Industrial Control Systems Security Simulation

Welcome to the ICS Security Simulator

This simulation environment demonstrates cybersecurity vulnerabilities and protections across the Purdue Model levels 0-5 using Red Team/Blue Team approaches.

Explore the industrial control system architecture, test attack scenarios, and implement defense strategies in a safe, simulated environment.

Purdue Model for ICS Security

Level 0: Physical Process Level 1: Basic Controls Level 2: Area Control Level 3: Site Operations Level 4: Business Planning Level 5: Enterprise Network

Simulation Environment

Use OpenPLC and ModbusPal to simulate industrial control systems and communications. Configure PLCs, RTUs, sensors, and actuators across all levels of the Purdue Model.

Red Team Attacks

Explore common attack vectors targeting industrial systems, including MITM attacks, protocol tampering, DoS, and unauthorized command execution.

Blue Team Defenses

Implement defensive measures such as intrusion detection, secure communication protocols, robust authentication, and network segmentation.

About the Purdue Model

The Purdue Enterprise Reference Architecture (PERA), or "Purdue Model," is a reference model for enterprise control system integration. It divides industrial control networks into six levels:

  • Level 0: Physical Process - Field devices like sensors and actuators that interact directly with the physical process.
  • Level 1: Basic Controls - PLCs, RTUs, and other controllers that read from sensors and control actuators.
  • Level 2: Area Control - SCADA systems, HMIs, and area supervisory controls.
  • Level 3: Site Operations - Manufacturing Execution Systems (MES), plant-wide operations management.
  • Level 4: Business Planning & Logistics - Enterprise Resource Planning (ERP) systems and production scheduling.
  • Level 5: Enterprise Network - Corporate IT systems with connectivity to the internet and cloud services.

Security Architecture Overview

Comprehensive Security Across All Levels

Our simulation environment implements security controls at every level of the Purdue Model, demonstrating defense-in-depth strategies:

Level Key Security Controls
Level 5 Enterprise Firewalls ModSecurity WAF SpamAssassin
Level 4 Next-Gen Firewalls Snort IDS/IPS SIEM
Level 3 Industrial DMZ Advanced Firewalls Data Diodes
Level 2 Network Firewalls ModSecurity WAF Host-based IDS
Level 1 Controller Firewalls Access Control Lists Integrity Monitoring
Level 0 Serial-to-Ethernet Firewalls Encrypted Protocols Physical Controls