메뉴 건너뛰기




Volumn 253, Issue , 2008, Pages 117-131

Security strategies for SCADA networks

Author keywords

Forensics; SCADA networks; Security services

Indexed keywords

CRITICAL INFRASTRUCTURES; DIGITAL FORENSICS; NETWORK PROTOCOLS; PUBLIC WORKS; SCADA SYSTEMS; FREQUENCY STANDARDS; MOBILE SECURITY; TRANSMISSION CONTROL PROTOCOL;

EID: 84871728510     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (21)
  • 1
    • 84902468128 scopus 로고    scopus 로고
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC (www.gtiservices.org/security/AGA12Draft5r3.pdf), 2005.
    • (2005)
  • 2
    • 84902468129 scopus 로고    scopus 로고
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC (www.gtiservices.org/security/aga-12p2-draft-0512.pdf), 2005.
    • (2005)
  • 3
    • 34047209277 scopus 로고    scopus 로고
    • American Petroleum Institute, Washington, DC
    • American Petroleum Institute, API 1164: SCADA Security, Washington, DC, 2004.
    • (2004) API 1164: SCADA Security
  • 5
    • 84902201510 scopus 로고    scopus 로고
    • British Columbia Institute of Technology, Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, London, United Kingdom
    • British Columbia Institute of Technology, Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, National Infrastructure Security Co-ordination Centre, London, United Kingdom, 2005.
    • (2005) National Infrastructure Security Co-ordination Centre
  • 9
    • 0025508369 scopus 로고
    • Network security via private key certificates
    • D. Davis and R. Swick, Network security via private key certificates, Operating Systems Review, vol. 24, pp. 64-67, 1990.
    • (1990) Operating Systems Review , vol.24 , pp. 64-67
    • Davis, D.1    Swick, R.2
  • 10
    • 77950555217 scopus 로고    scopus 로고
    • Technical Report TR-ISRL-04-01, Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky
    • J. Graham and S. Patel, Security considerations in SCADA communication protocols, Technical Report TR-ISRL-04-01, Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2004.
    • (2004) Security Considerations In SCADA Communication Protocols
    • Graham, J.1    Patel, S.2
  • 11
    • 84902468130 scopus 로고    scopus 로고
    • Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina
    • Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
    • (2004)
  • 12
  • 13
    • 33750422800 scopus 로고    scopus 로고
    • Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico
    • D. Kilman and J. Stamp, Framework for SCADA security policy, Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico, 2005.
    • (2005) Framework For SCADA Security Policy
    • Kilman, D.1    Stamp, J.2
  • 14
    • 34047234442 scopus 로고    scopus 로고
    • An architecture for SCADA network forensics
    • M. Olivier and S. Shenoi (Eds.), Springer, New York
    • T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa and S. Shenoi, An architecture for SCADA network forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, New York, pp. 273-285, 2006.
    • (2006) Advances In Digital Forensics II , pp. 273-285
    • Kilpatrick, T.1    Gonzalez, J.2    Chandia, R.3    Papa, M.4    Shenoi, S.5
  • 16
    • 84902468131 scopus 로고    scopus 로고
    • Modbus IDA, MODBUS Application Protocol Specification v1.1a, North Grafton, Massachusetts
    • Modbus IDA, MODBUS Application Protocol Specification v1.1a, North Grafton, Massachusetts (www.modbus.org/specs.php), 2004.
    • (2004)
  • 17
    • 78649562070 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Gaithersburg, Maryland
    • National Institute of Standards and Technology, System Protection Profile - Industrial Control Systems v1.0, Gaithersburg, Maryland, 2004.
    • (2004) System Protection Profile - Industrial Control Systems
  • 18
    • 33845546517 scopus 로고    scopus 로고
    • Integrating digital forensics in network architectures
    • M. Pollitt and S. Shenoi (Eds.), Springer, New York
    • K. Shanmugasundaram, H. Bronnimann and N. Memon, Integrating digital forensics in network architectures, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, New York, pp. 127-140, 2005.
    • (2005) Advances In Digital Forensics , pp. 127-140
    • Shanmugasundaram, K.1    Bronnimann, H.2    Memon, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.