메뉴 건너뛰기




Volumn 4, Issue 1, 2011, Pages 41-53

An integrated framework for control system simulation and regulatory compliance monitoring

Author keywords

Compliance; Regulations; SCADA simulation

Indexed keywords

ACTUAL SYSTEM; COMPLIANCE; COMPLIANCE MONITORING; CONTROL SYSTEM SIMULATIONS; COORDINATED ATTACK; CYBER SECURITY; DESIGN DECISIONS; INTEGRATED FRAMEWORKS; LEGACY CONTROL SYSTEMS; NEAR-REAL TIME; OPERATIONAL IMPACTS; OPERATIONAL SEMANTICS; REGULATIONS; REGULATORY REQUIREMENTS; SCADA SIMULATION; SECURITY CONTROLS;

EID: 79954421663     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2011.03.002     Document Type: Article
Times cited : (18)

References (35)
  • 1
    • 79954423893 scopus 로고    scopus 로고
    • BBC News, Stuxnet worm hits Iran nuclear plant staff computers, September 26
    • BBC News, Stuxnet worm hits Iran nuclear plant staff computers, September 26, 2010. http://www.bbc.co.uk/news/world-middle-east-11414483.
    • (2010)
  • 2
    • 79251619734 scopus 로고    scopus 로고
    • Siemens: stuxnet worm hit industrial systems
    • McMillan Robert Siemens: stuxnet worm hit industrial systems. Computerworld 2010, http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security%26taxonomyId=142.
    • (2010) Computerworld
    • McMillan, R.1
  • 3
    • 79954420833 scopus 로고    scopus 로고
    • W32. Stuxnet Dossier, Version 1.3, November. URL: (accessed on: 14.01.10).
    • N. Falliere, L.O. Murchu, E. Chien, W32. Stuxnet Dossier, Version 1.3, November 2010. URL: (accessed on: 14.01.10). http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
    • (2010)
    • Falliere, N.1    Murchu, L.O.2    Chien, E.3
  • 4
    • 79954420516 scopus 로고    scopus 로고
    • Krutz, Securing SCADA systems, Wiley Publishing, Indianapolis, Indiana.
    • Ronald L. Krutz, Securing SCADA systems, 2006 Wiley Publishing, Indianapolis, Indiana.
    • (2006)
    • Ronald, L.1
  • 5
    • 79954414974 scopus 로고    scopus 로고
    • John Leyden, Polish teen derails tram after hacking train network, The Register, January 11
    • John Leyden, Polish teen derails tram after hacking train network, The Register, January 11, 2008. http://www.theregister.co.uk/2008/01/11/tram_hack/.
    • (2008)
  • 6
    • 79954416311 scopus 로고    scopus 로고
    • A Shortlist of Reported SCADA. Incidents at
    • A Shortlist of Reported SCADA. Incidents at: http://ciip.wordpress.com/2009/06/21/a-list-of-reported-scada-incidents/.
  • 7
    • 79954425885 scopus 로고    scopus 로고
    • CNN, Sources: staged cyber attack reveals vulnerability in power grid.
    • CNN, Sources: staged cyber attack reveals vulnerability in power grid. http://www.cnn.com/2007/US/09/26/power.at.risk/index.html.
  • 8
    • 79954420580 scopus 로고    scopus 로고
    • NIST SP 800-82, Guide to industrial control systems (ICS) security, Draft for Public Comment, September 29
    • NIST SP 800-82, Guide to industrial control systems (ICS) security, Draft for Public Comment, September 29, 2008. http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf.
    • (2008)
  • 9
    • 31944451961 scopus 로고    scopus 로고
    • Security of critical control systems sparks concern
    • Geer D. Security of critical control systems sparks concern. Computer 2006, 39(1):20-23.
    • (2006) Computer , vol.39 , Issue.1 , pp. 20-23
    • Geer, D.1
  • 10
    • 33751327214 scopus 로고    scopus 로고
    • Developing a solid SCADA security strategy
    • [Conference Paper] SIcon/02, Sensors for Industry Conference, Proceedings of the ISA/IEEE, IEEE Cat. No. 02EX626, Research Triangle Park, NC, USA
    • J. Pollet, Developing a solid SCADA security strategy, in: [Conference Paper] SIcon/02, Sensors for Industry Conference, Proceedings of the ISA/IEEE, IEEE Cat. No. 02EX626, Research Triangle Park, NC, USA, 2002, pp. 148-156.
    • (2002) , pp. 148-156
    • Pollet, J.1
  • 11
    • 79954425502 scopus 로고    scopus 로고
    • North American Electric Reliability Corporation (NERC) control systems security working group, Top 10 vulnerabilities of control systems and their associated mitigations, 2007, US Department of Energy National SCADA Test Bed Program, March 22
    • North American Electric Reliability Corporation (NERC) control systems security working group, Top 10 vulnerabilities of control systems and their associated mitigations, 2007, US Department of Energy National SCADA Test Bed Program, March 22, 2007.
    • (2007)
  • 12
    • 79954419807 scopus 로고    scopus 로고
    • IEC Standards. Available at
    • IEC Standards. Available at: http://www.iec.ch/.
  • 13
    • 79954426473 scopus 로고    scopus 로고
    • http://www.iso.org/iso/support/faqs/faqs_widely_used_standards/widely_used_standards_other/information_security.htm.
  • 14
    • 79954423686 scopus 로고    scopus 로고
    • NIST 800-53, Recommended security controls for federal information systems.
    • NIST 800-53, Recommended security controls for federal information systems. http://csrc.nist.gov/publications/nistpubs/800-53-Rev2/sp800-53-rev2-final.pdf.
  • 15
    • 79954418915 scopus 로고    scopus 로고
