Comparison of Tools and Simulators For Control System Security Studies
Comparison of Tools and Simulators For Control System Security Studies
Abstract—Security is one of the key concerns for control purpose of testing is often viable for testing network security,
systems. Tools and simulators for the control system security but would be prohibitively expensive for testing complex
have attracted a lot of attentions recently, because testing new infrastructure establishment. Instead, the complexity of
solutions is a very important work for the control system security SCADA systems calls for a thorough efficient simulation to
studies. In this paper, we firstly analyze the challenges of the help test the benefits and consequences of novel security
security simulations for control system. Then, classification study solutions.
is done for the existing tools and simulators. The implementation
principles the typical simulator examples and security examples Recently, various kinds of tools and simulators [2]-[11] are
are also analyzed. Finally, we compare the important capabilities used for testing the security of related control system [12]-[22].
and characteristic of the tools and simulators, which is valuable Scientific analysis and comparison of the tools and simulators
to efficient simulations for security studies in control systems. for control system security studies are needed, which and
provide an efficient reference method for using the tools to test
Keywords—security, control system, SCADA, simulator, test the control system security.
bed
In this paper, we analyze the tools and simulators used for
I. INTRODUCTION control system security studies. The rest of the paper is
Industrial control systems form the backbone of countless organized as follows. Sect. II analyzes the design issues of
industries affecting nearly every basic service modern society simulators for control system security. Sect. III presents the
requires. The computer systems used to monitor and control classification studies of the simulators and tools. The
major infrastructure are known by various names, among the comparison of these tools and simulators are shown in Sect. IV.
most common Supervisory Control and Data Acquisition Finally, Sect. V concludes this paper.
(SCADA) systems. Many of them control nations’ critical
II. ISSUES IN SIMULATION OF CONTROL SYSTEM SECURITY
components, like nuclear power generation, public transport,
wastewater plants and so on [1]. The typical architecture of a control system and its security
simulation issues are shown in Fig. 1. In control systems, the
Securing these control systems is a complex and difficult process is the physical phenomenon that operators seek to
task and little attention has been paid on it in the past. In light control. This portion of the system will be distinct in all
of the growing prevalence of cyber attacks on the computer SCADA systems. The control center acts as the master
networks and systems in the infrastructure of major nations, an controller, maintaining the high level operation of the process.
understanding of the vulnerabilities of industrial control The control center sends control commands and receives sensor
systems and an investigation of appropriate and effective updates from the field devices. The connection between the
mitigation techniques is of vital importance. control center and field devices is provided by the control
The differences in SCADA security and traditional IT network. This may be a wired or wireless network and may
approaches mean that even reliable and trusted solutions cannot operate with a variety of network [Link] schemes
be applied in real control systems without significant testing. for control systems have basic properties that separate them
As a matter of fact, whether cyber or physical, the studies of from conventional distributed systems. This section discusses
control system security can be carried out by related simulators. the design issues of the simulation for control system security
The potential damage of malfunctions and loss of availability and the potential effect of the issues on performance.
of critical infrastructure further necessitate thorough testing A. Closed Relations with Control Device Actions
based on simulation. However, testing new security solutions
for SCADA systems is not easily and simply performed. The security events in control systems are have closed
Developing parallel and realistic simulation systems for the relations with the control device actions. In other words, the
security schemes are usually performed for protecting the
46
Discrete Event Systems (DES) simulation engine, SimEvents is The principle of security simulation is shown in Fig. 4. At
driven by an Event Calendar where all future security events to first, the feature parameters of the network are obtained from
occur are listed in ascending order of their scheduled time. the control networks. Then the network element model can be
SimEvents always processes the first security event in this list established, which can be described by the main features of the
and updates the DES state accordingly. When such an event control network. Next, the security proposals added to the
presents, the Cooperative Event Driver translates it into a network model to establish the security simulation model.
Simulink signal. Then the Data Exchange module passes the Usually, the network security schemes are proposed in one or
signal to Simulink so that it may trigger a time driven process several layers of the reference 7-layer model. The security
or update various model parameters. In contrast, as a time- schemes for end to end data are proposed in upper layer
driven process evolves under the control of Simulink, it may (application layer, presentation layer and session layer) in the
generate security events in the form of level-crossing points OSI reference network model. On the other hand, the security
(from above, from below, or either) that the Data Exchange schemes for end to end segments, packets, frames, and bits are
module appropriately translates so they may be processed by proposed in media layer (transport layer, network layer, data
SimEvents blocks. The most challenging aspect of coordinating link layer and physical layer). This security scheme can be
time-driven and event-driven dynamics is that of proper timing. based on the basic technologies, such as encryption, integrity
In the architecture of Fig. 3, the system “clock” is maintained check, machine learning, wireless communication technologies,
by Simulink and the Cooperative Event Driver is responsible etc. Security proposals are added into the network model by
for ensuring consistency between Simulink blocks and adding these basic technologies to corresponding layer.
