메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1508-1513

Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure

Author keywords

critical infrastructure; cybersecurity; GOOSE messages; IEC 61850; substation security

Indexed keywords

CYBER INFRASTRUCTURES; CYBER SECURITY; GENERIC OBJECT ORIENTED SUB-STATION EVENTS; GOOSE MESSAGES; IEC 61850; SECURITY ISSUES; SUBSTATION NETWORKS; SUBSTATION SECURITY;

EID: 84875657451     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOMW.2012.6477809     Document Type: Conference Paper
Times cited : (104)

References (19)
  • 2
    • 84875665411 scopus 로고    scopus 로고
    • Comparing the reliability of ethernet network topologies in substation control and monitoring networks
    • SEL, Pullman, WA, April
    • G. Scheer and D. Dolezilek, "Comparing the reliability of Ethernet network topologies in substation control and monitoring networks,". Technical Applications Document. SEL, Pullman, WA, April 2000, [Online]. Available: http://www2.selinc.com/techpprs/6103.pdfhttp://www2.selinc.com/ techpprs/6103.pdf
    • (2000) Technical Applications Document
    • Scheer, G.1    Dolezilek, D.2
  • 3
    • 84875653563 scopus 로고    scopus 로고
    • Information analysis and infrastructure protection
    • Department of Homeland Security. "Information analysis and infrastructure protection,". Critical Infrastructure Information Act of 2002, [Online]. Available: http://www.dhs.gov/xlibrary/assets/CII-Act.pdf
    • Critical Infrastructure Information Act of 2002
  • 7
    • 84893813730 scopus 로고    scopus 로고
    • IEC 61850 over wimax for fast isolation and restoration of faults in distribution networks
    • M. Goraj, L. Lipes, and J. McGhee, "IEC 61850 over Wimax for fast isolation and restoration of faults in distribution networks,", PacWorld Conference, 2011. Available: http://es.scribd.com/doc/78041627/74994185-Iec- 61850-Goose-Over-Wimax-Pac-World-2011
    • (2011) PacWorld Conference
    • Goraj, M.1    Lipes, L.2    McGhee, J.3
  • 9
    • 84875656474 scopus 로고    scopus 로고
    • Power systems management and associated information exchange, data and communication security
    • IEC
    • IEC, Power systems management and associated information exchange, data and communication security. IEC standard 62351, 2007.
    • (2007) IEC Standard 62351
  • 11
    • 84875680193 scopus 로고    scopus 로고
    • The protection of substation communications
    • January Miami, USA
    • Alvarez, K. Hansen, and K. McGrath. "The Protection of Substation Communications,". Proc. of S4 2010: SCADA Security Scientific Symposium, January 2010, Miami, USA Available: http://www.cl.cam.ac.uk/~sf392/publications/ S4-2010.pdf
    • (2010) Proc. of S4 2010: SCADA Security Scientific Symposium
    • Hansen, A.K.1    McGrath, K.2
  • 12
    • 0010686220 scopus 로고    scopus 로고
    • IEC Specific communication service mapping. IEC standard 61850.5
    • IEC, Communication networks and systems in substation, Specific communication service mapping. IEC standard 61850.5. 2008.
    • (2008) Communication Networks and Systems in Substation
  • 13
    • 84979805467 scopus 로고    scopus 로고
    • The cost of protecion measures in tactical networks
    • 29 November - 2 December Orlando, Florida
    • th Army Science Conference 29 November - 2 December 2005, Orlando, Florida http://www.dtic.mil/dtic/tr/fulltext/u2/ a432010.pdf
    • (2005) th Army Science Conference
    • Matt, B.J.1
  • 16
    • 79251619734 scopus 로고    scopus 로고
    • Siemens: Stuxnet worm hit industrial systems
    • September 14
    • R. McMillan, "Siemens: Stuxnet worm hit industrial systems,". Computerworld, September 14 2010 [Online]. Available: http://www.computerworld. com/s/article/print/9185419/Siemens-Stuxnet-worm-hit-industrial-systems
    • (2010) Computerworld
    • McMillan, R.1
  • 17
    • 84875674727 scopus 로고    scopus 로고
    • Understanding, preventing, and defending against layer 2 attacks
    • L. Senecal, "Understanding, preventing, and defending against layer 2 attacks," Cisco Expo 2009. [Online]. Available: http://www.cisco.com/web/ ME/exposaudi2009/assets/docs/layer2-attacks-and-mitigation-t.pdf
    • Cisco Expo 2009
    • Senecal, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.