dc.rights.license | Attribution 4.0 International | * |
dc.contributor.author | Etxezarreta, Xabier | |
dc.contributor.author | Garitano, Iñaki | |
dc.contributor.author | Iturbe, Mikel | |
dc.contributor.author | Zurutuza, Urko | |
dc.date.accessioned | 2024-04-09T08:10:34Z | |
dc.date.available | 2024-04-09T08:10:34Z | |
dc.date.issued | 2024 | |
dc.identifier.issn | 1572-8196 | en |
dc.identifier.other | https://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=174374 | en |
dc.identifier.uri | https://hdl.handle.net/20.500.11984/6329 | |
dc.description.abstract | Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. Industrial networks possess specific characteristics that make them well-suited for such solutions, leading to extensive research efforts in this area. However, due to the high economic cost and potential risks associated with real equipment interaction, most studies rely on testbeds for demonstration purposes. Therefore, it becomes crucial to understand the limitations and safe operating ranges of testbed environments to ensure the development of scientifically rigorous experiments and accurate result measurements. This study focuses on analyzing MiniCPS-based testbeds in terms of network performance, experiment replicability, and the effects of different attacker implementation modes. The findings demonstrate that utilizing MiniCPS on actual hardware enables the development of highly replicable and high-performance testbeds, as long as they operate within the predefined safe operating ranges. Additionally, this work provides an in-depth analysis of various attacker implementation techniques and their impact on the network. | en |
dc.language.iso | eng | en |
dc.publisher | Springer | en |
dc.rights | © 2024 The Authors | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.subject | Industrial Control Systems | en |
dc.subject | Software defined networking | en |
dc.subject | Network security | en |
dc.subject | Industrial testbeds | en |
dc.subject | MiniCPS | en |
dc.subject | Mininet | en |
dc.subject | ODS 9 Industria, innovación e infraestructura | es |
dc.title | On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems | en |
dcterms.accessRights | http://purl.org/coar/access_right/c_abf2 | en |
dcterms.source | Wireless Networks | en |
local.contributor.group | Análisis de datos y ciberseguridad | es |
local.description.peerreviewed | true | en |
local.identifier.doi | https://doi.org/10.1007/s11276-023-03647-4 | en |
local.source.details | January, 2024 | |
oaire.format.mimetype | application/pdf | en |
oaire.file | $DSPACE\assetstore | en |
oaire.resourceType | http://purl.org/coar/resource_type/c_6501 | en |
oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 | en |
oaire.funderName | Gobierno Vasco | en |
oaire.funderName | Gobierno Vasco | en |
oaire.funderIdentifier | https://ror.org/00pz2fp31 / http://data.crossref.org/fundingdata/funder/10.13039/501100003086 | en |
oaire.funderIdentifier | https://ror.org/00pz2fp31 / http://data.crossref.org/fundingdata/funder/10.13039/501100003086 | |
oaire.fundingStream | Ikertalde Convocatoria 2022-2025. | en |
oaire.fundingStream | Elkartek 2023 | en |
oaire.awardNumber | IT1676-22 | en |
oaire.awardNumber | KK-2023-00085 | en |
oaire.awardTitle | Grupo de sistemas inteligentes para sistemas industriales | en |
oaire.awardTitle | cyBErsecure industriAl Computing cONtinuum (BEACON) | en |
oaire.awardURI | Sin información | en |
oaire.awardURI | Sin información | en |