메뉴 건너뛰기




Volumn 5, Issue 2, 2012, Pages 74-83

Intrusion detection for resource-constrained embedded control systems in the power grid

Author keywords

Embedded control systems; Intrusion detection; Power grid

Indexed keywords

CONTROL-FLOW; CONVENTIONAL APPROACH; EMBEDDED CONTROL SYSTEMS; EMBEDDED DEVICE; HOST-BASED INTRUSION DETECTION; HYPERVISOR; PERFORMANCE IMPACT; POWER GRIDS; RESOURCE RESTRICTIONS; RESOURCE-CONSTRAINED; ROOTKITS; TIMING REQUIREMENTS; TRACING FRAMEWORK;

EID: 84863206416     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2012.02.002     Document Type: Article
Times cited : (21)

References (57)
  • 1
    • 84863206169 scopus 로고    scopus 로고
    • Transmission and Distribution World, About 212 million smart electric meters in 2014, says ABI Research, February 3
    • Transmission and Distribution World, About 212 million smart electric meters in 2014, says ABI Research, February 3, 2010. http://tdworld.com/smart_grid_automation/abi-research-smart-meters-0210.
    • (2010)
  • 2
    • 84863204976 scopus 로고    scopus 로고
    • W32.Stuxnet dossier, symantec, mountain view, California
    • N. Falliere, L. O'Murchu, E. Chien, W32.Stuxnet dossier, symantec, mountain view, California, 2011. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
    • (2011)
    • Falliere, N.1    O'Murchu, L.2    Chien, E.3
  • 3
    • 80051478850 scopus 로고    scopus 로고
    • Was Stuxnet an act of war? decoding a cyberattack
    • Fidler D. Was Stuxnet an act of war? decoding a cyberattack. IEEE Security and Privacy 2011, 9(4):56-59.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.4 , pp. 56-59
    • Fidler, D.1
  • 10
    • 84863197060 scopus 로고    scopus 로고
    • Institute of Electrical and Electronics Engineers, IEEE 1646-2004 standard: communication delivery time performance requirements for electric power substation automation, Piscataway, New Jersey
    • Institute of Electrical and Electronics Engineers, IEEE 1646-2004 standard: communication delivery time performance requirements for electric power substation automation, Piscataway, New Jersey, 2004.
    • (2004)
  • 13
    • 84863204979 scopus 로고    scopus 로고
    • PaX Team, Homepage.
    • PaX Team, Homepage. http://pax.grsecurity.net.
  • 14
    • 84863197061 scopus 로고    scopus 로고
    • Openwall, Linux kernel patch from the Openwall Project.
    • Openwall, Linux kernel patch from the Openwall Project. http://www.openwall.com/linux.
  • 15
    • 78751540942 scopus 로고    scopus 로고
    • Autoscopy: detecting pattern-searching rootkits via control flow tracing
    • Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire
    • A. Ramaswamy, Autoscopy: detecting pattern-searching rootkits via control flow tracing, Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2009.
    • (2009)
    • Ramaswamy, A.1
  • 16
    • 84863206172 scopus 로고    scopus 로고
    • Autoscopy Jr.: intrusion detection for embedded control systems, Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire
    • J. Reeves, Autoscopy Jr.: intrusion detection for embedded control systems, Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2011.
    • (2011)
    • Reeves, J.1
  • 17
    • 84863204978 scopus 로고    scopus 로고
    • Kernel probes (Kprobes), The Linux Kernel Archives.
    • J. Keniston, P. Panchamukhi, M. Hiramatsu, Kernel probes (Kprobes), The Linux Kernel Archives. http://www.kernel.org/doc/Documentation/kprobes.txt.
    • Keniston, J.1    Panchamukhi, P.2    Hiramatsu, M.3
  • 19
    • 84863206173 scopus 로고    scopus 로고
    • Motorola Solutions, ACE3600 specifications sheet, Schaumburg, Illinois
    • Motorola Solutions, ACE3600 specifications sheet, Schaumburg, Illinois, 2009. http://www.motorola.com/web/Business/Products/SCADA%20Products/ACE3600/%5FDocuments/Static%20Files/ACE3600%20Specifications%20Sheet.pdf?pLibItem%3D1.
    • (2009)
