Process control cyber-attacks and labelled datasets on S7comm critical infrastructure

20Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cyber-security of their critical infrastructure is the current grand challenge facing nation-states. Development and research of cyber-security solutions for operational technology environments of critical infrastructure is being inhibited by the lack of publically available datasets. This paper provides a collection of labelled datasets containing attacks on the widely used STEP 7 (S7) protocol. To achieve this goal, we designed and executed a series of process-control attacks, using our physical critical infrastructure test-bed. The created labelled datasets, and the associated process logs, will directly aid in the development and assessment of intrusion detection systems (IDSs). We validate our dataset using Snort, configured with openly available S7 rule-sets.

Cite

CITATION STYLE

APA

Rodofile, N. R., Schmidt, T., Sherry, S. T., Djamaludin, C., Radke, K., & Foo, E. (2017). Process control cyber-attacks and labelled datasets on S7comm critical infrastructure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10343 LNCS, pp. 452–459). Springer Verlag. https://doi.org/10.1007/978-3-319-59870-3_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free