bed
  • [11] Idaho national laboratory. [Online]. Available: https://inl.gov/ national-security/testing/
  • [12] Sandia national laboratory. [Online]. Available: http://www.sandia.gov/
  • [13] Argonne national laboratory. [Online]. Available: http://www.anl.gov/
  • [14] Los alamos national laboratory. [Online]. Available: http://www.lanl.gov/
  • [15] Lawrence berkeley national laboratory. [Online]. Available:http://www.lbl.gov/
  • [16] S. University. itrust centre for research in cyber security.[Online]. Available: https://itrust.sutd.edu.sg/
  • [17] J. Hieb, J. Graham, and S. Patel, “Security enhancements for distributed control systems,” in Critical Infrastructure Protection, E. Goetz and S. Shenoi, Eds. Boston, MA: Springer US, 2008, pp. 133–146.
  • [18] T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu, and R. Reddi, “A control system testbed to validate critical infrastructure protection concepts,” International Journal of Critical Infrastructure Protection, vol. 4, pp. 88–103, 08 2011.
  • [19] A. Almalawi, Z. Tari, I. Khalil, and A. Fahad, “Scadavt-a framework for scada security testbed based on virtualization technology,” in 38th Annual IEEE Conference on Local Computer Networks, 2013, pp. 639–646.
  • [20] M. Haney and M. Papa, “A framework for the design and deployment of a scada honeynet,” in Proceedings of the 9th Annual Cyber and Information Security Research Conference, ser. CISR ’14. New York, NY, USA: Association for Computing Machinery, 2014, p. 121–124. [Online]. Available: https://doi.org/10.1145/2602087.2602110
  • [21] T. J. Williams, “The purdue enterprise reference architecture,” Computers in Industry, vol. 24, no. 2, pp. 141–158, 1994. [Online]. Available: https://www.sciencedirect.com/ science/article/pii/0166361594900175
  • [22] C. Smith, “Understanding concepts in the defence in depth strategy,” in IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003, pp. 8–16.
  • [23] Dragos asset visibility. [Online]. Available: https://www.dragos.com/platform/asset-visibility/
  • [24] Wazuh systems. [Online]. Available: https://documentation.wazuh.com/current/index.html
  • [25] Elk stack. [Online]. Available: https://www.elastic.co/what-is/elk-stack

Testbed Infrastructure Proposal (Center Energy) for Electricity Power Grid and Defence in Depth Practice on The Proposal

Year 2022, Volume: 11 Issue: 2, 52 - 68, 30.06.2022

Abstract

Nowadays, Industrial Control Systems became more vulnerable because of integration of Information Systems and
Operational Systems. And also critical infrastructures, such as energy, water, petrol etc., are more important ICS must be secured
for threats. The methods to secure the critical infrastructures may be both by hardware or software. And by the way, the scientist
and the engineers are implementing hardware and software solutions for securing. But the problem is how and where to test their
solutions. The solutions cannot be tested in real systems, because critical infrastructures are systems that run 24/7 and cannot be
stopped. During the test the system may be in fault. The testbeds can be used as modelling tool and they represent the real systems,
with same devices, network topologies, processes etc., that means testbeds are realistic hardware and software environment that
to test solutions without having the ultimate system. For this purpose, a testbed center called “Center Energy” has been established
in order to carry out studies on the critical infrastructure of the electrical power grid for the purposes such as education of security
researchers, and the development of national/international attack and defense solutions. In this study, the information about the
architectural structure of Center Energy, implemented according to the Purdue model, and the process scope of the substation
and distribution center owned by the electricity transmission and distribution companies, SCADA (Supervisory Control and Data
Acquisition) and data management are given, as well as the SOC (Security Operation Center) implemented in accordance with the
Defense in Depth approach of this architecture. Studies related to its activities are also presented.

