Abstract
IT security for Industrial control systems or the Industrial Internet of Things is an emerging topic in research and development as well as for operators of real production facilities. In this paper, we will present the Fraunhofer IOSB IT Security Laboratory for industrial control systems, that enables security research, development and testing of products and training of IT security personnel. Due to its architecture based on both real hardware components and a flexible virtual environment, the IT Security Lab offers a realistic setup of today’s production facilities and at the same time a high flexibility with regard to future networking technologies and protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bray, R., Cid, D., Hay, A.: OSSEC Host-Based Intrusion Detection Guide. Syngress (2008)
Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental). Internet Engineering Task Force, March 2007. http://www.ietf.org/rfc/rfc4765.txt
Festo AG & Co. KG. Festo Didactic (2016). http://www.festo-didactic.com/. Accessed 01 February 2016
Proxmox Server Solutions GmbH. Open Source Virtualization (2016). https://www.proxmox.com/en/. Accessed 01 February 2016
Industrial Inernet Consortium (IIC). Industrial Inernet Consortium Testbeds (2016). http://www.iiconsortium.org/test-beds.htm. Accessed 01 February 2016
International Society of Automation. International Society of Automation Hands-on Training (2016). https://www.isa.org/training-certifications/isa-training/about-isa-training/hands-on-laboratories/. Accessed 01 February 2016
Johnson, R.E.: Survey of SCADA security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1–5 (2010)
Labs Network Industrie 4.0. Labs Network Industrie 4.0 Testbeds (2016). http://lni40.de/. Accessed 01 February 2016
OPC Foundation. OPC Unified Architecture (2016). https://opcfoundation.org/. Accessed 01 February 2016
pfSense. Open Source Security (2016). https://www.pfsense.org/. Accessed 01 February 2016
Piètre-Cambacédès, L., Tritschler, M., Ericsson, G.N.: Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs. IEEE Trans. Power Delivery 26(1), 161–172 (2011). doi:10.1109/TPWRD.2010.2061872. ISSN: 0885-8977
Roesch, M., et al.: Snort: lightweight intrusion detection for networks. In: LISA, vol. 99(1), pp. 229–238 (1999)
SANS. Assessing and Exploiting Control Systems (2016). http://www.sans.org/course/pentesting-smartgrid-scada. Accessed 01 February 2016
SANS. Critical Infrastructure and Control System Cybersecurity (2016). http://www.sans.org/course/critical-infrastructure-csc. Accessed 01 February 2016
Proxmox Server Solutions. Open vSwitch (2016). http://openvswitch.org/. Accessed 01 February 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Pfrang, S., Kippe, J., Meier, D., Haas, C. (2017). Design and Architecture of an Industrial IT Security Lab. In: Guo, S., Wei, G., Xiang, Y., Lin, X., Lorenz, P. (eds) Testbeds and Research Infrastructures for the Development of Networks and Communities. TridentCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 177. Springer, Cham. https://doi.org/10.1007/978-3-319-49580-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-49580-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49579-8
Online ISBN: 978-3-319-49580-4
eBook Packages: Computer ScienceComputer Science (R0)