{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T19:58:13Z","timestamp":1778788693659,"version":"3.51.4"},"reference-count":259,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Cariparo Foundation"},{"name":"Yarix S.r.l"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2021.3094360","type":"journal-article","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T19:59:11Z","timestamp":1625255951000},"page":"2248-2294","source":"Crossref","is-referenced-by-count":211,"title":["A Survey on Industrial Control System Testbeds and Datasets for Security Research"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7050-9369","authenticated-orcid":false,"given":"Denis","family":"Donadel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5660-2447","authenticated-orcid":false,"given":"Federico","family":"Turrin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref170","year":"2021","journal-title":"CRATE&#x2014;Cyber Range and Training Environment"},{"key":"ref172","year":"2020","journal-title":"Common Open Research Emulator (CORE)"},{"key":"ref171","year":"2020","journal-title":"OMNeT++ Discrete Event Simulator An Extensible Modular Component-Based C++ Simulation Library and Framework Primarily for Building Network Simulators"},{"key":"ref174","year":"2020","journal-title":"Opnet Network Simulator"},{"key":"ref173","year":"2020","journal-title":"EPANET Application for Modeling Drinking Water Distribution Systems"},{"key":"ref176","year":"2020","journal-title":"Getting Started with S7-PLCSIM Advanced and Simulation Tables"},{"key":"ref175","year":"2020","journal-title":"NetToPLCsim&#x2014;Network Extension for Plcsim"},{"key":"ref178","year":"2021","journal-title":"CyberCity SANS Holiday Hack 2013 Dataset"},{"key":"ref177","year":"2021","journal-title":"CyberCity Allows Government Hackers to Train for Attacks"},{"key":"ref168","first-page":"139","article-title":"Mininet as software defined networking testing platform","author":"kaur","year":"2014","journal-title":"Proc Int Conf Commun Comput Syst (ICCCS)"},{"key":"ref169","first-page":"119","author":"thornton","year":"2015","journal-title":"Enhancing a Virtual SCADA Laboratory Using Simulink"},{"key":"ref39","article-title":"Overview of DNP3 security version 6","year":"2020"},{"key":"ref38","article-title":"DNP3 overview, revision 1.2","year":"2002"},{"key":"ref33","year":"2021","journal-title":"Service Name and Transport Protocol Port Number Registry"},{"key":"ref32","first-page":"15","volume":"66","author":"sullivan","year":"2016","journal-title":"Components of Industrial Control Systems"},{"key":"ref31","year":"2021","journal-title":"Promotic Software"},{"key":"ref30","author":"obregon","year":"2014","journal-title":"InfoSec Reading Room Secure Architecture for Industrial Control Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107583"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/sym7031176"},{"key":"ref35","article-title":"MODBUS\/TCP security, protocol specification, V21","year":"2018"},{"key":"ref34","article-title":"Modbus application protocol specification, V1.1b3","year":"2012"},{"key":"ref181","year":"2020","journal-title":"November 2019&#x2014;TOP500 Supercomputer Sites"},{"key":"ref180","year":"2020","journal-title":"SUMMIT Oak Ridge National Laboratory&#x2019;s 200 petaflop supercomputer"},{"key":"ref185","year":"2021","journal-title":"Fischertechnik&#x2014;The Fischertechnik Learning Environment Is Used for Learning and Understanding Industry 4 0 Applications"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6437-8"},{"key":"ref183","year":"2021","journal-title":"OSISoft"},{"key":"ref182","year":"2020","journal-title":"Teach Learn and Make with Raspberry Pi"},{"key":"ref189","author":"maynor","year":"2011","journal-title":"Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability Research"},{"key":"ref188","year":"2020","journal-title":"Arion Simplifying Models for Controls Research"},{"key":"ref187","year":"2020","journal-title":"PNNL Control Testbed"},{"key":"ref186","year":"2020","journal-title":"Tesim on Github"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2987688"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101677"},{"key":"ref179","year":"2020","journal-title":"Simulink Coder Generate C and C++ Code from Simulink and Stateflow Models"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2594178"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/569\/4\/042030"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2627399"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926441"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05849-4_12"},{"key":"ref26","article-title":"ICS testbed tetris: Practical building blocks towards a cyber security resource","author":"green","year":"2020","journal-title":"Proc 13th USENIX Workshop Cyber Security Exp Test"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2020.1843822"},{"key":"ref50","first-page":"1439","article-title":"Research on OPC UA security","author":"renjie","year":"2010","journal-title":"Proc 5th IEEE Conf Ind Electron Appl (ICIEA)"},{"key":"ref51","author":"clarke","year":"2004","journal-title":"Practical Modern SCADA Protocols DNP3 60870 5 and Related Systems"},{"key":"ref154","year":"2021","journal-title":"SWaT_Simulator"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"ref156","year":"2021","journal-title":"WUSTL-IIOT-2018 Dataset for ICS (SCADA) Cybersecurity Research"},{"key":"ref155","first-page":"88","author":"goh","year":"2017","journal-title":"A Dataset to Support Research in the Design of Secure Water Treatment Systems"},{"key":"ref150","author":"morris","year":"2020","journal-title":"Industrial control system (ics) cyber attack datasets"},{"key":"ref152","first-page":"88","article-title":"A dataset to support research in the design of secure water treatment systems","author":"goh","year":"2016","journal-title":"Proc Int Conf Crit Inf Infrastruct Security"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2017.06.001"},{"key":"ref146","author":"eide","year":"2010","journal-title":"Toward replayable research in networking and systems"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3405447"},{"key":"ref148","author":"shin","year":"2020","journal-title":"IL-Based Augmented ICS (HAI) Security Dataset"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795340"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958284"},{"key":"ref58","author":"carlsson","year":"2021","journal-title":"Industrial network market shares 2020 according to hms networks"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2018.8551422"},{"key":"ref56","year":"2020","journal-title":"BACnet"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.026"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2956734"},{"key":"ref53","author":"baigent","year":"2013"},{"key":"ref52","first-page":"30","article-title":"Towards understanding man-in-the-middle attacks on IEC 60870-5-104 SCADA networks","author":"maynard","year":"2014","journal-title":"Proc ICS-CSR"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ReTIS.2011.6146884"},{"key":"ref167","year":"2020","journal-title":"Oracle VM VirtualBox A Powerful x86 and AMD64\/Intel64 Virtualization Product for Enterprise as Well as Home Use"},{"key":"ref166","year":"2021","journal-title":"AdvancedHMI Software"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2014.6970342"},{"key":"ref164","year":"2020","journal-title":"Matlab\/Simulink - Simulation and Model-Based Design"},{"key":"ref163","year":"2020","journal-title":"Emulab A Time- and Space-Shared Platform for Research Education and Development in Distributed Systems and Networks"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1097\/00000637-199706000-00002"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(94)00057-U"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706065544"},{"key":"ref4","author":"filkins","year":"2019","journal-title":"Sans 2019 state of ot\/ics cybersecurity survey"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"ref5","author":"neitzel","year":"2014","journal-title":"Top ten differences between ICS and IT cybersecurity"},{"key":"ref8","year":"2021","journal-title":"Israeli Test on Worm Called Crucial in Iran Nuclear Delay"},{"key":"ref159","year":"2020","journal-title":"PowerWorld-The Visual Approach to Electric Power Systems"},{"key":"ref7","first-page":"1","article-title":"W32. Stuxnet dossier, symantec security response, version 1.4","volume":"4","author":"falliere","year":"2011","journal-title":"Symantec Security Response"},{"key":"ref49","article-title":"Security implications of OPC, OLE, DCOM, and RPC in control systems","author":"rolston","year":"2006"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref9","article-title":"BlackEnergy&#x2014;Malware for cyber-physical attacks","author":"shrivastava","year":"2016"},{"key":"ref158","year":"2020","journal-title":"SUTD-MIT International Design Centre (IDC) Water Distribution (WADI) Testbed"},{"key":"ref46","author":"schiffer","year":"2016","journal-title":"The Common Industrial Protocol (CIP) and the Family of CIP Networks"},{"key":"ref45","article-title":"Security extensions for PROFINET&#x2014;PI white paper for PROFINET, version 1.05","year":"2019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8050510"},{"key":"ref47","year":"2020","journal-title":"CIP Secuirty"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2014.1169"},{"key":"ref41","first-page":"227","article-title":"DNPSec: Distributed network protocol version 3 (DNP3) security framework","author":"majdalawieh","year":"2007","journal-title":"Advances in Computer Information and Systems Sciences and Engineering"},{"key":"ref44","article-title":"PROFINET system description&#x2014;Technology and application","year":"2014"},{"key":"ref43","article-title":"The spear to break the security wall of S7CommPlus","author":"lei","year":"0"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018988"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2015.7335093"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3295453.3295456"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12330-7_14"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287188"},{"key":"ref77","year":"2020","journal-title":"Epic