메뉴 건너뛰기




Volumn 52, Issue 10, 2012, Pages 1396-1408

Industrial control system cybersecurity research

Author keywords

Cyber physical system (CPS); Cybersecurity; Industrial control system (ICS); Risk assessment; Supervisory control and data acquisition (SCADA)

Indexed keywords

CYBER PHYSICAL SYSTEMS (CPSS); CYBER SECURITY; FUTURE RESEARCH DIRECTIONS; INDUSTRIAL CONTROL SYSTEMS; NATIONAL INFRASTRUCTURE; SUBWAY SYSTEMS; SUPERVISORY CONTROL AND DATA ACQUISITION;

EID: 84871125623     PISSN: 10000054     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (60)

References (97)
  • 1
    • 55549116194 scopus 로고    scopus 로고
    • NIST SP800-82. Gaithersburg, USA: National Institute of Standards and Technology (NIST)
    • NIST SP800-82. Guide to Industrial Control Systems (ICS) Security[S]. Gaithersburg, USA: National Institute of Standards and Technology (NIST), 2011.
    • (2011) Guide to Industrial Control Systems (ICS) Security
  • 3
    • 0013080980 scopus 로고    scopus 로고
    • Boston, USA: Addison Wesley
    • Bishop M. Computer Security[M]. Boston, USA: Addison Wesley, 2003.
    • (2003) Computer Security
    • Bishop, M.1
  • 4
    • 84871137164 scopus 로고    scopus 로고
    • Department of Homeland Security (DHS). Washington DC, USA: Department of Homeland Security (DHS)
    • Department of Homeland Security (DHS). Cyber Security Assessments of Industrial Control System[S]. Washington DC, USA: Department of Homeland Security (DHS), 2010.
    • (2010) Cyber Security Assessments of Industrial Control System
  • 5
    • 84884318324 scopus 로고    scopus 로고
    • The European Network and Information Security Agency (ENISA). Heraklion, Greece: Recommendations for Europe and Member States
    • The European Network and Information Security Agency (ENISA). Protecting Industrial Control Systems, Recommendations for Europe and Member States[R]. Heraklion, Greece: Recommendations for Europe and Member States, 2011.
    • (2011) Protecting Industrial Control Systems, Recommendations for Europe and Member States
  • 6
    • 84871160649 scopus 로고    scopus 로고
    • Myths and facts behind cyber security and industrial control (2003)
    • 2010-02-12
    • Byres E J, Kay J, Carter J. Myths and facts behind cyber security and industrial control (2003)[Z/OL]. (2010-02-12), http://www.pimaweb.org/conference/april2003/pdfs/ MythsAndFactsBehindCyberSecurity.pdf.
    • Byres, E.J.1    Kay, J.2    Carter, J.3
  • 8
    • 0010827970 scopus 로고    scopus 로고
    • IEC 61508. Geneva, Switzerland: International Electrotechnical Commission (IEC)
    • IEC 61508. Functional Safety of E/E/PE Safety-Related Systems[S]. Geneva, Switzerland: International Electrotechnical Commission (IEC), 2000.
    • (2000) Functional Safety of E/E/PE Safety-Related Systems
  • 14
    • 0344559509 scopus 로고    scopus 로고
    • US-CERT. Washington DC, USA: United States Computer Emergency Readiness Team
    • US-CERT. The National Strategy to Secure Cyberspace[R]. Washington DC, USA: United States Computer Emergency Readiness Team, 2003.
    • (2003) The National Strategy to Secure Cyberspace
  • 15
    • 70449644323 scopus 로고    scopus 로고
    • Department of Homeland Security. Washington DC, USA: Department of Homeland Security
    • Department of Homeland Security. National Infrastructure Protection Plan[R]. Washington DC, USA: Department of Homeland Security, 2006.
