Process control cyber-attacks and labelled datasets on S7comm critical infrastructure

No Thumbnail Available
File version
Author(s)
Rodofile, NR
Schmidt, T
Sherry, ST
Djamaludin, C
Radke, K
Foo, E
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2017
Size
File type(s)
Location

Auckland, New Zealand

License
Abstract

Cyber-security of their critical infrastructure is the current grand challenge facing nation-states. Development and research of cyber-security solutions for operational technology environments of critical infrastructure is being inhibited by the lack of publically available datasets. This paper provides a collection of labelled datasets containing attacks on the widely used STEP 7 (S7) protocol. To achieve this goal, we designed and executed a series of process-control attacks, using our physical critical infrastructure test-bed. The created labelled datasets, and the associated process logs, will directly aid in the development and assessment of intrusion detection systems (IDSs). We validate our dataset using Snort, configured with openly available S7 rule-sets.

Journal Title
Conference Title

Lecture Notes in Computer Science

Book Title
Edition
Volume

10343

Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject

Software engineering

Persistent link to this record
Citation

Rodofile, NR; Schmidt, T; Sherry, ST; Djamaludin, C; Radke, K; Foo, E, Process control cyber-attacks and labelled datasets on S7comm critical infrastructure, Lecture Notes in Computer Science, 2017, 10343, pp. 452-459