메뉴 건너뛰기




Volumn 253, Issue , 2007, Pages 117-131

Security strategies for SCADA networks

Author keywords

Forensics; SCADA networks; Security services

Indexed keywords


EID: 36249028736     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-75462-8_9     Document Type: Conference Paper
Times cited : (40)

References (21)
  • 1
    • 85052559033 scopus 로고    scopus 로고
    • Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan
    • American Gas Association, No. 12 Part 1, Draft 5, Washington, DC
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC (www.gtiservices.org/security/ AGA12Draft5r3.pdf), 2005.
    • (2005) AGA Report
  • 2
    • 36249015425 scopus 로고    scopus 로고
    • Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications
    • American Gas Association, No. 12 Part 2, Draft, Washington, DC
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC (www.gtiservices.org/security/aga-12p2-draft-0512.pdf), 2005.
    • (2005) AGA Report
  • 3
    • 34047209277 scopus 로고    scopus 로고
    • American Petroleum Institute, Washington, DC
    • American Petroleum Institute, API 1164: SCADA Security, Washington, DC, 2004.
    • (2004) API 1164: SCADA Security
  • 4
    • 84864173616 scopus 로고    scopus 로고
    • A reference model for control and automation systems in electric power
    • Technical Report SAND2005-1000C, Sandia National Laboratories, Albuquerque, New Mexico
    • M. Berg and J. Stamp, A reference model for control and automation systems in electric power, Technical Report SAND2005-1000C, Sandia National Laboratories, Albuquerque, New Mexico, 2005.
    • (2005)
    • Berg, M.1    Stamp, J.2
  • 5
    • 34047192955 scopus 로고    scopus 로고
    • British Columbia Institute of Technology, National Infrastructure Security Co-ordination Centre, London, United Kingdom
    • British Columbia Institute of Technology, Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, National Infrastructure Security Co-ordination Centre, London, United Kingdom, 2005.
    • (2005) Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks
  • 6
    • 36248946167 scopus 로고    scopus 로고
    • E. Byres, J. Carter, A. Elramly and D. Ho.man, Worlds in collision: Ethernet on the plant floor, Proceedings of the ISA Emerging Technologies Conference, 2002.
    • E. Byres, J. Carter, A. Elramly and D. Ho.man, Worlds in collision: Ethernet on the plant floor, Proceedings of the ISA Emerging Technologies Conference, 2002.
  • 9
    • 0025508369 scopus 로고
    • Network security via private key certificates
    • D. Davis and R. Swick, Network security via private key certificates, Operating Systems Review, vol. 24, pp. 64-67, 1990.
    • (1990) Operating Systems Review , vol.24 , pp. 64-67
    • Davis, D.1    Swick, R.2
  • 10
    • 36248992375 scopus 로고    scopus 로고
    • J. Graham and S. Patel, Security considerations in SCADA communication protocols, Technical Report TR-ISRL-04-01, Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2004.
    • J. Graham and S. Patel, Security considerations in SCADA communication protocols, Technical Report TR-ISRL-04-01, Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2004.
  • 11
    • 36249008014 scopus 로고    scopus 로고
    • Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
    • Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
  • 12
    • 36248999413 scopus 로고    scopus 로고
    • Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
    • Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
  • 13
    • 33750422800 scopus 로고    scopus 로고
    • Framework for SCADA security policy
    • Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico
    • D. Kilman and J. Stamp, Framework for SCADA security policy, Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico, 2005.
    • (2005)
    • Kilman, D.1    Stamp, J.2
  • 14
    • 34047234442 scopus 로고    scopus 로고
    • An architecture for SCADA network forensics
    • M. Olivier and S. Shenoi Eds, Springer, New York, pp
    • T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa and S. Shenoi, An architecture for SCADA network forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, New York, pp. 273-285, 2006.
    • (2006) Advances in Digital Forensics II , pp. 273-285
    • Kilpatrick, T.1    Gonzalez, J.2    Chandia, R.3    Papa, M.4    Shenoi, S.5
  • 17
    • 36249020377 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, System Protection Profile - Industrial Control Systems v1.0, Gaithersburg, Maryland, 2004.
    • National Institute of Standards and Technology, System Protection Profile - Industrial Control Systems v1.0, Gaithersburg, Maryland, 2004.
  • 18
    • 33845546517 scopus 로고    scopus 로고
    • Integrating digital forensics in network architectures
    • M. Pollitt and S. Shenoi Eds, Springer, New York, pp
    • K. Shanmugasundaram, H. Bronnimann and N. Memon, Integrating digital forensics in network architectures, in Advances in Digital Forensics M. Pollitt and S. Shenoi (Eds.), Springer, New York, pp. 127-140, 2005.
    • (2005) Advances in Digital Forensics , pp. 127-140
    • Shanmugasundaram, K.1    Bronnimann, H.2    Memon, N.3
  • 20
    • 36248930469 scopus 로고    scopus 로고
    • M. Smith and M. Copps, DNP3 V3.00 Data Object Library Version 0.02, DNP Users Group, Pasadena, California, 1993
    • M. Smith and M. Copps, DNP3 V3.00 Data Object Library Version 0.02, DNP Users Group, Pasadena, California, 1993.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.