메뉴 건너뛰기




Volumn , Issue , 2013, Pages 664-669

Industrial control systems security: What is happening?

Author keywords

[No Author keywords available]

Indexed keywords

GROWING BODIES; INDUSTRIAL CONTROL SYSTEMS; PAPER SURVEYS; RESEARCH EFFORTS; SECURITY GOALS; SECURITY ISSUES; SECURITY RESEARCH; STATE OF THE ART;

EID: 84889002308     PISSN: 19354576     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INDIN.2013.6622963     Document Type: Conference Paper
Times cited : (47)

References (58)
  • 1
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding, and analyzing critical infrastructure interdependencies
    • S.Rinaldi, J.Peerenboom, and T.Kelly, "Identifying, understanding, and analyzing critical infrastructure interdependencies," Control Systems, vol.21, no.6, pp.11-25, 2001.
    • (2001) Control Systems , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 2
    • 84889027178 scopus 로고    scopus 로고
    • From insider threats to business processes that are secure-by-design
    • D.Gollmann, "From insider threats to business processes that are secure-by-design," in INCoS, 2011, p.627.
    • (2011) INCoS , pp. 627
    • Gollmann, D.1
  • 3
    • 84889046029 scopus 로고    scopus 로고
    • Network secures process control
    • E.Byres, "Network secures process control," InTech Magazine, 1998.
    • (1998) InTech Magazine
    • Byres, E.1
  • 5
    • 84889037843 scopus 로고    scopus 로고
    • Project Basecamp
    • "Project Basecamp," http://www.digitalbond.com/tools/basecamp, 2011.
  • 8
    • 84918595407 scopus 로고    scopus 로고
    • HERE BE BACKDOORS: A jorney into the secrets of industrial firmware
    • -,"HERE BE BACKDOORS: A jorney into the secrets of industrial firmware," Black Hat USA, 2012.
    • (2012) Black Hat USA
    • Santamarta, R.1
  • 9
    • 84889061540 scopus 로고    scopus 로고
    • Vulnerability disclosure policy
    • "Vulnerability disclosure policy," http://ics-cert.us-cert.gov/ icscert/ disclosure.html, ICS-CERT(USA), 2012.
  • 11
    • 84888987274 scopus 로고    scopus 로고
    • J.C.Matherly man SHODAN
    • J.C.Matherly, "man SHODAN," http://www.shodanhq.com/help, 2009.
  • 13
    • 84889013121 scopus 로고    scopus 로고
    • R.Lagner, "Blog," http://www.langner.com/en/blog/, 2010.
    • (2010)
    • Lagner, R.1
  • 19
    • 84155171697 scopus 로고    scopus 로고
    • DNPSec: Distributed network protocol version 3 (DNP3) security framework
    • M.Majdalawieh, F.Parisi-Presicce, and D.Wijesekera, "DNPSec: Distributed network protocol version 3 (DNP3) security framework," in Advances in CISSE, 2006, pp.227-234.
    • (2006) Advances in CISSE , pp. 227-234
    • Majdalawieh, M.1    Parisi-Presicce, F.2    Wijesekera, D.3
  • 20
    • 84874480673 scopus 로고    scopus 로고
    • SCADA protocol vulnerabilities
    • J.Rrushi, "SCADA protocol vulnerabilities," ser.LNCS, 2012, vol.7130, pp.150-176.
    • (2012) Ser.LNCS , vol.7130 , pp. 150-176
    • Rrushi, J.1
  • 22
    • 55549084566 scopus 로고    scopus 로고
    • Combating memory corruption attacks on scada devices
    • C.Bellettini and J.Rrushi, "Combating memory corruption attacks on scada devices," in CIP II, 2009, pp.141-156.
    • (2009) CIP II , pp. 141-156
    • Bellettini, C.1    Rrushi, J.2
  • 23
    • 70449642862 scopus 로고    scopus 로고
    • Exploring security in PROFINET IO
    • J.A kerberg and M.Bjorkman, "Exploring security in PROFINET IO," in COMPSAC, 2009, pp.406-412.
    • (2009) COMPSAC , pp. 406-412
    • Kerberg, J.A..1    Bjorkman, M.2
  • 24
    • 70350453950 scopus 로고    scopus 로고
    • Exploring network security in PROFIsafe
    • -,"Exploring network security in PROFIsafe," in SAFECOMP, 2009, pp.67-80.
    • (2009) SAFECOMP , pp. 67-80
    • Kerberg, J.A..1    Bjorkman, M.2
  • 25
  • 26
    • 80055005133 scopus 로고    scopus 로고
    • Myth or reality-Does the aurora vulnerability pose a risk to my generator
    • M.Zeller, "Myth or reality-does the aurora vulnerability pose a risk to my generator?" in Annual Conference for Protective Relay Engineers, 2011, pp.130-136.
