Process control cyber-attacks and labelled datasets on S7comm critical infrastructure
File version
Author(s)
Schmidt, T
Sherry, ST
Djamaludin, C
Radke, K
Foo, E
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
Auckland, New Zealand
License
Abstract
Cyber-security of their critical infrastructure is the current grand challenge facing nation-states. Development and research of cyber-security solutions for operational technology environments of critical infrastructure is being inhibited by the lack of publically available datasets. This paper provides a collection of labelled datasets containing attacks on the widely used STEP 7 (S7) protocol. To achieve this goal, we designed and executed a series of process-control attacks, using our physical critical infrastructure test-bed. The created labelled datasets, and the associated process logs, will directly aid in the development and assessment of intrusion detection systems (IDSs). We validate our dataset using Snort, configured with openly available S7 rule-sets.
Journal Title
Conference Title
Lecture Notes in Computer Science
Book Title
Edition
Volume
10343
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject
Software engineering
Persistent link to this record
Citation
Rodofile, NR; Schmidt, T; Sherry, ST; Djamaludin, C; Radke, K; Foo, E, Process control cyber-attacks and labelled datasets on S7comm critical infrastructure, Lecture Notes in Computer Science, 2017, 10343, pp. 452-459