References

  • [1] U. ve Altyapi Bakanligi. Ulusal siber guvenlik stratejisi ve eylem stratejisi. [Online]. Available: https://hgm.uab.gov.tr//uploads/pages/siber-guvenlik/ ulusal-siber-guvenlik-stratejisi-ep-2020-2023.pdf
  • [2] O. o. t. P. S. The White House. Presidential policy directive 21 (ppd-21): Critical infrastructure security and resilience. [Online]. Available: https: //obamawhitehouse.archives.gov/the-press-office/2013/02/12/ presidential-policy-directive-critical-infrastructure-security-and-resil
  • [3] H. Holm, M. Karresand, A. Vidstr¨om, and E. Westring, “A survey of industrial control system testbeds,” in Secure IT Systems, S. Buchegger and M. Dam, Eds. Cham: Springer International Publishing, 2015, pp. 11–26.
  • [4] H. Gao, Y. Peng, Z. Dai, T. Wang, X. Han, and H. Li, “An industrial control system testbed based on emulation, physical devices and simulation,” vol. 441, 03 2014, pp. 79–91.
  • [5] U. P. D. Ani, J. M. Watson, B. Green, B. Craggs, and J. R. C. Nurse, “Design considerations for building credible security testbeds: Perspectives from industrial control system use cases,” Journal of Cyber Security Technology, vol. 5, no. 2, pp. 71–119, 2021. [Online]. Available: https://doi.org/10.1080/23742917.2020.1843822
  • [6] Y. Geng, Y. Wang, W. Liu, Q. Wei, K. Liu, and H. Wu, “A survey of industrial control system testbeds,” IOP Conference Series: Materials Science and Engineering, vol. 569, no. 4, p. 042030, jul 2019. [Online]. Available: https://doi.org/10.1088/1757-899x/569/4/042030
  • [7] Z. O’Toole, C. Moya, C. Rubin, A. Schnabel, and J. Wang, “A cyber-physical testbed design for the electric power grid,” in 2019 North American Power Symposium (NAPS), 2019, pp. 1–5.
  • [8] İ. Özçelik, M. İskefiyeli, M. Balta, K. O. Akpinar, and F. S. Toker, “Center water: A secure testbed infrastructure proposal for waste and potable water management,” in 2021 9th International Symposium on Digital Forensics and Security (ISDFS), 2021, pp. 1–7.
  • [9] İ. Özçelik, M. İskefiyeli, M. Balta, K. Ovaz Akpinar, and F. S. Toker, “Center energy: A secure testbed infrastructure proposal for electricity power grid,” in 2021 International Conference on Information Security and Cryptology (ISCTURKEY), 2021, pp. 149–154.
  • [10] National scada testbed. [Online]. Available: https://energy.gov/oe/technology-development/ energy-delivery-systems-cybersecurity/national-scada-test-bed
  • [11] Idaho national laboratory. [Online]. Available: https://inl.gov/ national-security/testing/
  • [12] Sandia national laboratory. [Online]. Available: http://www.sandia.gov/
  • [13] Argonne national laboratory. [Online]. Available: http://www.anl.gov/
  • [14] Los alamos national laboratory. [Online]. Available: http://www.lanl.gov/
  • [15] Lawrence berkeley national laboratory. [Online]. Available:http://www.lbl.gov/
  • [16] S. University. itrust centre for research in cyber security.[Online]. Available: https://itrust.sutd.edu.sg/
  • [17] J. Hieb, J. Graham, and S. Patel, “Security enhancements for distributed control systems,” in Critical Infrastructure Protection, E. Goetz and S. Shenoi, Eds. Boston, MA: Springer US, 2008, pp. 133–146.
  • [18] T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu, and R. Reddi, “A control system testbed to validate critical infrastructure protection concepts,” International Journal of Critical Infrastructure Protection, vol. 4, pp. 88–103, 08 2011.
  • [19] A. Almalawi, Z. Tari, I. Khalil, and A. Fahad, “Scadavt-a framework for scada security testbed based on virtualization technology,” in 38th Annual IEEE Conference on Local Computer Networks, 2013, pp. 639–646.
  • [20] M. Haney and M. Papa, “A framework for the design and deployment of a scada honeynet,” in Proceedings of the 9th Annual Cyber and Information Security Research Conference, ser. CISR ’14. New York, NY, USA: Association for Computing Machinery, 2014, p. 121–124. [Online]. Available: https://doi.org/10.1145/2602087.2602110
  • [21] T. J. Williams, “The purdue enterprise reference architecture,” Computers in Industry, vol. 24, no. 2, pp. 141–158, 1994. [Online]. Available: https://www.sciencedirect.com/ science/article/pii/0166361594900175
  • [22] C. Smith, “Understanding concepts in the defence in depth strategy,” in IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003, pp. 8–16.
  • [23] Dragos asset visibility. [Online]. Available: https://www.dragos.com/platform/asset-visibility/
  • [24] Wazuh systems. [Online]. Available: https://documentation.wazuh.com/current/index.html
  • [25] Elk stack. [Online]. Available: https://www.elastic.co/what-is/elk-stack
There are 25 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Research Article
Authors

İbrahim Özçelik 0000-0001-9985-5268

Murat İskefiyeli 0000-0002-8210-5070

Musa Balta 0000-0002-8711-6625

Firdevs Sevde Toker 0000-0002-3455-5130

Publication Date June 30, 2022
Submission Date April 7, 2022
Published in Issue Year 2022 Volume: 11 Issue: 2

Cite

IEEE İ. Özçelik, M. İskefiyeli, M. Balta, and F. S. Toker, “Testbed Infrastructure Proposal (Center Energy) for Electricity Power Grid and Defence in Depth Practice on The Proposal”, IJISS, vol. 11, no. 2, pp. 52–68, 2022.