R. Barbosa, R. Sadre, and A. Pras, A first look into SCADA network traffic, Proceedings of the IEEE Network Operations and Management Symposium, pp.518-521, 2012.

H. Christiansson and E. Luiijf, Creating a European SCADA security testbed, pp.237-247, 2007.

, CONPOT: ICS/SCADA Honeypot (conpot. org), 2018.

C. Davis, J. Tate, H. Okhravi, C. Grier, T. Overbye et al., SCADA cyber security testbed development, Proceedings of the ThirtyEighth North American Power Symposium, pp.483-488, 2006.
DOI : 10.1109/naps.2006.359615

O. Depren, M. Topallar, E. Anarim, and M. Ciliz, An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert Systems with Applications, vol.29, issue.4, pp.713-722, 2005.

J. Goh, S. Adepu, K. Junejo, and A. Mathur, A dataset to support research in the design of secure water treatment systems, Proceedings of the Eleventh International Conference on Critical Information Infrastructures Security, pp.88-99, 2016.

A. Hahn and M. Govindarasu, Cyber attack exposure evaluation framework for the smart grid, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.835-843, 2011.

A. Hahn, B. Kregel, M. Govindarasu, J. Fitzpatrick, R. Adnan et al., Development of the PowerCyber SCADA security testbed, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, 2010.

, Information-Technology Promotion Agency, About IPA, 2018.

. Ixia, Test Architecture, 2018.

M. Knauff, J. Mclaughlin, C. Dafis, D. Niebur, P. Singh et al., Simulink model of a lithium-ion battery for the hybrid power system testbed, Proceedings of the ASNE Intelligent Ships Symposium, 2007.

A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, A comparative study of anomaly detection schemes in network intrusion detection, Proceedings of the SIAM International Conference on Data Mining, pp.25-36, 2003.

A. Lemay and J. Fernandez, Providing SCADA network datasets for intrusion detection research, Proceedings of the Ninth USENIX Workshop on Cyber Security Experimentation and Test, 2016.

S. Luders, Control systems under attack? Proceedings of the Tenth International Conference on Accelerator and Large Experimental Physics Control Systems, 2005.

S. Mukkamala, G. Janoski, and A. Sung, Intrusion detection using neural networks and support vector machines, Proceedings of the International Joint Conference on Neural Networks, vol.2, pp.1702-1707, 2002.

, pevma, rule2alert (github.com/pevma/rule2alert), 2014.

, What is pytbull? (pytbull.sourceforge.net), 2018.

N. Rodofile, T. Schmidt, S. Sherry, C. Djamaludin, K. Radke et al., Process control cyber attacks and labeled datasets on S7Comm critical infrastructure, Proceedings of the Twenty-Second Australasian Conference on Information Security and Privacy, Part II, pp.452-459, 2017.

J. Song, H. Takakura, Y. Okabe, M. Eto, D. Inoue et al., Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation, Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.29-36, 2011.

K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and A. Hahn, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, Revision 2, 2015.

J. Wan, A. Canedo, and M. A. Faruque, Security-aware functional modeling of cyber-physical systems, Proceedings of the Twentieth IEEE Conference on Emerging Technologies and Factory Automation, 2015.

J. Yun, S. Jeon, K. Kim, and W. Kim, Burst-based anomaly detection for the DNP3 protocol, International Journal of Control and Automation, vol.6, issue.2, pp.313-324, 2013.

B. Zhu, A. Joseph, and S. Sastry, A taxonomy of cyber attacks on SCADA systems, Proceedings of the International Conference on Internet of Things and Fourth IEEE International Conference on Cyber, pp.380-388, 2011.