Industrial Control Systems Security Simulation
Welcome to the ICS Security Simulator
This simulation environment demonstrates cybersecurity vulnerabilities and protections across the Purdue Model levels 0-5 using Red Team/Blue Team approaches.
Explore the industrial control system architecture, test attack scenarios, and implement defense strategies in a safe, simulated environment.
Purdue Model for ICS Security
Simulation Environment
Use OpenPLC and ModbusPal to simulate industrial control systems and communications. Configure PLCs, RTUs, sensors, and actuators across all levels of the Purdue Model.
Red Team Attacks
Explore common attack vectors targeting industrial systems, including MITM attacks, protocol tampering, DoS, and unauthorized command execution.
Blue Team Defenses
Implement defensive measures such as intrusion detection, secure communication protocols, robust authentication, and network segmentation.
About the Purdue Model
The Purdue Enterprise Reference Architecture (PERA), or "Purdue Model," is a reference model for enterprise control system integration. It divides industrial control networks into six levels:
- Level 0: Physical Process - Field devices like sensors and actuators that interact directly with the physical process.
- Level 1: Basic Controls - PLCs, RTUs, and other controllers that read from sensors and control actuators.
- Level 2: Area Control - SCADA systems, HMIs, and area supervisory controls.
- Level 3: Site Operations - Manufacturing Execution Systems (MES), plant-wide operations management.
- Level 4: Business Planning & Logistics - Enterprise Resource Planning (ERP) systems and production scheduling.
- Level 5: Enterprise Network - Corporate IT systems with connectivity to the internet and cloud services.
Security Architecture Overview
Comprehensive Security Across All Levels
Our simulation environment implements security controls at every level of the Purdue Model, demonstrating defense-in-depth strategies:
Level | Key Security Controls |
---|---|
Level 5 | Enterprise Firewalls ModSecurity WAF SpamAssassin |
Level 4 | Next-Gen Firewalls Snort IDS/IPS SIEM |
Level 3 | Industrial DMZ Advanced Firewalls Data Diodes |
Level 2 | Network Firewalls ModSecurity WAF Host-based IDS |
Level 1 | Controller Firewalls Access Control Lists Integrity Monitoring |
Level 0 | Serial-to-Ethernet Firewalls Encrypted Protocols Physical Controls |