This is a video presentation of the DATES exhibit at DistribuTech 2010. The exhibit presented a live, realtime demonstration of the DATES system running on two simulated utility networks.
The video starts with a few slides that explain the scenario of a cyber attacker targeting two utilities. Then, it shows two different attacks. First, a distributed denial-of-service attack is launched against both utilities almost simultaneously. Second, the attacker gains a foothold in the less protected corporate network at Utility 1 and traverses through the networks until reaching the more critical field network and exploiting a trusted link via ICCP to compromise a host at Utility 2.
Note: The Apple QuickTime plugin (or compatible) must be installed.
Back to DATES overview