메뉴 건너뛰기




Volumn 59, Issue 10, 2012, Pages 3943-3950

Critical state-based filtering system for securing SCADA network protocols

Author keywords

Critical state analysis; cyber security; firewall; SCADA systems

Indexed keywords

COMPUTER SYSTEM FIREWALLS; CRITICAL CURRENT DENSITY (SUPERCONDUCTIVITY); INTERNET PROTOCOLS; NETWORK ARCHITECTURE; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 84860491228     PISSN: 02780046     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIE.2011.2181132     Document Type: Article
Times cited : (89)

References (28)
  • 1
    • 77953581925 scopus 로고    scopus 로고
    • Networked control system: Overview and research trends
    • Jul.
    • R. A. Gupta and M. Y. Chow, "Networked control system: Overview and research trends," IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2527-2535, Jul. 2010.
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.7 , pp. 2527-2535
    • Gupta, R.A.1    Chow, M.Y.2
  • 2
    • 37849038277 scopus 로고    scopus 로고
    • Effects of intentional threats to power substation control systems
    • G. Dondossola, M. Masera, I. Nai Fovino, and J. Szanto, "Effects of intentional threats to power substation control systems," Proc. IJCIS, vol. 4, no. 1/2, pp. 129-143, 2008.
    • (2008) Proc. IJCIS , vol.4 , Issue.1-2 , pp. 129-143
    • Dondossola, G.1    Masera, M.2    Nai Fovino, I.3    Szanto, J.4
  • 5
    • 77958017287 scopus 로고    scopus 로고
    • Safety-and security-critical services in building automation and control systems
    • Nov.
    • T. Novak and A. Gerstinger, "Safety-and security-critical services in building automation and control systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3614-3621, Nov. 2010.
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.11 , pp. 3614-3621
    • Novak, T.1    Gerstinger, A.2
  • 6
    • 77956599919 scopus 로고    scopus 로고
    • Security in building automation systems
    • Nov.
    • W. Granzer, F. Praus, and W. Kastner, "Security in building automation systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, Nov. 2010.
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.11 , pp. 3622-3630
    • Granzer, W.1    Praus, F.2    Kastner, W.3
  • 7
    • 34548049800 scopus 로고    scopus 로고
    • Industrial cybersecurity for power system and SCADA networks
    • Jul./Aug.
    • A. A. Creery and E. J. Byres, "Industrial cybersecurity for power system and SCADA networks," IEEE Ind. Appl. Mag., vol. 13, no. 4, pp. 49-55, Jul./Aug. 2007.
    • (2007) IEEE Ind. Appl. Mag. , vol.13 , Issue.4 , pp. 49-55
    • Creery, A.A.1    Byres, E.J.2
  • 9
    • 84860428254 scopus 로고    scopus 로고
    • Developing a multi-layer strategy for securing control systems of oil refineries
    • Jul.
    • M. K. Mahmood and F. M. Al-Naima, "Developing a multi-layer strategy for securing control systems of oil refineries," Wireless Sens. Netw., vol. 2, pp. 520-527, Jul. 2010.
    • (2010) Wireless Sens. Netw. , vol.2 , pp. 520-527
    • Mahmood, M.K.1    Al-Naima, F.M.2
  • 10
    • 73849146820 scopus 로고    scopus 로고
    • Security protocols against cyber attacks in the distribution automation system
    • Jan.
    • I. H. Lim, S. Hong, M. S. Choi, S. J. Lee, T. W. Kim, S. W. Lee, and B. N. Ha, "Security protocols against cyber attacks in the distribution automation system," IEEE Trans. Power Del., vol. 25, no. 1, pp. 448-455, Jan. 2010.
