we need a simulator to support our below thesis. we would use sort of ' cisco packet tracer ' or like that.
Creating a simulator SCADA Network security system on a software to prove the best way to prevent organized bulk cyber attacks.
Project created need to take non professional video record while doing that. the aim of video to learn how you do that. then I will do practice from my end to lear it better. also you need to write a tech report regarding how it works and aims of the simulator.
The SCADA Cyber-security Framework
To a great extent, the cyber-attacks countermeasures have primarily majored in protecting the systems from external intrusions such as incoming traffic substations, corporate networks as well as the control centers through the use of firewalls and IDSs (Liaropoulos, 2016). The countermeasures however ignore rudimental interior substation interior design and only focus on the defense parameters. In order to curb the gap, a SCADA Cyber-security model whose basis is on the SCADA-IDS will be proposed.
Figure 1. A multi-layer SCADA cyber-security model using IDS
Intrusion detection methods in the Information Technology domain has relatively grown and many intrusion detection mechanisms have been presented in the presentation gave a distribution IDS for wireless mesh networks which uses smart grids which however has the least relations with the SCADA environment. The SCADA IDSs have been introduced using a statistical approach with classification of network traffics into two tiers; the normal and the abnormal. The system in proposal however has an enclave basis in which the defense parameter attacks that come from the outside and within have been co-op using a multi-tier SCADA-IDSs scheme.
Compared to the conventional Information technology networks, the SCADA-IDS system incorporates distinguished features such as the use of packets, a definite number of devices for communication, definite communication protocols and the regular behavior patterns and communication. It contains the security information and event management mechanisms in the security operation centres, those with the responsibilities of securing the computer networks at the enterprise level and the even the SCADA level. The security operation centre may include the correlation and intelligent capabilities to manage large scale cyber-attacks (Miller et al, 2010).
Figure 2. The SCADA security system
The Security Information and Event Management system will ensure real-time monitoring of computer networks, log management and the security event of a broad range of the management systems (Miller et al, 2010). Essentially, the SIEM allows threat detection either from organized groups or individual persons at an early stage by monitoring the threats from log events and early indicators of threats to computer networks.
I can design whatever network you like using the network simulator Cisco packet tracer but I would like you to explain better what are the requirements for the network and we can make a good one for what you need.