SimEvents blocks which interact with the Security Event
Calendar. Here we take ISA100.11a for example to explain the
security solutions in the OSI reference network model of
control networks. ISA100.11a is an open wireless networking
technology standard developed by the International Society of
SimEvents State Security Event Automation (ISA). There is a two-layer network security for
Dynamics Calendar ISA100.11a. These levels are inherited from the security
policies supported by IEEE 802.15.4, the underlying wireless
technology on which ISA100.11a is based. Various levels of
Data Cooperative Matlab authentication and encryption can be enabled for both layers.
Exchange Event Driver The ISA100.11a standard uses state-of-the-art encryption based
on AES-128 block ciphers. In order to provide protection from
a variety of attacks, the ISA100.11a standard employs time
Simulink State Simulink Engine
stamps in its security by including it in the nonce needed for
Dynamics (Clock)
the AES-128 encryption engine. In ISA100.11a, symmetric
keys are used for data encryption and authentication, while
Figure 3. A Simulation Framework based on Matlab Simulink/SimEvents asymmetric keys can be used for the join process.
Application, Network
Link, etc. of Control
Presentation Security Network
Device Data Security
Thread n DLL
Session Security Node n Segments Events
Network Element
Model
Transport Security Figure 5. A Simulation Framework based on OMNeT++
Protection of End
Network Security to End Data, Network Network simulator can test the overhead and/or
Segments, Packets, Simulation Model
Frames, and Bits
performance of the security solutions in control system, such as
Data Link Security authentication protocols, data secrecy, secure routing, and
network based intrusion detection, etc. In the security studies in
Physical Security Results [12], [15], OMNeT++ [3] is applied as the network simulation
of control systems. A key benefit of such a tool is its ability to
Figure 4. Security Simulation based Network Simulator test the effects of attacks on a real control process (NXT
47
devices) using realistic SCADA protocols (Modbus/TCP) [6]. Then the whole control system can be simulated to verify its
Other network simulators, such as OPNET [4], .NET Remoting security.
[5], Modbus simulator [6], and are used in the security studies
in [18], [19], and [20]. GME Integration Model
48
Simulink, Colored Petri Net, network models (i. e. OMNeT tool can be established. The security studies for different
Discrete Event Simulation) and 3D visual sensor simulator. subsystems can be tested in this tool.
D. Realistic Test Bed Tool In the security studies in [12], [21], [22], RINSE [8],
Some test bed tools not only consist solely of the simulation Emulab [9], OPSAID [10], and DETER [11] are used to
model but also include modules to setup, run, rerun and analyze construct the realistic test bed.
experiments. This kind of tool uses some actual commercial
SCADA devices along with implementations of the software
modules performing the data processing (running on realistic iSSFNet Network
Simulator
hardware), emulations of the network, and real-time
simulations for the plant (running on dedicated, high-
performance hardware). Such a simulation is feasible and could Network Viewer
Database
be made highly realistic and scalable. Clients
Control System
Internet
Subsystem
Model 1
... Subsystem
Model i
Subsystem
Model i+1
... Subsystem
Model n
Data Server Simulator Database
Manager
RINSE Backup
Instance
TABLE I
COMPARISON OF SIMULATORS FOR CONTROL SYSTEM SECURITY
Real-time simulation
Classification Complexity Realistic capability Simulated security events Related examples
performance
Realistic test Relate security schemes design for RINSE, Emulab, DETER,
bed tool High High High
devices, networks, data, etc. OPSAID
49
IV. COMPARISON [2] MathWorks Simulink. [Online]: Available: [Link]
[3] OMNeT++. [Online]: Available:[Link]
Based on aforementioned classification and analysis, we
[4] OPNET network simulator. [Online]: Available: [Link]
compare the simulators and tools for control system security
[5] B. Vanhooff, D. Preuveneers, and Y. Berbers, “.NET Remoting and Web
studies from the view of complexity, realistic capability, real- Services: A Lightweight Bridge between the .NET Compact and Full
time simulation performance simulated security event, as Framework,” Journal of Object Technology, vol. 5, no. 3, pp. 59-81, Apr.
shown below and in Table I. 2006.
[6] Modpoll Modbus Master Simulator. [Online]:
Complexity: This factor indicates the complexity of the [Link]
simulation, including the software/hardware environment [7] A. Davis, “Developing SCADA Simulations with C2WindTunnel,”
establishment, measurements, etc. Single simulators and Master Dissertation, Vanderbilt University, May 2011.
network simulators are relative simple, because they are always [8] M. Liljenstam, J. Liu, D. Nicol, Y. Yuan, G. Yan, and C. Grier, “Rinse:
performed as software simulation in the computer. Integration The Real-Time Immersive Network Simulation Environment for
simulator is relative complex because of the interaction design Network Security Exercises,” in Proc. of IEEE PADS 2005, Jun. 2005.
between different simulators. Realistic test bed tools are the [9] Emulab. [Link]
most complex because they are usually involve the software [10] S. A. Hurd, J. E. Stamp, and A. R. Chavez, “OPSAID Initial Design and
and hardware design for the real systems. Testing Report,” Report, Sandia National Laboratories, Nov. 2007.