Testbed"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2599841"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.49"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.111"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM49955.2020.00064"},{"key":"ref60","article-title":"Generating attacks and labelling attack datasets for industrial control intrusion detection systems","author":"rodofile","year":"2013"},{"key":"ref62","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc LISA"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2019.01.002"},{"key":"ref63","year":"2021"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718794615"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3362743.3362961"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994492"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732200"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556732"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2018.11.008"},{"key":"ref198","author":"rodofile","year":"2020","journal-title":"SCADA Network Attack Datasets and Process Logs"},{"key":"ref199","first-page":"452","author":"rodofile","year":"2017","journal-title":"Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2019.8805036"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969"},{"key":"ref195","year":"2020","journal-title":"iTrust Centre for Research in Cyber Security Singapore University of Technology and Design iTrust Labs Dataset Info"},{"key":"ref196","year":"2020","journal-title":"Batadal Datasets"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415818"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.82"},{"key":"ref190","first-page":"65","article-title":"Industrial control system traffic data sets for intrusion detection research","volume":"441","author":"morris","year":"2014","journal-title":"IFIP Advances in Information and Communication Technology"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179357"},{"key":"ref191","year":"2021","journal-title":"The Weka Machine Learning Workbench"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8089"},{"key":"ref192","first-page":"8","article-title":"Providing SCADA network data sets for intrusion detection research","author":"lemay","year":"2016","journal-title":"Proc 9th USENIX Workshop Cyber Security Experimentation Test"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.05678"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE.2013.6646862"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eie.25.5.24361"},{"key":"ref99","first-page":"13","article-title":"Industrial control systems security testbed","author":"korkmaz","year":"2016","journal-title":"Proc 11th Annu Symp Inf Assurance"},{"key":"ref96","first-page":"5","article-title":"The virtual power system testbed and inter-testbed integration","author":"bergman","year":"2009","journal-title":"Proc 2nd Workshop Cyber Security Experimentation Test"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018984"},{"key":"ref82","year":"2020","journal-title":"Hydra Testbed Repository"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2016.7593605"},{"key":"ref84","author":"kaouk","year":"2018","journal-title":"A Testbed for Cybersecurity Assessment of Industrial and IoT-Based Control Systems"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2015.7158687"},{"key":"ref80","first-page":"1","article-title":"ICS interaction testbed: A platform for cyber-physical security research","author":"henry","year":"2019","journal-title":"Proc ICS-CSR"},{"key":"ref89","year":"2021","journal-title":"LegoSCADA Testbed"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756901"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808707"},{"key":"ref87","first-page":"1026","article-title":"KYPO4INDUSTRY: A testbed for teaching cybersecurity of industrial control systems","author":"?eleda","year":"2020","journal-title":"Proc 51st ACM Tech Symp Comput Sci Educ"},{"key":"ref88","first-page":"3","article-title":"Security of cyber-physical systems","author":"rubio-hernan","year":"2016","journal-title":"Proc Int Workshop Security Ind Control Syst Cyber-Phys Syst"},{"key":"ref200","author":"rodofile","year":"2020","journal-title":"SCADA Network Attack Datasets and Process Logs"},{"key":"ref101","year":"2021","journal-title":"Electric power and intelligent control (epic) testbed"},{"key":"ref100","first-page":"37","author":"adepu","year":"2018","journal-title":"EPIC An Electric Power Testbed for Research and Training in Cyber Physical Systems Security"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232818"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.105"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65172-9_11"},{"key":"ref201","year":"2020","journal-title":"ICS Lab 4SICS ICS Lab PCAP File"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/AUPEC.2018.8757940"},{"key":"ref207","author":"sadre","year":"2020","journal-title":"HVAC Traces"},{"key":"ref208","author":"lemay","year":"2020","journal-title":"Modbus Dataset From