    • (2006) National Infrastructure Protection Plan
  • 19
    • 36248993462 scopus 로고    scopus 로고
    • Washington DC, USA: Energetics Incorporated, the US Department of Energy and the US Department of Homeland Security
    • Eisenhauer J, Donnelly P, Ellis M, et al. Roadmap to Secure Control Systems in the Energy Sector[R]. Washington DC, USA: Energetics Incorporated, the US Department of Energy and the US Department of Homeland Security, 2006.
    • (2006) Roadmap to Secure Control Systems in the Energy Sector
    • Eisenhauer, J.1    Donnelly, P.2    Ellis, M.3
  • 20
    • 70449644323 scopus 로고    scopus 로고
    • Department of Homeland Security. Washington DC, USA: Department of Homeland Security
    • Department of Homeland Security. National Infrastructure Protection Plan[R]. Washington DC, USA: Department of Homeland Security, 2009.
    • (2009) National Infrastructure Protection Plan
  • 21
    • 84860869886 scopus 로고    scopus 로고
    • Energy Sector Control Systems Working Group (ESCSWG). Washington DC, USA: Office of Electricity Delivery & Energy Reliability
    • Energy Sector Control Systems Working Group (ESCSWG). Roadmap to Achieve Energy Delivery Systems Cybersecurity[R]. Washington DC, USA: Office of Electricity Delivery & Energy Reliability, 2011.
    • (2011) Roadmap to Achieve Energy Delivery Systems Cybersecurity
  • 22
    • 85081764324 scopus 로고    scopus 로고
    • Revelation of industrial control security management in the United States
    • in Chinese
    • GAO Yang, PENG Yong, XIE Feng. Revelation of industrial control security management in the United States[J]. China Information Security, 2012, 27(03): 44-47. (in Chinese)
    • (2012) China Information Security , vol.27 , Issue.3 , pp. 44-47
    • Gao, Y.1    Peng, Y.2    Xie, F.3
  • 23
    • 85081767233 scopus 로고    scopus 로고
    • National SCADA testbed
    • 2012-07-01
    • Department of Energy. National SCADA Testbed[Z/OL]. (2012-07-01), http://www.doe.gov/oe/national-scada-test-bed/.
  • 24
    • 85081772554 scopus 로고    scopus 로고
    • NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector
    • US Department of Energy, 2012-06-16
    • Office of Electricity Delivery and Energy Reliability, US Department of Energy. NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector[Z/OL]. (2012-06-16), http://energy.gov/sites/prod/files/oeprod/Documentsand Media/NSTB_Fact_Sheet_ FINAL_09-16-09.pdf.
  • 25
    • 85081772554 scopus 로고    scopus 로고
    • NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector
    • 2012-06-16
    • Office of Electricity Delivery and Energy Reliability, US Department of Energy. NSTB fact sheet, national SCADA test bed, enhancing control systems security in the energy sector[Z/OL]. (2012-06-16), http://www.inl.gov/scada/factsheets/d/nstb.pdf.
  • 26
    • 85081763315 scopus 로고    scopus 로고
    • US-CERT. ICS-CERT[Z/OL]. (2012-06-20)
    • US-CERT. ICS-CERT[Z/OL]. (2012-06-20), http://www.us-cert.gov/control_system/.
  • 27
    • 33646239120 scopus 로고    scopus 로고
    • Commission of the European Communities. Communication from the Commission to the Council and the European Parliament. Brussels, Belgium: Commission of the European Communities
    • Commission of the European Communities. Communication from the Commission to the Council and the European Parliament. Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 Final[R]. Brussels, Belgium: Commission of the European Communities, 2004.
    • (2004) Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 Final
  • 30
    • 84875511071 scopus 로고    scopus 로고
    • Commission of the European Communities. Communication from the Commission to the European Parliament, the Council, Brussels, Belgium: Commission of the European Communities
    • Commission of the European Communities. Communication from the Commission to the European Parliament, the Council, The European Economic and Social Committee and the Committee of the Regions-A Digital Agenda for Europe, COM (2010) 245[R]. Brussels, Belgium: Commission of the European Communities, 2010.
