Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3055366.3055375acmotherconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
short-paper

WADI: a water distribution testbed for research in the design of secure cyber physical systems

Published: 21 April 2017 Publication History

Abstract

The architecture of a water distribution testbed (WADI), and on-going research in the design of secure water distribution system is presented. WADI consists of three stages controlled by Programmable Logic Controllers (PLCs) and two stages controlled via Remote Terminal Units (RTUs). Each PLC and RTU uses sensors to estimate the system state and the actuators to effect control. WADI is currently used to (a) conduct security analysis for water distribution networks, (b) experimentally assess detection mechanisms for potential cyber and physical attacks, and (c) understand how the impact of an attack on one CPS could cascade to other connected CPSs. The cascading effects of attacks can be studied in WADI through its connection to two other testbeds, namely for water treatment and power generation and distribution.

References

[1]
ICS CERT 2014. 2014. ICS-MM201408: May--August 2014. Technical Report. U.S. Department of Homeland Security-Industrial Control Systems-Cyber Emergency Response Team. https://ics-cert.us-cert.gov
[2]
Sridhar Adepu and Aditya Mathur. 2016. Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. In 11th ACM on Asia Conference on Computer and Communications Security. ACM, China, 449--460.
[3]
S. Adepu and A. Mathur. 2016. Generalized Attacker and Attack Models for Cyber Physical Systems. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE Computer Society, Washington, DC, 283--292.
[4]
Alaeddin Bobat, Tolga Gezgin, and Haeseyin Aslan. 2015. The SCADA system applications in management of Yuvacik Dam and Reservoir. Desalination and Water Treatment 54, 8 (2015), 2108--2119.
[5]
Edward A. Lee. 2008. Cyber Physical Systems: Design Challenges. Technical Report UCB/EECS-2008-8. EECS Department, University of California, Berkeley. http://www2.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-8.html
[6]
A.P. Mathur and N.O. Tippenhauer. April, 2016. SWaT: A water treatment testbed for research and training on ICS security. In International Workshop on Cyber-physical Systems for Smart Water Networks. IEEE, Vienna, Austria.
[7]
Jill Slay and Michael Miller. 2008. Lessons Learned from the Maroochy Water Breach. In Critical Infrastructure Protection, Eric Goetz and Sujeet Shenoi (Eds.). Springer US, Boston, MA, 73--82.

Cited By

View all
  • (2024)Integrating Sensor Embeddings with Variant Transformer Graph Networks for Enhanced Anomaly Detection in Multi-Source DataMathematics10.3390/math1217261212:17(2612)Online publication date: 23-Aug-2024
  • (2024)Enhancing Anomaly Detection in Maritime Operational IoT Time Series Data with Synthetic OutliersElectronics10.3390/electronics1319391213:19(3912)Online publication date: 3-Oct-2024
  • (2024)Graph Transformer Network Incorporating Sparse Representation for Multivariate Time Series Anomaly DetectionElectronics10.3390/electronics1311203213:11(2032)Online publication date: 23-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CySWATER '17: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks
April 2017
52 pages
ISBN:9781450349758
DOI:10.1145/3055366
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack detection
  2. cyber physical systems
  3. cyber security
  4. industrial control systems
  5. water distribution testbed

Qualifiers

  • Short-paper

Conference

CPS Week '17
CPS Week '17: Cyber Physical Systems Week 2017
April 21, 2017
Pennsylvania, Pittsburgh

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)388
  • Downloads (Last 6 weeks)41
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Integrating Sensor Embeddings with Variant Transformer Graph Networks for Enhanced Anomaly Detection in Multi-Source DataMathematics10.3390/math1217261212:17(2612)Online publication date: 23-Aug-2024
  • (2024)Enhancing Anomaly Detection in Maritime Operational IoT Time Series Data with Synthetic OutliersElectronics10.3390/electronics1319391213:19(3912)Online publication date: 3-Oct-2024
  • (2024)Graph Transformer Network Incorporating Sparse Representation for Multivariate Time Series Anomaly DetectionElectronics10.3390/electronics1311203213:11(2032)Online publication date: 23-May-2024
  • (2024)MGAD: Mutual Information and Graph Embedding Based Anomaly Detection in Multivariate Time SeriesElectronics10.3390/electronics1307132613:7(1326)Online publication date: 1-Apr-2024
  • (2024)Unsupervised Deep Anomaly Detection for Industrial Multivariate Time Series DataApplied Sciences10.3390/app1402077414:2(774)Online publication date: 16-Jan-2024
  • (2024)Comparative Analysis of Classification Methods and Suitable Datasets for Protocol Recognition in Operational TechnologiesAlgorithms10.3390/a1705020817:5(208)Online publication date: 11-May-2024
  • (2024)The Development of a New System for Generating Training Data of AI-Based Anomaly Detection2024 26th International Conference on Advanced Communications Technology (ICACT)10.23919/ICACT60172.2024.10471963(01-04)Online publication date: 4-Feb-2024
  • (2024)A Novel Anomaly Detection Framework Based on Model SerializationIEICE Transactions on Information and Systems10.1587/transinf.2023EDL8024E107.D:3(420-423)Online publication date: 1-Mar-2024
  • (2024)Deep Learning for Time Series Anomaly Detection: A SurveyACM Computing Surveys10.1145/369133857:1(1-42)Online publication date: 7-Oct-2024
  • (2024)SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong RegularizationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664505(1-12)Online publication date: 30-Jul-2024
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media