Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to the Interactive Agenda for the 2017 Singapore ICS Cyber Security Conference! (View the full Singapore Conference website here)  

Register now to grab a spot at the premier ICS cyber security event for key stakeholders in the APAC region.
View analytic
Wednesday, April 26 • 09:40 - 10:15
Securing SWaT and Beyond

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.

In this talk we describe the Secure Water Treatment (SWaT) testbed at the iTrust Centre for Research in Cybersecurity (Singapore University of Technology and Design). SWaT is a testbed built to design, implement and test advanced ICS security mechanisms on a realistic setting, operating since 2015. We will share ongoing research efforts to detect and mitigate attacks to SWaT. We will also introduce two new testbeds on water distribution (WADI) and electric power grid (EPIC).

Background

SWaT Architecture - SWaT consists of a modern six-stage process. The process begins by taking in raw water, adding necessary chemicals to it, filtering it via an Ultrafiltration (UF) system, de-chlorinating it using UV lamps, and then feeding it to a Reverse Osmosis (RO) system. A backwash process cleans the membranes in UF using the water produced by RO. The cyber portion of SWaT consists of a layered communications network, Programmable Logic Controllers (PLCs), Human Machine Interfaces (HMIs), Supervisory Control and Data Acquisition  (SCADA) workstation, and a Historian. Data from sensors is available to the SCADA system and recorded by the Historian for subsequent analysis.

Research

  • In the first phase of this research, models of SWaT will be created using advanced tools such as LabView and Simulink. Models so created will be used to conduct initial experiments aimed at understanding the response of SWaT to a variety of cyber attacks. Attacks by insiders and outsiders will be considered. This first round of experiments will lead to an understanding of the strengths and weaknesses of the existing defense mechanism in SWaT.
  • In the second stage, a small set of cyber attacks will be tried in the testbed using carefully designed experiments that ensure no damage to the physical system. Such experiments are aimed at verifying whether that what is learnt in simulation applies to the physical testbed. These experiments will lead to an understanding of the weaknesses of the defense mechanism of SWaT.
  • The third stage is expected to lead to enhancement of the defence mechanism using a redesign of the hardware and updated PLC and SCADA software. The redesigned defence mechanism will then be tested against a variety of attacks in the updated simulation model and the testbed.

Speakers
avatar for Martin Ochoa

Martin Ochoa

iTrust Centre for Research in Cybersecurity, Singapore University of Technology and Design
Martín studied Systems Engineering (San José, CR) and Mathematics (Rome). He continued his math studies in Munich (LMU, M.Sc.). Afterwards he completed a PhD in Computer Science (TU Dortmund). Before joining SUTD, he was a post-doc at the Chair for Software Engineering of the TU... Read More →



Wednesday April 26, 2017 09:40 - 10:15
Atrium Ballroom 4th Floor

Attendees (5)