    • (2011) Annual Conference for Protective Relay Engineers , pp. 130-136
    • Zeller, M.1
  • 28
    • 84869391514 scopus 로고    scopus 로고
    • On dynamic malware payloads aimed at programmable logic controllers
    • S.McLaughlin, "On dynamic malware payloads aimed at programmable logic controllers," in HotSec, 2011.
    • (2011) HotSec
    • McLaughlin, S.1
  • 29
    • 84864202667 scopus 로고    scopus 로고
    • A first look into SCADA network traffic
    • R.R.R.Barbosa, R.Sadre, and A.Pras, "A first look into SCADA network traffic," in NOMS, 2012, pp.518-521.
    • (2012) NOMS , pp. 518-521
    • Barbosa, R.R.R.1    Sadre, R.2    Pras, A.3
  • 30
    • 84866543673 scopus 로고    scopus 로고
    • Challenges and opportunities in securing industrial control systems
    • D.Had?ziosmanovíc, D.Bolzoni, S.Etalle, and P.H.Hartel, "Challenges and opportunities in securing industrial control systems," in COMPENG, 2012, pp.1-6.
    • (2012) COMPENG , pp. 1-6
    • Hadziosmanovic, D.1    Bolzoni, D.2    Etalle, S.3    Hartel, P.H.4
  • 32
    • 77955698013 scopus 로고    scopus 로고
    • An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
    • I.Fovino, M.Masera, L.Guidi, and G.Carpi, "An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants," in Human System Interactions, 2010, pp.679-686.
    • (2010) Human System Interactions , pp. 679-686
    • Fovino, I.1    Masera, M.2    Guidi, L.3    Carpi, G.4
  • 35
    • 79956009493 scopus 로고    scopus 로고
    • Attacks against process control systems: Risk assessment, detection, and response
    • A.A.Ćardenas, S.Amin, Z.-S.Lin, Y.-L.Huang, C.-Y.Huang, and S.Sastry, "Attacks against process control systems: risk assessment, detection, and response." in ASIACCS, 2011, pp.355-366.
    • (2011) ASIACCS , pp. 355-366
    • Cardenas, A.A.1    Amin, S.2    Lin, Z.-S.3    Huang, Y.-L.4    Huang, C.-Y.5    Sastry, S.6
  • 36
    • 84958755281 scopus 로고    scopus 로고
    • A plant-wide industrial process control security problem
    • T.McEvoy and S.Wolthusen, "A plant-wide industrial process control security problem," in CIP V, 2011, pp.47-56.
    • (2011) CIP v , pp. 47-56
    • McEvoy, T.1    Wolthusen, S.2
  • 38
    • 78651084507 scopus 로고    scopus 로고
    • Detecting sensor signal manipulations in non-linear chemical processes
    • T.McEvoy and S.Wolthusen, "Detecting sensor signal manipulations in non-linear chemical processes," in CIP IV, 2010, vol.342, pp.81-94.
    • (2010) CIP IV , vol.342 , pp. 81-94
    • McEvoy, T.1    Wolthusen, S.2
  • 39
    • 84893445259 scopus 로고    scopus 로고
    • SCADA-specific intrusion detection/prevention systems: A survey and taxonomy
    • B.Zhu and S.Sastry, "SCADA-specific intrusion detection/prevention systems: a survey and taxonomy," in WSCS, 2010.
    • (2010) WSCS
    • Zhu, B.1    Sastry, S.2
  • 40
    • 84859034021 scopus 로고    scopus 로고
    • Difficulties in modeling SCADA traffic: A comparative analysis
    • R.R.R.Barbosa, R.Sadre, and A.Pras, "Difficulties in modeling SCADA traffic: A comparative analysis," ser.LNCS, vol.7192, 2012, pp.126-135.
    • (2012) Ser.LNCS , vol.7192 , pp. 126-135
    • Barbosa, R.R.R.1    Sadre, R.2    Pras, A.3
  • 42
    • 84864405337 scopus 로고    scopus 로고
    • An ontology for identifying cyber intrusion induced faults in process control systems
    • J.Hieb, J.Graham, and J.Guan, "An ontology for identifying cyber intrusion induced faults in process control systems," in Critical Infrastructure Protection III, 2009, pp.125-138.
    • (2009) Critical Infrastructure Protection III , pp. 125-138
    • Hieb, J.1    Graham, J.2    Guan, J.3
  • 43
    • 84857408165 scopus 로고    scopus 로고
    • A formal adversary capability model for SCADA environments
    • T.R.McEvoy and S.D.Wolthusen, "A formal adversary capability model for SCADA environments," in CRITIS, 2011, pp.93-103.
    • (2011) CRITIS , pp. 93-103
