메뉴 건너뛰기




Volumn 78, Issue , 2015, Pages 251-269

Specialized honeypots for scada systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84934878440     PISSN: 22138986     EISSN: 22138994     Source Type: Book Series    
DOI: 10.1007/978-3-319-18302-2_16     Document Type: Article
Times cited : (21)

References (37)
  • 1
    • 84934879114 scopus 로고    scopus 로고
    • Enterprise-control system integration part 1: Models and terminology
    • ANSI/ISA-95.00.01
    • ANSI/ISA-95.00.01 (2000) Enterprise-control system integration part 1: models and terminology, ISA 2000
    • (2000) ISA , pp. 2000
  • 2
    • 33750376598 scopus 로고    scopus 로고
    • The nepenthes platform: An efficient approach to collect malware
    • Recent advances in intrusion detection, Springer, Berlin
    • Baecher P, Koetter M, Holz T, Dornseif M, Freiling F (2006) The nepenthes platform: an efficient approach to collect malware. In: Recent advances in intrusion detection. Lecture Notes in Computer Science, vol 4219, pp 165–184. Springer, Berlin
    • (2006) Lecture Notes in Computer Science , vol.4219 , pp. 165-184
    • Baecher, P.1    Koetter, M.2    Holz, T.3    Dornseif, M.4    Freiling, F.5
  • 4
    • 0003343295 scopus 로고
    • A simple network management protocol (SNMP)
    • May
    • Case J, Fedor M, Schoffstall M, Davin  J. (1990) A simple network management protocol (SNMP), IETF RFC 1157, May 1990
    • (1990) IETF RFC , vol.1157
    • Case, J.1    Fedor, M.2    Schoffstall, M.3    Davin, J.4
  • 5
    • 84934879115 scopus 로고    scopus 로고
    • Project, Accessed 10 Sept 2013
    • Cisco Critical Infrastructure Assurance Group-CIAG (2004) SCADA HoneyNet Project, http://scadahoneynet.sourceforge.net/. Accessed 10 Sept 2013
    • (2004) SCADA Honeynet
  • 10
    • 84934879117 scopus 로고    scopus 로고
    • March, Accessed 10 Sept
    • Debar H, Curry D, Feinstein B (2007) Rfc 4765: The intrusion detection message exchange format (IDMEF), March 2007. http://www.ietf.org/rfc/rfc4765.txt. Accessed 10 Sept 2013
    • (2007) Rfc 4765
    • Debar, H.1    Curry, D.2    Feinstein, B.3
  • 11
    • 84934879118 scopus 로고    scopus 로고
    • Digital Bond, Accessed 10 Sept 2013
    • Digital Bond (2006) SCADA honeynet. http://www.digitalbond.com/tools/scada-honeynet/. Accessed 10 Sept 2013
    • (2006) SCADA Honeynet
  • 16
    • 33750405289 scopus 로고    scopus 로고
    • Security issues in SCADA networks
    • Igure V, Laughter S, Williams R (2006) Security issues in SCADA networks. Comput Secur 25 (7):498–506. doi:10.1016/j.cose.2006.03.001
    • (2006) Comput Secur , vol.25 , Issue.7 , pp. 498-506
    • Igure, V.1    Laughter, S.2    Williams, R.3
  • 17
    • 84934879119 scopus 로고    scopus 로고
    • Security for industrial automation and control systems—part 1: Terminology, concepts
    • ISA-99.00.01
    • ISA-99.00.01 (2007) Security for industrial automation and control systems—part 1: terminology, concepts, and models. American National Standard, Research Triangle Park
    • (2007) American National Standard, Research Triangle Park
  • 18
    • 80052113604 scopus 로고    scopus 로고
    • Proposal strategies of key management for data encryption in SCADA network of electric power systems
    • Kang DJ, Lee JJ, Kim BH, Hur D (2011) Proposal strategies of key management for data encryption in SCADA network of electric power systems. Int J Electr Power Energy Syst 33 (9):1521–1526
    • (2011) Int J Electr Power Energy Syst , vol.33 , Issue.9 , pp. 1521-1526
    • Kang, D.J.1    Lee, J.J.2    Kim, B.H.3    Hur, D.4
  • 20
    • 70649112112 scopus 로고    scopus 로고
    • Libpcap, Accessed 10 Sept 2013
    • Libpcap (2010) TCPDUMP/LIBPCAP public repository. http://www.tcpdump.org/. Accessed 10 Sept 2013
    • (2010) TCPDUMP/LIBPCAP Public Repository
  • 25
    • 84934879121 scopus 로고    scopus 로고
    • Net-SNMP, Accessed 10 Sept 2013
    • Net-SNMP (2000) Net-SNMP. http://www.net-snmp.org/. Accessed 10 Sept 2013
    • (2000) Net-Snmp
  • 26
    • 85084163190 scopus 로고    scopus 로고
    • Proceedings of the 13th conference on USENIX security symposium—(SSYM’04), USENIX Association, Berkeley
    • Provos N (2004) A virtual honeypot framework. In: Proceedings of the 13th conference on USENIX security symposium—(SSYM’04), vol 13. USENIX Association, Berkeley, p 1
    • (2004) A Virtual Honeypot Framework , vol.13 , pp. 1
    • Provos, N.1
  • 27
    • 84934879122 scopus 로고    scopus 로고
    • Pymodbus, Accessed 10 Sept 2013
    • Pymodbus (2011) A Modbus protocol stack in python. http://code.google.com/p/pymodbus/.Accessed 10 Sept 2013
    • (2011) A Modbus Protocol Stack in Python
  • 28
    • 84934875744 scopus 로고    scopus 로고
    • Raspberry Pi Foundation, Accessed 10 Sept 2013
    • Raspberry Pi Foundation (2012) What is Raspberry Pi? http://www.raspberrypi.org/. Accessed 10 Sept 2013
    • (2012) What is Raspberry Pi
  • 31
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems
    • Ten C, Liu C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836–1846. doi:10.1109/TPWRS.2008.2002298
    • (2008) IEEE Trans Power Syst , vol.23 , Issue.4 , pp. 1836-1846
    • Ten, C.1    Liu, C.2    Manimaran, G.3
  • 32
    • 84934873712 scopus 로고    scopus 로고
    • Triangle MicroWorks Inc, Raleigh, North Carolina, Accessed 10 Sept 2013
    • Triangle MicroWorks Inc (2002) DNP3 overview, Raleigh, North Carolina. http://www.trianglemicroworks.com/documents/DNP3_Overview.pdf. Accessed 10 Sept 2013
    • (2002) DNP3 Overview
  • 36
    • 84934879125 scopus 로고    scopus 로고
    • Waterfall Security Solutions Ltd, Accessed 10 Sept 2013
    • Waterfall Security Solutions Ltd. (2013) Waterfall one-way. http://www.waterfall-security.com/category/products/scada-protocols/. Accessed 10 Sept 2013
    • (2013) Waterfall One-Way
  • 37
    • 84857516371 scopus 로고    scopus 로고
    • Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (ITHINGSCPSCOM ‘11). IEEE Computer Society, Washington
    • Zhu B, Joseph A, Sastry S. (2011) A taxonomy of cyber attacks on SCADA systems. In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (ITHINGSCPSCOM ‘11). IEEE Computer Society, Washington, pp 380–388
    • (2011) A Taxonomy of Cyber Attacks on SCADA Systems , pp. 380-388
    • Zhu, B.1    Joseph, A.2    Sastry, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.