  • 20
    • 84863195288 scopus 로고    scopus 로고
    • Schweitzer Engineering Laboratories, SEL-3354 embedded automation computing platform data sheet, Pullman, Washington
    • Schweitzer Engineering Laboratories, SEL-3354 embedded automation computing platform data sheet, Pullman, Washington, 2011. http://www.selinc.com/WorkArea/DownloadAsset.aspx?id%3D6196.
    • (2011)
  • 21
    • 84863197059 scopus 로고    scopus 로고
    • Secure network architecture for power grid control systems, Presented at the TCIPG Summer School on Cyber Security for Smart Energy Systems
    • A. Wright, Secure network architecture for power grid control systems, Presented at the TCIPG Summer School on Cyber Security for Smart Energy Systems, 2011.
    • (2011)
    • Wright, A.1
  • 22
    • 84863206171 scopus 로고    scopus 로고
    • Schweitzer Engineering Laboratories, Home, Pullman, Washington.
    • Schweitzer Engineering Laboratories, Home, Pullman, Washington. http://www.selinc.com.
  • 24
    • 84863204977 scopus 로고    scopus 로고
    • Mitre Corporation, CVE-2008-0923, Common vulnerabilities and exposures, Bedford, Massachusetts
    • Mitre Corporation, CVE-2008-0923, Common vulnerabilities and exposures, Bedford, Massachusetts, 2008. http://cve.mitre.org/cgi-bin/cvename.cgi?name%3DCVE-2008-0923.
    • (2008)
  • 25
    • 84863195287 scopus 로고    scopus 로고
    • Subverting the Xen hypervisor, Presented at Black Hat USA
    • R. Wojtczuk, Subverting the Xen hypervisor, Presented at Black Hat USA, 2008. http://www.invisiblethingslab.com/resources/bh08/part1.pdf.
    • (2008)
    • Wojtczuk, R.1
  • 28
    • 84863206170 scopus 로고    scopus 로고
    • Overhead evaluation about Kprobe and Djprobe (direct jump probe)
    • M. Hiramatsu, Overhead evaluation about Kprobe and Djprobe (direct jump probe) 2005. http://lkst.sourceforge.net/docs/probes-eval-report.pdf.
    • (2005)
    • Hiramatsu, M.1
  • 30
    • 84863197057 scopus 로고    scopus 로고
    • Detection, prevention and containment: a study of grsecurity, Presented at the Libre Software Meeting
    • B. Spengler, Detection, prevention and containment: a study of grsecurity, Presented at the Libre Software Meeting, 2002.
    • (2002)
    • Spengler, B.1
  • 31
    • 84863195284 scopus 로고    scopus 로고
    • Wikibooks, Grsecurity/Overview.
    • Wikibooks, Grsecurity/Overview. http://en.wikibooks.org/wiki/Grsecurity/Overview.
  • 32
    • 84863195281 scopus 로고    scopus 로고
    • PaX Team, PaX-address space layout randomization.
    • PaX Team, PaX-address space layout randomization. http://pax.grsecurity.net/docs/aslr.txt.
  • 33
    • 84863204972 scopus 로고    scopus 로고
    • PaX Team, PaX-non-executable pages design and implementation.
    • PaX Team, PaX-non-executable pages design and implementation. http://pax.grsecurity.net/docs/noexec.txt.
  • 34
    • 84863197056 scopus 로고    scopus 로고
    • PaX Team, PaX-paging based non-executable pages.
    • PaX Team, PaX-paging based non-executable pages. http://pax.grsecurity.net/docs/pageexec.txt.
  • 35
    • 84863195285 scopus 로고    scopus 로고
    • Exploiting grsecurity/PaX with Dan Rosenberg and Jon Oberheide, May
    • T. Mittner, Exploiting grsecurity/PaX with Dan Rosenberg and Jon Oberheide, May 18, 2011. http://resources.infosecinstitute.com/exploiting-gresecuritypax.
    • (2011) , vol.18
    • Mittner, T.1
  • 36
    • 84863197058 scopus 로고    scopus 로고
    • pragmatic/THC, (Nearly) complete Linux loadable kernel modules
    • pragmatic/THC, (Nearly) complete Linux loadable kernel modules, 1999. http://dl.packetstormsecurity.net/docs/hack/LKM_HACKING.html.
    • (1999)
  • 37
    • 84863204975 scopus 로고    scopus 로고
    • phrack.org, Phrack, No. 50., April
    • phrack.org, Phrack, No. 50., April 9, 2007. http://www.phrack.org/issues.html?issue%3D50.
    • (2007) , vol.9
  • 41
    • 70449368201 scopus 로고    scopus 로고