CSET 2016"},{"key":"ref205","year":"2020","journal-title":"Dataset for Cybersecurity Research in Industrial Control Systems"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100385"},{"key":"ref211","author":"fraz\u00e3o","year":"2020","journal-title":"Modbus TCP SCADA #1 Dataset"},{"key":"ref210","first-page":"230","author":"fraz\u00e3o","year":"2019","journal-title":"Denial of service attacks Detecting the frailties of machine learning algorithms in the classification process"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST49295.2020.9200287"},{"key":"ref213","author":"peterson","year":"2020","journal-title":"Digital Bond S4X15 ICS Village CTF PCAP Files"},{"key":"ref214","first-page":"1","article-title":"Machine learning for power system disturbance and cyber-attack discrimination","author":"hink","year":"2014","journal-title":"Proc 7th Int Symp Resilient Control Syst"},{"key":"ref215","year":"2021","journal-title":"Dataset Characteristics"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.002"},{"key":"ref217","author":"myers","year":"2020","journal-title":"QUT_S7 Communication Dataset"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3073017"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1016\/j.watres.2018.03.039"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS50894.2020.00034"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427660"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427660"},{"key":"ref229","first-page":"1","article-title":"HAI 1.0: Hil-based augmented ICS security dataset","author":"shin","year":"2020","journal-title":"Proc 13th USENIX Workshop Cyber Security Experimentation Test"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50017-9"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2420951"},{"key":"ref224","first-page":"174","article-title":"A specification-based intrusion detection framework for cyber-physical environment in electric power system","volume":"17","author":"pan","year":"2015","journal-title":"Int J Netw Security"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"ref127","first-page":"2614","article-title":"An event buffer flooding attack in dnp3 controlled scada systems","author":"jin","year":"2011","journal-title":"Proceedings of the Winter Simulation Conference (WSC"},{"key":"ref126","author":"formby","year":"2021","journal-title":"Grfics"},{"key":"ref125","first-page":"1","article-title":"Lowering the barriers to industrial control system security with GRFICS","author":"formby","year":"2018","journal-title":"Proc USENIX Workshop Adv Security Educ"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/1399583.1399587"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2219-z"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2017.8323960"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2018.11"},{"key":"ref133","year":"2020","journal-title":"MiniCPS A Framework for Cyber-Physical Systems Real-Time Simulation Built on Top of Mininet"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0164-7"},{"key":"ref131","author":"maynard","year":"2020","journal-title":"ICS Testbed Framework"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808715"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04363-x"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851799"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC49280.2020.9152334"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.04.004"},{"key":"ref234","first-page":"257","article-title":"Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures","volume":"43","author":"mansouri","year":"2018","journal-title":"Int J Comput Appl"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2879"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2016.7882610"},{"key":"ref135","first-page":"219","article-title":"RICS-el: Building a national testbed for research and training on SCADA security (short paper)","author":"almgren","year":"2018","journal-title":"Proc Int Conf Crit Inf Infrastruct Security"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2162432"},{"key":"ref137","year":"2021","journal-title":"SCADA-SST&#x2014;SCADA Security Testbed"},{"key":"ref139","author":"carlos","year":"2020","journal-title":"Scadasim on Github"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761301"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245683"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2011.5759169"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2010.603"},{"key":"ref2","article-title":"Guide to industrial control systems (ICS) security, revision 2","author":"stouffer","year":"2015"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/3338499.3357355"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00024-0_11"},{"key":"ref145","first-page":"16","article-title":"An experimentation workbench for replayable networking research","author":"eide","year":"2007","journal-title":"Proc NSDI"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264890"},{"key":"ref242","first-page":"1","article-title":"Time is of the essence: Machine learning-based intrusion detection in