    • (2010) The European Economic and Social Committee and the Committee of the Regions-A Digital Agenda for Europe, COM (2010) 245
  • 31
    • 85081761597 scopus 로고    scopus 로고
    • API Standard 1164. New York, USA: American Petroleum Institute
    • API Standard 1164. Pipeline SCADA Security Guideline[S]. New York, USA: American Petroleum Institute, 2009.
    • (2009) Pipeline SCADA Security Guideline
  • 33
    • 85081767848 scopus 로고    scopus 로고
    • ANSI/ISA-99. Los Angeles, USA: American National Standards Institute(ANSI)/ USA International Standards Authority(ISA)
    • ANSI/ISA-99. Manufacturing and Control System Security, Standards and Guidelines[S]. Los Angeles, USA: American National Standards Institute(ANSI)/ USA International Standards Authority(ISA), 2009.
    • (2009) Manufacturing and Control System Security, Standards and Guidelines
  • 40
    • 85081772960 scopus 로고    scopus 로고
    • Innovative defense strategies for securing SCADA control systems
    • Chicago, USA: Instrumentation, Systems, and Automation Society (ISA)
    • Pollet J. Innovative defense strategies for securing SCADA control systems[C]// Innovative Defense Strategies for Securing Manufacturing & Control Systems-ISA EXPO 2005. Chicago, USA: Instrumentation, Systems, and Automation Society (ISA), 2005.
    • (2005) Innovative Defense Strategies for Securing Manufacturing & Control Systems-ISA EXPO 2005
    • Pollet, J.1
  • 44
    • 54949112031 scopus 로고    scopus 로고
    • Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
    • Patel S C, Graham J H, Ralston P A S. Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements[J]. International Journal of Information Management, 2008, 28(6): 483-491.
    • (2008) International Journal of Information Management , vol.28 , Issue.6 , pp. 483-491
    • Patel, S.C.1    Graham, J.H.2    Ralston, P.A.S.3
  • 46
    • 85081767513 scopus 로고    scopus 로고
    • Snort 2.0 intrusion detection syngress, Feb 2003
    • 2012-06-18
    • Jay B, James C F, Jeffrey P, et al. Snort 2.0 Intrusion Detection Syngress, Feb 2003[Z/OL]. (2012-06-18), http://security.irost.org/ebooks/.
    • Jay, B.1    James, C.F.2    Jeffrey, P.3
  • 48
    • 84857971054 scopus 로고    scopus 로고
    • A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems
    • Kauai, USA: Institute of Electrical and Electronics Engineers Computer Society
    • Morris T, Vaughn R, Dandass Y. A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems[C]// HICSS 2012. Kauai, USA: Institute of Electrical and Electronics Engineers Computer Society, 2012: 2338-2345.
    • (2012) HICSS 2012 , pp. 2338-2345
    • Morris, T.1    Vaughn, R.2    Dandass, Y.3
  • 53
    • 79952527986 scopus 로고    scopus 로고
    • On SCADA control system command and response injection and intrusion detection
    • Dallas, USA: IEEE Press
    • Gao W, Morris T, Reaves B, et al. On SCADA control system command and response injection and intrusion detection[C]// Proceedings of 2010 IEEE eCrime Researchers Summit. Dallas, USA: IEEE Press, 2010: 1-8.
    • (2010) Proceedings of 2010 IEEE eCrime Researchers Summit , pp. 1-8
    • Gao, W.1    Morris, T.2    Reaves, B.3
  • 56
    • 0036161259 scopus 로고    scopus 로고
    • Gene selection for cancer classification using support vector machines
    • Isabelle G, Jason W, Stephen B, et al. Gene selection for cancer classification using support vector machines[J]. Machine Learning, 2002, 46(1-3): 389-422.
