scispace - formally typeset
Search or ask a question
Author

Chun Lei Wang

Bio: Chun Lei Wang is an academic researcher from Tsinghua University. The author has contributed to research in topics: SCADA & Static program analysis. The author has an hindex of 2, co-authored 3 publications receiving 77 citations.

Papers
More filters
Proceedings ArticleDOI
13 Mar 2010
TL;DR: This simulation environment has the characteristics of extensibilities and adaptability, and integrated several components including the simulated enterprise network, OPC Client/HMI, industrial OPC server, SCADA protocol tester, and the sensors and actuators, etc.
Abstract: Simulation experiment is an important means of analyzing and assessing the security of SCADA (Supervisory Control and Data Acquisition) system, however, the existing simulation environments have some limitations in flexibility and extensibility. According to the type of industrial infrastructure and the structure of SCADA system, the abstract models of SCADA system are established, the reference architecture of SCADA system simulation environment is proposed, and the simulation environment for analyzing and assessing the security of SCADA system is designed and implemented. This simulation environment has the characteristics of extensibilities and adaptability, and integrated several components including the simulated enterprise network, OPC Client/HMI, industrial OPC server, SCADA protocol tester, SCADA RTUs, and the sensors and actuators, etc. Finally, experiment on the representative SCADA system attack scenario of has been conducted in this simulation environment to analyze and assess their security status, and the results demonstrate the effectiveness and practicability of the simulation environment.

80 citations

Journal ArticleDOI
Chun Lei Wang1, Dong Xia Wang, Qing Miao, Liang Ming, Lan Fang, Yi Qi Dai1 
22 Feb 2013
TL;DR: The survivability characteristics of the network can be measured and evaluated based on the analyzed information based onThe proposed immune evolutionary algorithm for network survivability metric weight solving and network Survivability evaluation method using multiple criteria decision making.
Abstract: Network survivability has the characteristics of complexity, dynamic evolution and uncertainty, which has become one of the most important factors for analyzing and evaluating network performance. Network survivability analysis and evaluation is a process of analyzing and quantifying the degree to which network system can survive in network threats. This paper proposes a novel network survivability analysis and evaluation model.Firstly, network survivability is abstracted as a dynamic game process among network attacker, network defender and normal user, thereafter network survivability evolutionary game model is established and network survivability analysis algorithm is proposed based on the game model. Secondly, the survivability characteristics of the network can be measured and evaluated based on the analyzed information based on the proposed immune evolutionary algorithm for network survivability metric weight solving and network survivability evaluation method using multiple criteria decision making. Finally, the proposed network survivability analysis and evaluation model is experimented in a typical network environment and the correctness and effectiveness of the model is validated through experimental analysis.

2 citations

Journal ArticleDOI
TL;DR: A framework for ICS malicious code analysis is presented and the ICS attack graph model is established based upon the hierarchical structure of industrial control system and the suffered security threats, which formalizes the attack process of I CS malicious code.
Abstract: industrial Control System (ICS) performs the tasks of supervisory control and data acquisition of critical infrastructures. With the widely application of computer and network techniques, ICS suffers serious security threats, and malicious codes are one of the most serious security problems. However, there is absent of analysis methods specific for ICS malicious code behaviors in current times. In this paper, a framework for ICS malicious code analysis is presented. Firstly, the ICS attack graph model is established based upon the hierarchical structure of industrial control system and the suffered security threats, which formalizes the attack process of ICS malicious code. Secondly, the runtime information of ICS malicious code is detected and collected for analyzing and assessing the attack behaviors and the resulted impacts. Finally, the ICS simulation environment for malicious code analysis is constructed based upon the framework and the experimental analysis of ICS malicious code is performed which preliminary validates the effectiveness of the proposed framework.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A model-based intrusion detection system designed specifically for Modbus/TCP networks that successfully flagged real anomalies that were caused by technicians who were troubleshooting the HMI system and helped identify a PLC that was configured incorrectly.

268 citations

Journal ArticleDOI
TL;DR: This paper surveys the latest methodologies and research for measuring and managing industrial-control-system-specific security metrics and introduces the "functional assurance" concept to deal with fail-safe and fail-secure industrial control system operations.

219 citations

Proceedings ArticleDOI
22 May 2018
TL;DR: This work presents a framework that allows users to create and execute digital twins, closely matching their physical counterparts, and focuses on a novel approach to automatically generate the virtual environment from specification, taking advantage of engineering data exchange formats.
Abstract: Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully functional, virtual replica of a CPS can also play an important role in securing the system. In this work, we present a framework that allows users to create and execute digital twins, closely matching their physical counterparts. We focus on a novel approach to automatically generate the virtual environment from specification, taking advantage of engineering data exchange formats. From a security perspective, an identical (in terms of the system's specification), simulated environment can be freely explored and tested by security professionals, without risking negative impacts on live systems. Going a step further, security modules on top of the framework support security analysts in monitoring the current state of CPSs. We demonstrate the viability of the framework in a proof of concept, including the automated generation of digital twins and the monitoring of security and safety rules.

104 citations

Book ChapterDOI
19 Oct 2015
TL;DR: This study surveys ICS testbeds that have been proposed for scientific research and finds that most aim to facilitate vulnerability analysis, education and tests of defense mechanisms.
Abstract: Conducting security tests such as vulnerability discovery within Industrial Control Systems (ICS) help reduce their vulnerability to cyber attacks. Unfortunately, the extreme availability requirements on ICS in operation make it difficult to conduct security tests in practice. For this reason, researchers and practitioners turn to testbeds that mimic real ICS. This study surveys ICS testbeds that have been proposed for scientific research. A total of 30 testbeds are identified. Most of these aim to facilitate vulnerability analysis, education and tests of defense mechanisms. Testbed components are typically implemented as simulation models. Testbed fidelity is rarely addressed, and at best briefly discussed.

95 citations

Journal ArticleDOI
TL;DR: This work discusses the major works, from industry and academia towards the development of the secure ICSs, especially applicability of the machine learning techniques for the ICS cyber-security and may help to address the challenges of securing industrial processes, particularly while migrating them to the cloud environments.

90 citations