    • (2010) IEEE Trans. Power Del. , vol.25 , Issue.1 , pp. 448-455
    • Lim, I.H.1    Hong, S.2    Choi, M.S.3    Lee, S.J.4    Kim, T.W.5    Lee, S.W.6    Ha, B.N.7
  • 11
    • 42549107267 scopus 로고    scopus 로고
    • Data object based security for DNP3 over TCP/IP for increased utility commercial aspects security
    • Tampa, FL, Jun. 24-28
    • T. Mander, F. Nabhani, L. Wang, and R. Cheung, "Data object based security for DNP3 over TCP/IP for increased utility commercial aspects security," in Proc. Power Eng. Soc. Gen. Meeting, Tampa, FL, Jun. 24-28, 2007, pp. 1-8.
    • (2007) Proc. Power Eng. Soc. Gen. Meeting , pp. 1-8
    • Mander, T.1    Nabhani, F.2    Wang, L.3    Cheung, R.4
  • 12
    • 85090433665 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection for networks
    • Seattle, WA
    • M. Roesch, "Snort-lightweight intrusion detection for networks," in Proc. 13th Syst. Admin. Conf. LISA, Seattle, WA, 1999, pp. 229-238.
    • (1999) Proc. 13th Syst. Admin. Conf. LISA , pp. 229-238
    • Roesch, M.1
  • 13
    • 84860441945 scopus 로고    scopus 로고
    • Last access 9/04/ [Online]. Available:
    • Last access 9/04/2009. [Online]. Available: http://www.digitalbond.com/ index.php/research/ids-signatures/modbus-tcp-ids-signatures
    • (2009)
  • 14
    • 77954340967 scopus 로고    scopus 로고
    • Secure selecticast for collaborative intrusion detection systems
    • P. Gross, J. Parekh, and G. Kaiser, "Secure selecticast for collaborative intrusion detection systems," in Proc. Int. Workshops DEBS, 2004, pp. 50-54.
    • (2004) Proc. Int. Workshops DEBS , pp. 50-54
    • Gross, P.1    Parekh, J.2    Kaiser, G.3
  • 15
    • 85137546697 scopus 로고    scopus 로고
    • Global intrusion detection in the DOMINO overlay system
    • V. Yegneswaran, P. Barford, and S. Jha, "Global intrusion detection in the DOMINO overlay system," in Proc. 11th ANDSSS Conf., 2004, pp. 120-137.
    • (2004) Proc. 11th ANDSSS Conf. , pp. 120-137
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3
  • 16
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • F. Cuppens and A. Miege, "Alert correlation in a cooperative intrusion detection framework," in Proc. Security Privacy, 2002, pp. 202-215.
    • (2002) Proc. Security Privacy , pp. 202-215
    • Cuppens, F.1    Miege, A.2
  • 17
    • 84902313318 scopus 로고    scopus 로고
    • A service oriented approach to the assessment of infrastructure security
    • Infrastructure Protection, Dartmouth College, Hanover, NH, Mar. 19-21
    • I. Nai Fovino and M. Masera, "A service oriented approach to the assessment of infrastructure security," in Proc. 1st Annu. IFIP Working Group 11.10 Int. Conf. Crit. Infrastructure Protection, Dartmouth College, Hanover, NH, Mar. 19-21, 2007, pp. 367-379.
    • (2007) Proc. 1st Annu. IFIP Working Group 11.10 Int. Conf. Crit , pp. 367-379
    • Nai Fovino, I.1    Masera, M.2
  • 20
    • 33751006097 scopus 로고    scopus 로고
    • Modelling information assets for security risk assessment in industrial settings
    • Hambourg, Germany
    • I. Nai Fovino and M. Masera, "Modelling information assets for security risk assessment in industrial settings," in Proc. 15th EICAR Annu. Conf., Hambourg, Germany, 2006, pp. 137-149.
    • (2006) Proc. 15th EICAR Annu. Conf. , pp. 137-149
    • Nai Fovino, I.1    Masera, M.2
  • 21
    • 0031148143 scopus 로고    scopus 로고
    • Supervision, fault-detection and fault-diagnosis methods-An introduction
