UPDF AI

On Developing a Hybrid Cyber-Physical Testbed for Cyber-Secure Industrial Control System

Yogesh Gholap,Prajakta Yeola,Virendra Singh

2025 · DOI: 10.1109/LCIoT64881.2025.11118492
0 Citations

TLDR

This work investigates security attacks in CPS, IoT and ICS and describes techniques to build resilience against them with the help of testbeds, and conducts several cyber-attacks on the testbed to gather real-world data for the development of an Intrusion Detection System (IDS).

Abstract

With the rapid advancement of internet technology, access to the internet has become more widespread, offering improved quality, increased availability, and reduced costs in today's era. This has paved the way for numerous devices to connect and be managed remotely via the internet, forming what is known as the Internet of Things (IoT). Similarly, industrial control systems (ICS) have also benefited from these technological advancements, enabling remote access to entire processes from anywhere in the world. Additionally, Cyber Physical Systems (CPS) have emerged, integrating smart sensing, computing, and control devices through robust and secure networks. However, this interconnectedness presents various security challenges, particularly concerning critical infrastructure (CI). We hereby investigate such security attacks in CPS, IoT and ICS and describe techniques to build resilience against them with the help of testbeds. A cost-effective prototype testbed is developed to mimic the chemical process-automation plant. The proposed testbed incorporates Virtual-Factory environment to achieve a true Hardware-In-Loop (HIL) emulation of real-world factories in cost effective manner. The entire system is controlled using the Codesys based Raspberry-pi which act as pseudo-PLC. The Modbus-TCP protocol is used to communicate between the operator Human Machine Interface (HMI) and the control system. Furthermore, we've conducted several cyber-attacks on the testbed to gather real-world data for the development of an Intrusion Detection System (IDS). These attacks include MITM-based data modification attacks utilizing the Metasploit V6 framework, and de-authentication attacks employing the aircrack-ng tool. Subsequently, the dataset obtained is utilized to train a Random Forest-based IDS model using supervised machine learning techniques.

Cited Papers
Citing Papers