메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Modeling cyber-attack for SCADA systems using CoPNet approach

Author keywords

AT; Attack Modeling; CoPNet; Cyber Security; SCADA; Vulnerability

Indexed keywords

AT; ATTACK MODELING; COPNET; CYBER SECURITY; SCADA; VULNERABILITY;

EID: 84874467860     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICoCS.2012.6458588     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 6
    • 0142049813 scopus 로고    scopus 로고
    • A software fault tree approach to requirements analysis of an intrusion detection system [C]
    • Center for education and research in information assurance and security, Perdue University, March
    • Helmer G, Wong J., Slagell M, et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System [C]. In Proceeding of symposium on requirements engineering for information security. Center for education and research in information assurance and security, Perdue University, March 2001
    • (2001) Proceeding of Symposium on Requirements Engineering for Information Security
    • Helmer, G.1    Wong, J.2    Slagell, M.3
  • 7
    • 84988504967 scopus 로고    scopus 로고
    • A graph-based system for network-vulnerability analysis [C]
    • Charlottesville, VA, USA
    • Phillips C, Swiler L P. A Graph-based System for Network-Vulnerability Analysis [C]. In proceeding of new security paradigms workshop, Charlottesville, VA, USA, 1998, 71-79
    • (1998) Proceeding of New Security Paradigms Workshop , pp. 71-79
    • Phillips, C.1    Swiler, L.P.2
  • 8
    • 50149105845 scopus 로고    scopus 로고
    • Software Fault Tree and Colored Petri Net based specification and implementation of agent- based intrusion detection systems
    • Helmer G, Wong J., Slagell M, et al. "Software Fault Tree and Colored Petri Net based specification and implementation of agent- based intrusion detection systems" Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007.
    • (2007) Int. J. Information and Computer Security , vol.1 , Issue.1-2
    • Helmer, G.1    Wong, J.2    Slagell, M.3
  • 9
    • 2342589865 scopus 로고    scopus 로고
    • A brief introduction to Colored Petri Nets
    • 2 June, Aarhus, Denmark
    • K. Jensen," A brief introduction to Colored Petri Nets", Workshop on the Applicability of Formal Models, 2 June 1998, Aarhus, Denmark, pages 55-58.
    • (1998) Workshop on the Applicability of Formal Models , pp. 55-58
    • Jensen, K.1
  • 10
    • 2342589865 scopus 로고    scopus 로고
    • An introduction to the theoretical aspects of colored petri nets
    • Aarhus, Denmark
    • K. Jensen. " An introduction to the Theoretical Aspects of Colored Petri Nets", Workshop on the Applicability of Formal Models, Aarhus, Denmark, 1998.
    • (1998) Workshop on the Applicability of Formal Models
    • Jensen, K.1
  • 11
    • 84874467666 scopus 로고    scopus 로고
    • The Center for SCADA Security, Sandia National laboratory
    • "The center for SCADA security," The Center for SCADA Security, Sandia National laboratory. [online]. Available http://www.sandia.gov/scada/ home.htm.
    • The Center for SCADA Security
  • 12
    • 77952655630 scopus 로고    scopus 로고
    • Supervisory control and data acquisition (SCADA) systems
    • Oct.
    • "Supervisory Control and Data Acquisition (SCADA) Systems," Technical Information Bulletin 04-1, National Communication System, Oct. 2004. [online]. Available: http://www.ncs.gov/library/tech-bulletins/2004/tib-04-1.pdf
    • (2004) Technical Information Bulletin 04-1
  • 13
    • 84999665477 scopus 로고    scopus 로고
    • Understanding SCADA system security vulnerabilities
    • "Understanding SCADA system security vulnerabilities," Symantec White Paper, 2005.
    • (2005) Symantec White Paper
  • 14
    • 20844463674 scopus 로고    scopus 로고
    • Security in SCADA how to handle the growing systems: Menace to process automation
    • DOI 10.1049/cce:20050306
    • T. Brown, "Security in SCADA systems: How to handle the growing menace to process automation," IEE Comp. and Control Eng., vol. 16, no. 3, Jun./Jul. 2005, pp.42-47. (Pubitemid 40860336)
    • (2005) IEE Computing and Control Engineering , vol.16 , Issue.3 , pp. 42-47
    • Brown, T.1
  • 18
    • 70349170749 scopus 로고    scopus 로고
    • System level security modeling using attack trees
    • Karachi, Pakistan, Feb.
    • P. Khand, "System level security modeling using attack trees," in Proc. 2nd Int. Conf. Comput., Control, Commun. (ICA), Karachi, Pakistan, Feb. 2009, pp. 1-6.
    • (2009) Proc. 2nd Int. Conf. Comput., Control, Commun. (ICA) , pp. 1-6
    • Khand, P.1
  • 19
    • 33747585156 scopus 로고    scopus 로고
    • Assessment of interactions between power and telecommunications infrastructures
    • DOI 10.1109/TPWRS.2006.876692
    • K. Schneider, C.-C. Liu, and J.-P. Paul, "Assessment of interactions between power and telecommunications infrastructures," IEEE Trans. Power Sys., vol. 21, pp. 1123-1130, Aug. 2006. (Pubitemid 44263503)
    • (2006) IEEE Transactions on Power Systems , vol.21 , Issue.3 , pp. 1123-1130
    • Schneider, K.1    Liu, C.-C.2    Paul, J.-P.3
  • 20
    • 42549101645 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for scada systems using attack trees
    • Tampa, FL, Jun.
    • C.-W. Ten, C.-C. Liu, and M. Govindarasu, "Vulnerability assessment of cybersecurity for scada systems using attack trees," in IEEE Power Eng. Soc. Gen. Meet., Tampa, FL, Jun. 2007, pp. 1-6.
    • (2007) IEEE Power Eng. Soc. Gen. Meet. , pp. 1-6
    • Ten, C.-W.1    Liu, C.-C.2    Govindarasu, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.