    • May
    • R. Isermann, "Supervision, fault-detection and fault-diagnosis methods-An introduction," Control Eng. Pract., vol. 5, no. 5, pp. 639-652, May 1997.
    • (1997) Control Eng. Pract. , vol.5 , Issue.5 , pp. 639-652
    • Isermann, R.1
  • 22
    • 0021468997 scopus 로고
    • Process fault detection based on modelling and estimation methods-A survey
    • Jul.
    • R. Isermann, "Process fault detection based on modelling and estimation methods-A survey," Automatica, vol. 20, no. 4, pp. 387-404, Jul. 1984.
    • (1984) Automatica , vol.20 , Issue.4 , pp. 387-404
    • Isermann, R.1
  • 23
    • 0008881998 scopus 로고
    • Advanced fault detection and isolation schemes using non linear and robust observers
    • Munich, Germany
    • P. M. Frank, "Advanced fault detection and isolation schemes using non linear and robust observers," in Proc. 10th IFAC Congr., Munich, Germany, 1987, vol. 3, pp. 63-68.
    • (1987) Proc. 10th IFAC Congr. , vol.3 , pp. 63-68
    • Frank, P.M.1
  • 24
    • 44349183254 scopus 로고    scopus 로고
    • A design method of communication disturbance observer for time-delay compensation, taking the dynamic property of network disturbance into account
    • May
    • K. Natori and K. Ohnishi, "A design method of communication disturbance observer for time-delay compensation, taking the dynamic property of network disturbance into account," IEEE Trans. Ind. Electron., vol. 55, no. 5, pp. 2152-2168, May 2008.
    • (2008) IEEE Trans. Ind. Electron. , vol.55 , Issue.5 , pp. 2152-2168
    • Natori, K.1    Ohnishi, K.2
  • 25
    • 79951589506 scopus 로고    scopus 로고
    • Control over imperfect networks: Model based predictive networked control systems
    • Mar.
    • A. Onat, T. Naskali, E. Parlakay, and O. Mutluer, "Control over imperfect networks: Model based predictive networked control systems," IEEE Trans. Ind. Electron., vol. 58, no. 3, pp. 905-913, Mar. 2011.
    • (2011) IEEE Trans. Ind. Electron. , vol.58 , Issue.3 , pp. 905-913
    • Onat, A.1    Naskali, T.2    Parlakay, E.3    Mutluer, O.4
  • 26
    • 20444481023 scopus 로고    scopus 로고
    • A SCADA system reliability evaluation considering performance requirement
    • Singapore
    • C.-L. Su and Y.-C. Chang, "A SCADA system reliability evaluation considering performance requirement," in Proc. Int. Conf. Power Syst. Technol., Singapore, 2004, pp. 574-579.
    • (2004) Proc. Int. Conf. Power Syst. Technol. , pp. 574-579
    • Su, C.-L.1    Chang, Y.-C.2
  • 27
    • 71049128991 scopus 로고    scopus 로고
    • A communicaton system architecture for regional control of power distribution networks
    • Y. Quiang, J. A. Barria, and C. A. H. Aramburo, "A communicaton system architecture for regional control of power distribution networks," in Proc. 7th IEEE Int. Conf. INDIN, 2009, pp. 372-377.
    • (2009) Proc. 7th IEEE Int. Conf. INDIN , pp. 372-377
    • Quiang, Y.1    Barria, J.A.2    Aramburo, C.A.H.3
  • 28
    • 0032690858 scopus 로고    scopus 로고
    • Wide area network performance study of a distribution management system
    • Apr. 11-16
    • C. L. Su, C. N. Lu, and M. C. Lin, "Wide area network performance study of a distribution management system," in Proc. Transm. Distrib. Conf., Apr. 11-16, 1999, vol. 1, pp. 136-141.
    • (1999) Proc. Transm. Distrib. Conf. , vol.1 , pp. 136-141
    • Su, C.L.1    Lu, C.N.2    Lin, M.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.