    • Application-specific packet capturing using kernel probes
    • IEEE International Conference on Symposium on Integrated Network Management
    • B. Lee, S. Moon, Y. Lee, Application-specific packet capturing using kernel probes, in: Proceedings of the Eleventh IFIP/IEEE International Conference on Symposium on Integrated Network Management, 2009, pp. 303-306.
    • (2009) in: Proceedings of the Eleventh IFIP , pp. 303-306
    • Lee, B.1    Moon, S.2    Lee, Y.3
  • 42
    • 84863195282 scopus 로고    scopus 로고
    • The atom LEAP platform for energy-efficient embedded computing, Technical Report, Center for Embedded Network Sensing, University of California at Los Angeles, Los Angeles, California
    • D. Singh, W. Kaiser, The atom LEAP platform for energy-efficient embedded computing, Technical Report, Center for Embedded Network Sensing, University of California at Los Angeles, Los Angeles, California, 2010.
    • (2010)
    • Singh, D.1    Kaiser, W.2
  • 43
    • 84958770645 scopus 로고    scopus 로고
    • Lightweight intrusion detection for resource-constrained embedded control systems
    • Springer, Heidelberg, Germany, J. Butts, S. Shenoi (Eds.)
    • Reeves J., Ramaswamy A., Locasto M., Bratus S., Smith S. Lightweight intrusion detection for resource-constrained embedded control systems. Critical Infrastructure Protection V 2011, 31-46. Springer, Heidelberg, Germany. J. Butts, S. Shenoi (Eds.).
    • (2011) Critical Infrastructure Protection V , pp. 31-46
    • Reeves, J.1    Ramaswamy, A.2    Locasto, M.3    Bratus, S.4    Smith, S.5
  • 45
    • 84863195283 scopus 로고    scopus 로고
    • SourceForge.net, Linux Test Project.
    • SourceForge.net, Linux Test Project. http://ltp.sourceforge.net.
  • 46
    • 42649119611 scopus 로고    scopus 로고
    • Execution path analysis: finding kernel based rootkits
    • Phrack, No.
    • J. Rutkowski, Execution path analysis: finding kernel based rootkits, Phrack, No. 59, 2002. http://www.phrack.com/issues.html?issue%3D59%26id%3D10.
    • (2002) , vol.59
    • Rutkowski, J.1
  • 47
    • 84863197055 scopus 로고    scopus 로고
    • udis86 Disassembler Library for ×86 and ×
    • V. Thampi, udis86 Disassembler Library for ×86 and ×86-64, 2009. http://udis86.sf.net.
    • (2009) , pp. 86-64
    • Thampi, V.1
  • 49
    • 84863204974 scopus 로고    scopus 로고
    • Intel Corporation, Intel 64 and IA-32 architectures software developer's manual: instruction set reference, A-M, Santa Clara, California
    • Intel Corporation, Intel 64 and IA-32 architectures software developer's manual: instruction set reference, A-M, vol. 2A, Santa Clara, California, 2011.
    • (2011) , vol.2
  • 50
    • 84863204973 scopus 로고    scopus 로고
    • FuSyS, KSTAT--kernel security therapy anti-trolls (2.4.x version) v1.1-2.
    • FuSyS, KSTAT--kernel security therapy anti-trolls (2.4.x version) v1.1-2. http://www.s0ftpj.org/en/tools.html.
  • 52
    • 84863197052 scopus 로고    scopus 로고
    • Detecting loadable kernel modules (LKM).
    • T. Miller, Detecting loadable kernel modules (LKM). http://www.s0ftpj.org/docs/lkm.htm.
    • Miller, T.1
  • 54
    • 84863197053 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation, SPEC CPU2000 benchmark suite, Gainesville, Florida
    • Standard Performance Evaluation Corporation, SPEC CPU2000 benchmark suite, Gainesville, Florida, 2007. http://www.spec.org/cpu2000.
    • (2007)
  • 56
    • 84863206168 scopus 로고    scopus 로고
    • Open Source Security, grsecurity.
    • Open Source Security, grsecurity. http://grsecurity.net.
  • 57
    • 84863206167 scopus 로고    scopus 로고
    • Ftrace-Function Tracer, The Linux Kernel Archives.
    • S. Rostedt, Ftrace-Function Tracer, The Linux Kernel Archives. http://www.kernel.org/doc/Documentation/trace/ftrace.txt.
    • Rostedt, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.