    • (2002) Machine Learning , vol.46 , Issue.1-3 , pp. 389-422
    • Isabelle, G.1    Jason, W.2    Stephen, B.3
  • 57
    • 78649420561 scopus 로고    scopus 로고
    • Mean field variational approximation for continuous-time Bayesian network
    • Ido C, Tal E H, Nir F, et al. Mean field variational approximation for continuous-time Bayesian network[J]. Journal of Machine Learning Research, 2010, 11: 2745-2783.
    • (2010) Journal of Machine Learning Research , vol.11 , pp. 2745-2783
    • Ido, C.1    Tal, E.H.2    Nir, F.3
  • 59
    • 63149140167 scopus 로고    scopus 로고
    • Mixed-signal approximate computation: A neural predictor case study
    • Renée S A, Daniel A J, Doug B. Mixed-signal approximate computation: A neural predictor case study[J]. IEEE Micro, 2009, 29(1): 104-115.
    • (2009) IEEE Micro , vol.29 , Issue.1 , pp. 104-115
    • Renée, S.A.1    Daniel, A.J.2    Doug, B.3
  • 64
    • 85081763904 scopus 로고    scopus 로고
    • Power infrastructure cybersecurity laboratory of electrical and computer engineering department
    • Iowa State University. 2012-06-11
    • Iowa State University. Power Infrastructure Cybersecurity Laboratory of Electrical and Computer Engineering Department[Z/OL]. (2012-06-11), http://powercyber.ece.iastate.edu/powercyber.html.
  • 65
    • 84871122984 scopus 로고    scopus 로고
    • Summary and implications for China of the information security work of the ICS system in the oil and gas industry in America
    • in Chinese
    • XIONG Qi, JING Xiaowei, ZHAN Feng. Summary and implications for China of the information security work of the ICS system in the oil and gas industry in America[J]. China Information Security, 2012, 27(03): 80-83. (in Chinese)
    • (2012) China Information Security , vol.27 , Issue.3 , pp. 80-83
    • Xiong, Q.1    Jing, X.2    Zhan, F.3
  • 66
    • 85081764559 scopus 로고    scopus 로고
    • Industrial Instrumentation Process Lab. British Columbia Institute of Technology, 2012-07-11
    • Industrial Instrumentation Process Lab. British Columbia Institute of Technology[Z/OL]. (2012-07-11), http://www.bcit.ca/appliedresearch/tc/facilities/industrial.shtml.
  • 68
    • 84871111834 scopus 로고    scopus 로고
    • Simulation of network attacks on SCADA systems
    • Stockholm, Sweden: Team for Research in Ubiquitous Secure Technology (TRUSTSTC)
    • Rohan C, Bruno S, Gabor K, et al. Simulation of network attacks on SCADA systems[C]// First Workshop on Secure Control Systems, 2010. Stockholm, Sweden: Team for Research in Ubiquitous Secure Technology (TRUSTSTC), 2010.
    • (2010) First Workshop on Secure Control Systems, 2010
    • Rohan, C.1    Bruno, S.2    Gabor, K.3
  • 70
    • 0141804902 scopus 로고    scopus 로고
    • The OMNeT++discrete event simulation system
    • Prague, Czech Republic: The European Multidisciplinary Society for Modelling and Simulation Technology (EUROSIS)
    • Varga A. The OMNeT++discrete event simulation system[C]// Proceedings of the European Simulation Multiconference (ESM'2001). Prague, Czech Republic: The European Multidisciplinary Society for Modelling and Simulation Technology (EUROSIS), 2001: 319-324.
    • (2001) Proceedings of the European Simulation Multiconference (ESM'2001) , pp. 319-324
    • Varga, A.1
  • 71
    • 84871177331 scopus 로고    scopus 로고
    • INET framework for OMNeT++4.0
    • The OMNeT++Community. 2012-07-02
    • The OMNeT++Community. INET Framework for OMNeT++4.0[Z/OL]. (2012-07-02), http://inet.omnetpp.org/.
  • 72
    • 85081775006 scopus 로고    scopus 로고
    • Lego mindstroms NXT
    • 2012-07-03
    • The LEGO Group. Lego Mindstroms NXT[Z/OL]. (2012-07-03), http://mindstorms.lego.com.