    • McEvoy, T.R.1    Wolthusen, S.D.2
  • 45
    • 51849091527 scopus 로고    scopus 로고
    • Secure control: Towards survivable cyber-physical systems
    • A.A.Ćardenas, S.Amin, and S.Sastry, "Secure control: Towards survivable cyber-physical systems," in WCPS, 2008, pp.495-500.
    • (2008) WCPS , pp. 495-500
    • Cardenas, A.A.1    Amin, S.2    Sastry, S.3
  • 46
    • 84857516371 scopus 로고    scopus 로고
    • A taxonomy of cyber attacks on SCADA systems
    • B.Zhu, A.Joseph, and S.Sastry, "A taxonomy of cyber attacks on SCADA systems," in iThings/CPSCom, 2011, pp.380-388.
    • (2011) IThings/CPSCom , pp. 380-388
    • Zhu, B.1    Joseph, A.2    Sastry, S.3
  • 47
    • 84863496164 scopus 로고    scopus 로고
    • Veracity plausibility and reputation
    • D.Gollmann, "Veracity, plausibility, and reputation." ser.LNCS, vol.7322, 2012, pp.20-28.
    • (2012) Ser.LNCS , vol.7322 , pp. 20-28
    • Gollmann, D.1
  • 48
    • 84986272600 scopus 로고    scopus 로고
    • Impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems
    • B.Genge, C.Siaterlis, and M.Hohenadel, "Impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems," IJCCC, vol.7, no.4, pp.673-686.
    • IJCCC , vol.7 , Issue.4 , pp. 673-686
    • Genge, B.1    Siaterlis, C.2    Hohenadel, M.3
  • 49
    • 70149102885 scopus 로고    scopus 로고
    • Understanding the physical and economic consequences of attacks against control systems
    • Y.Huang, A.Cardenas, S.Amin, S.-Z.Lin, H.-Y.Tsai, and S.S.Sastry, "Understanding the physical and economic consequences of attacks against control systems." IJCIP, vol.2, no.3, pp.72-83, 2009.
    • (2009) IJCIP , vol.2 , Issue.3 , pp. 72-83
    • Huang, Y.1    Cardenas, A.2    Amin, S.3    Lin, Z.-S.4    Tsai, H.-Y.5    Sastry, S.S.6
  • 50
    • 67650109811 scopus 로고    scopus 로고
    • Safe and secure networked control systems under denial-of-service attacks
    • S.Amin, A.A.Ćardenas, and S.Sastry, "Safe and secure networked control systems under denial-of-service attacks." ser.LNCS, 2009, pp.31-45.
    • (2009) Ser.LNCS , pp. 31-45
    • Amin, S.1    Cardenas, A.A.2    Sastry, S.3
  • 51
    • 84864415794 scopus 로고    scopus 로고
    • A log mining approach for process monitoring in SCADA
    • D.Dina Had?ziosmanovíc and D.Bolzoni and P.H.Hartel, "A log mining approach for process monitoring in SCADA," IJIS, vol.11, pp.231-251, 2012.
    • (2012) IJIS , vol.11 , pp. 231-251
    • Hadziosmanovic, D.D.1    Bolzoni, D.2    Hartel, P.H.3
  • 52
    • 84879779698 scopus 로고    scopus 로고
    • Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
    • N.Goldenberg and A.Wool, "Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems," IJCIP, no.0, 2013.
    • (2013) IJCIP
    • Goldenberg, N.1    Wool, A.2
  • 54
    • 21644467485 scopus 로고    scopus 로고
    • Human-assisted intrusion detection for process control systems
    • M.Naedele and O.Biderbost, "Human-assisted intrusion detection for process control systems," in ACNS, 2004, pp.216-225.
    • (2004) ACNS , pp. 216-225
    • Naedele, M.1    Biderbost, O.2
  • 55
    • 80052082857 scopus 로고    scopus 로고
    • An exploration of defensive deception in industrial communication networks
    • J.L.Rrushi, "An exploration of defensive deception in industrial communication networks," IJCIP, vol.4, no.4, 2011.
    • (2011) IJCIP , vol.4 , Issue.4
    • Rrushi, J.L.1
  • 56
    • 84867893847 scopus 로고    scopus 로고
    • N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
    • D.Had?ziosmanovíc, L.Simionato, D.Bolzoni, E.Zambon, and S.Etalle, "N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols," ser.LNCS, vol.7462, 2012, pp.354-373.
    • (2012) Ser.LNCS , vol.7462 , pp. 354-373
    • Hadziosmanovic, D.1    Simionato, L.2    Bolzoni, D.3    Zambon, E.4    Etalle, S.5
  • 58
    • 84889022780 scopus 로고    scopus 로고
    • Abnormal Situation Management
    • "Abnormal Situation Management," http://www.asmconsortium.net.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.