industrial time series data","author":"anton","year":"2018","journal-title":"Proc IEEE Int Conf Data Min Workshops (ICDMW)"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/BSC.2018.8494686"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/26.103043"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1145\/3411498.3419961"},{"key":"ref247","year":"2020","journal-title":"SUTD Security Showdown 2017"},{"key":"ref246","year":"2020","journal-title":"Nmap the Network Mapper&#x2014;Free Security Scanner"},{"key":"ref245","author":"bond","year":"2020","journal-title":"Quickdraw Snort"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"ref109","year":"2020","journal-title":"Cx-270322 Idaho National Laboratory (INL) Smart Grid Test Bed Revision 2"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechnology.2013.6579516"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852690"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179327"},{"key":"ref105","year":"2021","journal-title":"Low-cost ICS Testbed Github Repository"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/icscsr19.1"},{"key":"ref103","first-page":"4","article-title":"Pains, gains and PLCs: Ten lessons from building an industrial control systems testbed for security research","author":"green","year":"2017","journal-title":"Proc 10th USENIX Workshop Cyber Security Experimentation Test"},{"key":"ref102","first-page":"1","article-title":"Implementation of programmable CPS testbed for anomaly detection","author":"shin","year":"2019","journal-title":"Proc 12th USENIX Workshop Cyber Security Experimentation Test"},{"key":"ref111","year":"2021","journal-title":"Secure water treatment (SWaT) testbed"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.3390\/fi10080076"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"ref254","article-title":"ICS security related working groups, standards and initiatives for the report: Good practices for an EU ICS testing","year":"2013"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102388"},{"key":"ref252","year":"2020"},{"key":"ref253","year":"2009"},{"key":"ref257","first-page":"1","article-title":"Imbalanced dataset classification and solutions: A review","volume":"5","author":"ramyachitra","year":"2014","journal-title":"International Journal of Computing and Business Research"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587389"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1065"},{"key":"ref10","first-page":"1","article-title":"TRITON: The first ICS cyber attack on safety instrument systems understanding the malware, its communications and its OT payload","author":"pinto","year":"2018","journal-title":"Proc Black Hat USA"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00146"},{"key":"ref11","year":"2016","journal-title":"Threat landscape for industrial automation systems in the second half of 2016"},{"key":"ref12","author":"barbieri","year":"2020","journal-title":"Assessing the use of insecure ICS protocols via IXP network traffic analysis"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110256"},{"key":"ref14","year":"2021","journal-title":"The Cost of OT Cybersecurity Incidents and How to Reduce Risk"},{"key":"ref15","year":"2021","journal-title":"IBM study Businesses more likely to pay ransomware than consumers"},{"key":"ref16","year":"2021","journal-title":"Ransomware Costs Double in Q4 as Ryuk Sodinokibi Proliferate"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2006.359615"},{"key":"ref17","year":"2021","journal-title":"Ekans Ransomware and ICS Operations"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891261"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26502-5_2"},{"key":"ref19","first-page":"237","article-title":"Creating a European SCADA security testbed","volume":"253","author":"christiansson","year":"2008","journal-title":"IFIP Advances in Information and Communication Technology"},{"key":"ref119","author":"krotofil","year":"2015","journal-title":"Rocking the pocket book Hacking chemical plants for competition and extortion"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2010.5514494"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2300099"},{"key":"ref115","year":"2021","journal-title":"Water distribution testbed (WADI)"},{"key":"ref120","year":"2021","journal-title":"DVCP-TE"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2014.7017178"},{"key":"ref122","first-page":"1","article-title":"Industrial control system simulation and data logging for intrusion detection system research","author":"morris","year":"2015","journal-title":"Proc 7th Annu Southeastern Cyber Security Summit"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.06.015"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9621320\/09471765.pdf?arnumber=9471765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:26Z","timestamp":1652194346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9471765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":259,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2021.3094360","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}