{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:50:47Z","timestamp":1725871847280},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319495798"},{"type":"electronic","value":"9783319495804"}],"license":[{"start":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T00:00:00Z","timestamp":1479945600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49580-4_11","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T10:54:04Z","timestamp":1479898444000},"page":"114-123","source":"Crossref","is-referenced-by-count":3,"title":["Design and Architecture of an Industrial IT Security Lab"],"prefix":"10.1007","author":[{"given":"Steffen","family":"Pfrang","sequence":"first","affiliation":[]},{"given":"J\u00f6rg","family":"Kippe","sequence":"additional","affiliation":[]},{"given":"David","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Haas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"11_CR1","unstructured":"Bray, R., Cid, D., Hay, A.: OSSEC Host-Based Intrusion Detection Guide. Syngress (2008)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental). Internet Engineering Task Force, March 2007. http:\/\/www.ietf.org\/rfc\/rfc4765.txt","DOI":"10.17487\/rfc4765"},{"key":"11_CR3","unstructured":"Festo AG & Co. KG. Festo Didactic (2016). http:\/\/www.festo-didactic.com\/ . Accessed 01 February 2016"},{"key":"11_CR4","unstructured":"Proxmox Server Solutions GmbH. Open Source Virtualization (2016). https:\/\/www.proxmox.com\/en\/ . Accessed 01 February 2016"},{"key":"11_CR5","unstructured":"Industrial Inernet Consortium (IIC). Industrial Inernet Consortium Testbeds (2016). http:\/\/www.iiconsortium.org\/test-beds.htm . Accessed 01 February 2016"},{"key":"11_CR6","unstructured":"International Society of Automation. International Society of Automation Hands-on Training (2016). https:\/\/www.isa.org\/training-certifications\/isa-training\/about-isa-training\/hands-on-laboratories\/ . Accessed 01 February 2016"},{"key":"11_CR7","unstructured":"Johnson, R.E.: Survey of SCADA security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1\u20135 (2010)"},{"key":"11_CR8","unstructured":"Labs Network Industrie 4.0. Labs Network Industrie 4.0 Testbeds (2016). http:\/\/lni40.de\/ . Accessed 01 February 2016"},{"key":"11_CR9","unstructured":"OPC Foundation. OPC Unified Architecture (2016). https:\/\/opcfoundation.org\/ . Accessed 01 February 2016"},{"key":"11_CR10","unstructured":"pfSense. Open Source Security (2016). https:\/\/www.pfsense.org\/ . Accessed 01 February 2016"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Tritschler, M., Ericsson, G.N.: Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs. IEEE Trans. Power Delivery 26(1), 161\u2013172 (2011). doi: 10.1109\/TPWRD.2010.2061872 . ISSN: 0885-8977","DOI":"10.1109\/TPWRD.2010.2061872"},{"key":"11_CR12","unstructured":"Roesch, M., et al.: Snort: lightweight intrusion detection for networks. In: LISA, vol. 99(1), pp. 229\u2013238 (1999)"},{"key":"11_CR13","unstructured":"SANS. Assessing and Exploiting Control Systems (2016). http:\/\/www.sans.org\/course\/pentesting-smartgrid-scada . Accessed 01 February 2016"},{"key":"11_CR14","unstructured":"SANS. Critical Infrastructure and Control System Cybersecurity (2016). http:\/\/www.sans.org\/course\/critical-infrastructure-csc . Accessed 01 February 2016"},{"key":"11_CR15","unstructured":"Proxmox Server Solutions. Open vSwitch (2016). http:\/\/openvswitch.org\/ . Accessed 01 February 2016"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Testbeds and Research Infrastructures for the Development of Networks and Communities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49580-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T22:07:27Z","timestamp":1568585247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49580-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,24]]},"ISBN":["9783319495798","9783319495804"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49580-4_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016,11,24]]}}}