  • 73
    • 72849121168 scopus 로고    scopus 로고
    • Libmodbus-A modbus library for Linux and OSX
    • 2012-07-03
    • Raimbault S. Libmodbus-A modbus library for Linux and OSX[Z/OL]. (2012-07-03), http://www.libmodbus.org.
    • Raimbault, S.1
  • 75
    • 79957979992 scopus 로고    scopus 로고
    • A testbed for analyzing security of SCADA control systems (TASSCS)
    • Hilton Anaheim, USA: IEEE Computer Society
    • Mallouhi M, AI-Nashif Y, Cox D, et al. A testbed for analyzing security of SCADA control systems (TASSCS)[C]// 2011 IEEE PES on Innovative Smart Grid Technologies (ISGT). Hilton Anaheim, USA: IEEE Computer Society, 2011: 1-7.
    • (2011) 2011 IEEE PES on Innovative Smart Grid Technologies (ISGT) , pp. 1-7
    • Mallouhi, M.1    Ai-Nashif, Y.2    Cox, D.3
  • 77
    • 1842829828 scopus 로고    scopus 로고
    • NIST SP 800-30. Gaithersburg, USA: National Institute of Standards and Technology (NIST)
    • NIST SP 800-30. Risk Management Guide for Information Technology Systems[S]. Gaithersburg, USA: National Institute of Standards and Technology (NIST), 2002.
    • (2002) Risk Management Guide for Information Technology Systems
  • 80
    • 21244494118 scopus 로고    scopus 로고
    • A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems
    • Haimes Y Y, Chittester C G. A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems[J]. Journal of Homeland Security and Emergency Management, 2005, 2(2): 1-21.
    • (2005) Journal of Homeland Security and Emergency Management , vol.2 , Issue.2 , pp. 1-21
    • Haimes, Y.Y.1    Chittester, C.G.2
  • 81
    • 84871147819 scopus 로고    scopus 로고
    • First exploration on the information security risk assessment of the industrial control system
    • in Chinese
    • XIONG Qi, PENG Yong, DAI Zhonghua. First exploration on the information security risk assessment of the industrial control system[J]. China Information Security, 2012, 27(03): 57-59. (in Chinese)
    • (2012) China Information Security , vol.27 , Issue.3 , pp. 57-59
    • Xiong, Q.1    Peng, Y.2    Dai, Z.3
  • 82
    • 0019540987 scopus 로고
    • On the quantitative definition of risk
    • Kaplan S, Garrick B J. On the quantitative definition of risk[J]. Risk Analysis, 1981, 1(1): 11-37.
    • (1981) Risk Analysis , vol.1 , Issue.1 , pp. 11-37
    • Kaplan, S.1    Garrick, B.J.2
  • 83
    • 33748075456 scopus 로고    scopus 로고
    • Toward a unified security/safety model
    • Stoneburner G. Toward a unified security/safety model[J]. Computer, 2006, 39(8): 96-97.
    • (2006) Computer , vol.39 , Issue.8 , pp. 96-97
    • Stoneburner, G.1
  • 84
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • Dr.
    • Schneier B. Attack trees: Modeling security threats[J]. Dr. Dobb's Journal, 1999, 12(24): 21-29.
    • (1999) Dobb's Journal , vol.12 , Issue.24 , pp. 21-29
    • Schneier, B.1
  • 85
    • 78649573044 scopus 로고    scopus 로고
    • Cyber incident blamed for nuclear power plant shutdown
    • 2012-06-12
    • Brian K. Cyber incident blamed for nuclear power plant shutdown[Z/OL]. (2012-06-12), http://www.washingtonpost.com/wp-dyn/content/ article/2008/06/05/AR2008060501958.html.
    • Brian, K.1
  • 86
    • 50649100814 scopus 로고    scopus 로고
    • Technical Report INL/EXT-05-00671, Idaho, USA: Idaho National Laboratory
    • Robert J T. Cyber Incidents Involving Control Systems, Technical Report INL/EXT-05-00671[R]. Idaho, USA: Idaho National Laboratory, 2005.