[11] The DETER Testbed. [Online]: [Link]
Realistic Capability: This feature denotes the level of [12] A. Giani, G. Karsai, T. Roosta, A. Shah, B. Sinopoli, and J. Wiley, “A
realistic of the simulation. Essentially, single simulators, Testbed for Secure and Robust SCADA Systems,” in Proc. of IEEE
network simulators, and integration simulators are software RTAS 2008, Jul. 2008.
simulators which only are performed in the computers. [13] J. Nutaro, P. T. Kuruganti, M. Shandar, L. Miller, and S. Mullen,
Realistic test bed tools can present well the physical truth of the “Integrated Modeling of the Electric Grid, Communications, and
control systems. Control,” International Journal of Energy Sector Management, vol. 2, no.
3, pp. 420-438, Mar. 2008.
Real-Time Simulation Performance: This factor indicates [14] G. Khazan, M. A. Azgomi, “A Distributed Attack Simulation for
the simulation capability of real-time performance. Basically, Quantitative Security Evaluation using SimEvents,” in Proc. of
the realistic test bed tool has the best simulation capability of IEEE/ACS AICCSA 2009, May, 2009.
real-time. On the other hand, because of the integration among [15] R. Chabukswar, B. Sinopoli, G. Karsai, A. Giani, H. Neema and A.
different simulators, the delay of the integration simulator is Davis, “Simulation of Network Attacks on SCADA Systems,” in Proc.
of TRUST SCS 2010, Apr. 2010.
relative longer than other simulators.
[16] C. Queiroz, A. Mahmood, J. Hu, Z. Tari, and X. Yu, “Building a
Simulated Security Event: Different kind of simulators SCADA Security Testbed,” in Proc. of NSS 2009, Oct. 2009.
and tools are used for different security event simulations. [17] S. Hu, Z. Zhao, Y. Zhang, and S. Wang, “A Novel Modbus RTU-based
Single simulators are usually used to simulate security schemes Communication System for Adjustable Speed Drives,” In Proc. of VPPC
2008, Spet. 2008.
in devices. Network simulators are usually used to do
[18] M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, “A
simulation for security schemes for data and/or network. Testbed for Analyzing Security of SCADA Control Systems
Integration simulators can be applied for simulating the whole (TASSCS),” In Proc. of IEEE ISTG 2011, Dec. 2011.
control system including different kinds of devices. Realistic [19] B. Genge, I. N. Fovino, C. Siaterlis and M. Masera, “Analyzing Cyber-
test bed tools can provide a relative real environment to Physical Attacks on Networked Industrial Control Systems” in Proc. of
simulate all kinds of security selutions for control systems. 5th IFIP ICCIP 2011, Mar. 2011.
[20] J. Rrushi and R. Campbell, “Detecting Attacks in Power Plant
V. CONCLUSION Interfacing Substations through Probabilistic Validation of Attack-Effect
Bindings,” in Proc. of S4 2008, Jan. 2008.
In this paper, various properties of the tools and simulators
[21] C. M. Davis, J. E. Tate, H. Okhravi, C. Grier, T. J. Overbye, and D.
for control system security were discussed. Firstly, issues of Nicol, “SCADA Cyber Security Testbed Development,” in Proc. of
security simulation for control systems were presented. Then, NAPS 2006, Spet. 2006.
according to the important characteristics or the tools and [22] D. C. Bergman, D. Jin, D. M. Nicol, and T. Yardley, “The Virtual Power
simulators, we classified them into four types, which are single System Testbed and Inter-Testbed Integration,” in Proc. of CSET 2009,
simulation tool for devices, network simulation tool, Aug. 2009.
integration simulation tool, and realistic test bed tool. Next, we [23] N. Liu, J. Zhang, H. Zhang, and W. Liu, "Security Assessment for
analyzed the implementation principle and gave typical Communication Networks of Power Control Systems Using Attack
Graph and MCDM," IEEE Transactions on Power Delivery, vol. 25, no.
examples of each kind of simulator for security studies. Finally, 3, pp. 1492-1500, Jul. 2010.
according to the issues for control system security simulation, [24] R. E. Young, “Petroleum Refining Process Control and Real-Time
we compared the important features of the tools and simulators, Optimization,” IEEE Control System, vol. 26, no. 6, pp. 73-83, Dec.
including complexity, realistic capability, real-time simulation 2006.
performance and simulated security events. This paper provides [25] M. L. Jørgensen, “Analysis and Enhancement of Safety-Critical
a good reference for doing efficient simulations for security Communication for Railway Systems,” Master Dissertation, Aalborg
studies in control systems. University, Aug. 2008.
REFERENCES
[1] M. Brandle and M. Naedele, “Security for Process Control Systems: An
Overview,” IEEE Security and Privacy, vol. 6, no. 6, pp. 24-29,
Nov./Dec. 2008.
50