    • American Petrolium Institute, Pipeline SCADA Security, 2nd ed., 06/01/09.
    • American Petrolium Institute, Pipeline SCADA Security, 2nd ed., 06/01/09.
  • 16
    • 79954424735 scopus 로고    scopus 로고
    • Security content automation protocol-open checklist interactive language.
    • Security content automation protocol-open checklist interactive language. http://scap.nist.gov/specifications/ocil/.
  • 17
    • 79954425957 scopus 로고    scopus 로고
    • The technical specification for the security content automation protocol (SCAP): SCAP version 1.1 (DRAFT).
    • The technical specification for the security content automation protocol (SCAP): SCAP version 1.1 (DRAFT). http://csrc.nist.gov/publications/drafts/800-126-r1/draft-sp800-126r1-jan2011.pdf.
  • 18
    • 49049111141 scopus 로고    scopus 로고
    • A non-intrusive approach to enhance legacy embedded control systems with cyber protection features
    • Third International Conference on Availability, Reliability and Security, 2008, ARES 08, 4-7 March
    • Shangping Ren, Kevin Kwiat, A non-intrusive approach to enhance legacy embedded control systems with cyber protection features, in: Third International Conference on Availability, Reliability and Security, 2008, ARES 08, 4-7 March 2008, pp. 1180-1187.
    • (2008) , pp. 1180-1187
    • Ren, S.1    Kwiat, K.2
  • 20
    • 79954425315 scopus 로고    scopus 로고
    • http://www.modbus.org/.
  • 21
    • 36249007497 scopus 로고    scopus 로고
    • Intrusion detection and event monitoring in SCADA networks
    • Springer, New York, NY, Chapter 12 in, E. Goetz, S. Shenoi (Eds.)
    • Oman P., Phillips M. Intrusion detection and event monitoring in SCADA networks. Critical Infrastructure Protection 2007, 161-174. Springer, New York, NY, Chapter 12 in. E. Goetz, S. Shenoi (Eds.).
    • (2007) Critical Infrastructure Protection , pp. 161-174
    • Oman, P.1    Phillips, M.2
  • 23
    • 79954421136 scopus 로고    scopus 로고
    • Intrusion detection via instrumented software
    • 1st CATARS Workshop at the 38th IEEE/ IFIP Intl. Conf. on Dependable Systems & Networks, Anchorage, Alaska
    • William Mahoney, William Sousan, Intrusion detection via instrumented software, in: 1st CATARS Workshop at the 38th IEEE/ IFIP Intl. Conf. on Dependable Systems & Networks, Anchorage, Alaska, 2008.
    • (2008)
    • William, M.1    William, S.2
  • 24
    • 65249176835 scopus 로고    scopus 로고
    • Design, realization and evaluation of a component-based, compositional network simulation environment
    • Tyan H.Y., Sobeih A., Hou J.C. Design, realization and evaluation of a component-based, compositional network simulation environment. Simulation 2009, 85(3):159-181. 10.1177/0037549708099998.
    • (2009) Simulation , vol.85 , Issue.3 , pp. 159-181
    • Tyan, H.Y.1    Sobeih, A.2    Hou, J.C.3
  • 26
    • 79954417676 scopus 로고    scopus 로고
    • ADACS-a language for monitoring regulatory compliance in control systems, in: Second Workshop on Compiler and Architectural Techniques for Application Reliability and Security, the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Estoril, Portugal.
    • Robin Gandhi, William Mahoney, Ken Dick, ADACS-a language for monitoring regulatory compliance in control systems, in: Second Workshop on Compiler and Architectural Techniques for Application Reliability and Security, the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Estoril, Portugal.
    • Robin, G.1    William, M.2    Ken, D.3
  • 28
    • 0018918712 scopus 로고
    • Specifying software requirements for complex systems: new techniques and their application
    • Heninger K.L. Specifying software requirements for complex systems: new techniques and their application. IEEE Transactions on Software Engineering 1980, 6(1):2-13.
    • (1980) IEEE Transactions on Software Engineering , vol.6 , Issue.1 , pp. 2-13
    • Heninger, K.L.1
  • 29
    • 0032596611 scopus 로고    scopus 로고
    • A policy description language
    • Proc. 16th Conf. on AI, AAAI, CA, July
    • J. Lobo, R. Bhatia, S. Naqvi, A policy description language, in: Proc. 16th Conf. on AI, AAAI, CA, July 1999, pp. 291-298.
    • (1999) , pp. 291-298
    • Lobo, J.1    Bhatia, R.2    Naqvi, S.3
  • 30
    • 79954417883 scopus 로고    scopus 로고
    • The JavaTM Virtual Machine Specification-Second Edition.
    • Tim Lindholm, Frank Yellin, The JavaTM Virtual Machine Specification-Second Edition. http://java.sun.com/docs/books/jvms/second_edition/html/VMSpecTOC.doc.html.
    • Tim, L.1    Frank, Y.2
  • 32
    • 79954422468 scopus 로고    scopus 로고
    • http://www.w3.org/TR/xpath20/.
  • 34
    • 79954425263 scopus 로고    scopus 로고
    • OWL 2 Web ontology language document overview, W3C Recommendation 27 October
    • OWL 2 Web ontology language document overview, W3C Recommendation 27 October 2009. http://www.w3.org/TR/owl2-overview/.
    • (2009)
  • 35
    • 79954416375 scopus 로고    scopus 로고
    • NERC standards CIP-002-2 through CIP-009-2.
    • NERC standards CIP-002-2 through CIP-009-2. http://www.nerc.com/filez/standards/Project_2008-06_Cyber_Security.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.