메뉴 건너뛰기




Volumn 2, Issue 4, 2011, Pages 589-597

SCADASimA framework for building SCADA simulations

Author keywords

Computer security; computer simulation; SCADA systems; smart grids

Indexed keywords

CONTROL AND MONITOR; DIFFERENT ATTACKS; INDUSTRIAL COMMUNITIES; MALICIOUS ATTACK; MODELING SIMULATION; PROPER MODELING; SCADA SECURITY; SECURITY RISKS; SECURITY SOLUTIONS; SIMULATED ENVIRONMENT; SIMULATION TOOL; SMART GRIDS;

EID: 82155173457     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2011.2162432     Document Type: Article
Times cited : (119)

References (34)
  • 3
    • 58849164843 scopus 로고    scopus 로고
    • Security for process control systems: An overview
    • Nov.
    • M. Brundle and M. Naedele, "Security for process control systems: An overview," IEEE Security Privacy, vol. 6, no. 6, pp. 24-29, Nov. 2008.
    • (2008) IEEE Security Privacy , vol.6 , Issue.6 , pp. 24-29
    • Brundle, M.1    Naedele, M.2
  • 4
    • 55549137744 scopus 로고    scopus 로고
    • Security assessment of a turbo-gas power plant
    • ser. IFIP Advances in Information and Commmunication Technology. New York: Springer, Jan.
    • M. Masera, I. Fovino, and R. Leszczyna, "Security assessment of a turbo-gas power plant," in Critical Infrastructure Protection II, ser. IFIP Advances in Information and Commmunication Technology. New York: Springer, Jan. 2008, vol. 290, pp. 31-40.
    • (2008) Critical Infrastructure Protection II , vol.290 , pp. 31-40
    • Masera, M.1    Fovino, I.2    Leszczyna, R.3
  • 5
    • 44649198665 scopus 로고    scopus 로고
    • SCADA - A critical situation
    • Jan.
    • K. Munro, "SCADA-a critical situation," Network Security, vol. 2008, no. 1, pp. 4-6, Jan. 2008.
    • (2008) Network Security , vol.2008 , Issue.1 , pp. 4-6
    • Munro, K.1
  • 6
    • 36249010910 scopus 로고    scopus 로고
    • Lessons learned from the maroochy water breach
    • ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer
    • J. Slay and M. Miller, "Lessons learned from the maroochy water breach," in Critical Infrastructure Protection, ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer, 2007, vol. 253, pp. 73-82.
    • (2007) Critical Infrastructure Protection , vol.253 , pp. 73-82
    • Slay, J.1    Miller, M.2
  • 12
    • 36248987828 scopus 로고    scopus 로고
    • Creating a European SCADA security testbed
    • ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer
    • H. Christiansson and E. Luiijf, "Creating a European SCADA security testbed," in Critical Infrastructure Protection, ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. New York: Springer, 2007, vol. 253, pp. 237-247.
    • (2007) Critical Infrastructure Protection , vol.253 , pp. 237-247
    • Christiansson, H.1    Luiijf, E.2
  • 14
    • 82155171801 scopus 로고    scopus 로고
    • [Online]
    • National SCADA Test Bed Sep. 2010 [Online]. Available: http://www. sandia.gov/ccss/National-Testbed.htm
    • (2010) National SCADA Test Bed Sep.
  • 17
    • 33750405289 scopus 로고    scopus 로고
    • Security issues in SCADA networks
    • DOI 10.1016/j.cose.2006.03.001, PII S0167404806000514
    • V. Igure, S. Laughter, and R. Williams, "Security issues in scada networks," Comput. Security, vol. 25, no. 7, pp. 498-506, 2006. (Pubitemid 44637241)
    • (2006) Computers and Security , vol.25 , Issue.7 , pp. 498-506
    • Igure, V.M.1    Laughter, S.A.2    Williams, R.D.3
  • 19
    • 82155171089 scopus 로고    scopus 로고
    • Pacific northwest national laboratory and U.S
    • department of energy, The role of authenticated communications for electric power distribution Nov.
    • "Pacific northwest national laboratory and U.S. department of energy, The role of authenticated communications for electric power distribution," in Proc. Natl. Workshop-Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, Nov. 2006, p. 1.
    • (2006) Proc. Natl. Workshop-Beyond SCADA: Networked Embedded Control for Cyber Physical Systems , pp. 1
  • 25
    • 82155179758 scopus 로고    scopus 로고
    • May [Online]
    • NS3 Simulator May 2011 [Online]. Available: http://www.nsnam.org/
    • (2011) NS3 Simulator
  • 26
    • 77958537302 scopus 로고    scopus 로고
    • Institute of Telematics, Universität Karlsruhe (TH), Tech. Rep. TM-2008-2 [Online]. Available:
    • C. P. Mayer and T. Gamer, "Integrating real world applications into OMNeT++," Institute of Telematics, Universität Karlsruhe (TH), Tech. Rep. TM-2008-2, 2008 [Online]. Available: http://doc.tm.uka.de/2008/TM-2008-2. pdf
    • (2008) Integrating Real World Applications into OMNeT++
    • Mayer, C.P.1    Gamer, T.2
  • 27
    • 82155171800 scopus 로고    scopus 로고
    • [Online]. Available:
    • INET Framework Sep. 2010 [Online]. Available: http://inet.omnetpp. org
    • (2010) INET Framework Sep.
  • 28
    • 82155179755 scopus 로고    scopus 로고
    • LIBMODBUS Library Aug. [Online]. Available:
    • LIBMODBUS Library Aug. 2010 [Online]. Available: http://www.libmodbus. org/
    • (2010)
  • 29
    • 82155193381 scopus 로고    scopus 로고
    • DNP3 Library May [Online]. Available:
    • DNP3 Library May 2011 [Online]. Available: http://code.google. com/p/dnp3/
    • (2011)
  • 30
    • 82155171090 scopus 로고    scopus 로고
    • Secure enterprise computing with the Solaris 8 operating environment
    • [Online]. Available:
    • "Secure enterprise computing with the Solaris 8 operating environment," Sun Microsystems, 2000 [Online]. Available: http://www.sun. com/software/whitepapers/wp-s8security/wp-s8security.pdf
    • (2000) Sun Microsystems
  • 31
    • 82155179754 scopus 로고    scopus 로고
    • May [Online]
    • DNP3 Specification May 2011 [Online]. Available: http://www.dnp. org/Modules/Library/
    • (2011) DNP3 Specification
  • 32
    • 84891752381 scopus 로고    scopus 로고
    • A taxonomy of attacks on the dnp3 protocol
    • ser. IFIP Advances in Information and Communication Technology, C. Palmer and S. Shenoi, Eds. New York: Springer
    • S. East, J. Butts, M. Papa, and S. Shenoi, "A taxonomy of attacks on the dnp3 protocol," in Critical Infrastructure Protection III, ser. IFIP Advances in Information and Communication Technology, C. Palmer and S. Shenoi, Eds. New York: Springer, 2009, vol. 311, pp. 67-81.
    • (2009) Critical Infrastructure Protection III , vol.311 , pp. 67-81
    • East, S.1    Butts, J.2    Papa, M.3    Shenoi, S.4
  • 34
    • 82155179753 scopus 로고    scopus 로고
    • Jun. [Online]
    • ZigBee Standard Jun. 2011 [Online]. Available: http://zigbee.org/ Standards/ZigBeeSmartEnergy/Overview.aspx
    • (2011) ZigBee Standard


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.