<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rohan Chabukswar</style></author><author><style face="normal" font="default" size="100%">Bruno Sinopoli</style></author><author><style face="normal" font="default" size="100%">Karsai, Gabor</style></author><author><style face="normal" font="default" size="100%">Annarita Giani</style></author><author><style face="normal" font="default" size="100%">Neema, Himanshu</style></author><author><style face="normal" font="default" size="100%">Andrew Davis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simulation of Network Attacks on SCADA Systems</style></title><secondary-title><style face="normal" font="default" size="100%">First Workshop on Secure Control Systems, Cyber Physical Systems Week 2010</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">04/2010</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.truststc.org/pubs/693.html</style></url></web-urls><related-urls><url><style face="normal" font="default" size="100%">https://archive.isis.vanderbilt.edu/sites/default/files/ScadaSystemsSimulationsUsingC2WT.pdf</style></url></related-urls></urls><abstract><style face="normal" font="default" size="100%">Network security is a major issue affecting SCADA systems designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in several domains and simulation environments. Here we demon- strate the use of C2WindTunnel to simulate a plant and its controller, and the Ethernet network that connects them, in different simulation environments. We also simulate DDOS-like attacks on a few of the routers to observe and analyze the effects of a network attack on such a system.</style></abstract></record></records></xml>