Cyber-security of their critical infrastructure is the current grand challenge facing nation-states. Development and research of cyber-security solutions for operational technology environments of critical infrastructure is being inhibited by the lack of publically available datasets. This paper provides a collection of labelled datasets containing attacks on the widely used STEP 7 (S7) protocol. To achieve this goal, we designed and executed a series of process-control attacks, using our physical critical infrastructure test-bed. The created labelled datasets, and the associated process logs, will directly aid in the development and assessment of intrusion detection systems (IDSs). We validate our dataset using Snort, configured with openly available S7 rule-sets.
CITATION STYLE
Rodofile, N. R., Schmidt, T., Sherry, S. T., Djamaludin, C., Radke, K., & Foo, E. (2017). Process control cyber-attacks and labelled datasets on S7comm critical infrastructure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10343 LNCS, pp. 452–459). Springer Verlag. https://doi.org/10.1007/978-3-319-59870-3_30
Mendeley helps you to discover research relevant for your work.