    • (2005) Cyber Incidents Involving Control Systems
    • Robert, J.T.1
  • 87
    • 79956004912 scopus 로고    scopus 로고
    • Hackers penetrate water system computers
    • 2012-06-06
    • Richard E. Hackers penetrate water system computers[Z/OL]. (2012-06-06), http://blogs.abcnews.com/theblotter/ 2006/10/ hackers_penetra.html.
    • Richard, E.1
  • 88
    • 84871114680 scopus 로고    scopus 로고
    • Sacramento man pleads guilty to attempting to shut down California's power grid
    • 2012-06-07
    • United States Attorney. Sacramento man pleads guilty to attempting to shut down California's power grid[Z/OL]. (2012-06-07), http://www.usdoj.gov/usao/cae/press_releases/ docs/2007/12-14-07DenisonPlea.pdf.
  • 89
    • 79956019292 scopus 로고    scopus 로고
    • Feds: Hacker disabled offshore oil platform leak-detection system
    • 2012-06-06
    • Kravets D. Feds: Hacker disabled offshore oil platform leak-detection system[Z/OL]. (2012-06-06), http://www.wired.com/threatlevel/2009/03/feds-hacker-dis.
    • Kravets, D.1
  • 92
    • 79551623891 scopus 로고    scopus 로고
    • Stuxnet: The first weaponized software?
    • 2012-06-06
    • Bellovin S. Stuxnet: The first weaponized software?[Z/OL]. (2012-06-06), http://www.cs.columbia.edu/~smb/blog/2010-09-27.html.
    • Bellovin, S.1
  • 93
    • 34047240072 scopus 로고    scopus 로고
    • The use of attack trees in assessing vulnerabilities in SCADA systems
    • Lisbon, Portugal: Institute of Electrical and Electronics Engineers
    • Byres E J, Franz M, Miller D. The use of attack trees in assessing vulnerabilities in SCADA systems[C]// International Infrastructure Survivability Workshop (IISW'04). Lisbon, Portugal: Institute of Electrical and Electronics Engineers, 2004.
    • (2004) International Infrastructure Survivability Workshop (IISW'04)
    • Byres, E.J.1    Franz, M.2    Miller, D.3
  • 94
    • 42549101645 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    • Tampa, USA: Institute of Electrical and Electronics Engineers Inc
    • Ten C W, LIU Chenching, Govindarasu M. Vulnerability assessment of cybersecurity for SCADA systems using attack trees[C]// The 2007 IEEE Conference on Power Engineering Society General Meeting. Tampa, USA: Institute of Electrical and Electronics Engineers Inc., 2007: 1-8.
    • (2007) The 2007 IEEE Conference on Power Engineering Society General Meeting , pp. 1-8
    • Ten, C.W.1    Liu, C.2    Govindarasu, M.3
  • 95
    • 84871142758 scopus 로고    scopus 로고
    • Cyber security analysis by attack trees for a reactor protection system
    • Pyeong Chang, Korea: Korean Nuclear Society
    • Park G Y, Lee C K, Choi J G, et al. Cyber security analysis by attack trees for a reactor protection system[C]// Proceedings of the Korean Nuclear Society (KNS) Fall Meeting. Pyeong Chang, Korea: Korean Nuclear Society, 2008.
    • (2008) Proceedings of the Korean Nuclear Society (KNS) Fall Meeting
    • Park, G.Y.1    Lee, C.K.2    Choi, J.G.3
  • 96
    • 54949112031 scopus 로고    scopus 로고
    • Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
    • Patel S C, Graham J H, Ralston P A S. Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements[J]. International Journal of Information Management, 2008, 28(6): 483-491.
    • (2008) International Journal of Information Management , vol.28 , Issue.6 , pp. 483-491
    • Patel, S.C.1    Graham, J.H.2    Ralston, P.A.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.