메뉴 건너뛰기




Volumn 11, Issue 2, 2016, Pages 216-227

A method for describing industrial control system network attack using object Petri net

Author keywords

Industrial control system; Information security; Network attack description; Object Petri net; Smart substation

Indexed keywords

CONTROL SYSTEMS; PETRI NETS; SECURITY OF DATA;

EID: 84956833000     PISSN: 19314973     EISSN: 19314981     Source Type: Journal    
DOI: 10.1002/tee.22209     Document Type: Article
Times cited : (4)

References (40)
  • 5
    • 0030148551 scopus 로고    scopus 로고
    • Object-oriented Petri nets for modelling and analysis of automated manufacturing systems
    • Wang L. Object-oriented Petri nets for modelling and analysis of automated manufacturing systems. Computer Integrated Manufacturing Systems 1996; 9(2):111-125.
    • (1996) Computer Integrated Manufacturing Systems , vol.9 , Issue.2 , pp. 111-125
    • Wang, L.1
  • 7
    • 74549144718 scopus 로고    scopus 로고
    • RFC 5070: the incident object description exchange format
    • Internet Engineering Task Force (IETF)
    • Danyliw R, Meijer J, Demchenko Y. RFC 5070: the incident object description exchange format. Internet Engineering Task Force (IETF), 2007.
    • (2007)
    • Danyliw, R.1    Meijer, J.2    Demchenko, Y.3
  • 9
    • 85018000075 scopus 로고    scopus 로고
    • The incident object description exchange format data model and XML implementation
    • Meijer J, Danyliw R, Demchenko Y. The incident object description exchange format data model and XML implementation, 2004.
    • (2004)
    • Meijer, J.1    Danyliw, R.2    Demchenko, Y.3
  • 10
    • 84908227974 scopus 로고    scopus 로고
    • Security automation and threat information-sharing options
    • Kampanakis P. Security automation and threat information-sharing options. IEEE Security & Privacy 2014; 12(5):42-51.
    • (2014) IEEE Security & Privacy , vol.12 , Issue.5 , pp. 42-51
    • Kampanakis, P.1
  • 12
    • 84908408435 scopus 로고    scopus 로고
    • Developing an ontology of the cyber security domain. STIDS
    • Obrst L, Chase P, Markeloff R. Developing an ontology of the cyber security domain. STIDS, 2012.
    • (2012)
    • Obrst, L.1    Chase, P.2    Markeloff, R.3
  • 13
    • 84891302256 scopus 로고    scopus 로고
    • Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™)
    • MITRE Corporation
    • Barnum S. Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™). MITRE Corporation, 2012.
    • (2012)
    • Barnum, S.1
  • 14
    • 84956763207 scopus 로고    scopus 로고
    • Information with the Structured Threat Information eXpression (STIX™). .
    • Barnum S. Information with the Structured Threat Information eXpression (STIX™). 2013.
    • (2013)
    • Barnum, S.1
  • 15
    • 84956733598 scopus 로고    scopus 로고
    • The Trusted Automated eXchange of Indicator Information (TAXII™). .
    • Connolly J, Davidson M, Richard M, Skorupka C. The Trusted Automated eXchange of Indicator Information (TAXII™). 2012.
    • (2012)
    • Connolly, J.1    Davidson, M.2    Richard, M.3    Skorupka, C.4
  • 16
    • 84956732312 scopus 로고    scopus 로고
    • The state of security automation standards-2011. .
    • McGuire GT, Reid EE. The state of security automation standards-2011. 2011.
    • (2011)
    • McGuire, G.T.1    Reid, E.E.2
  • 17
    • 85034853262 scopus 로고
    • Introduction to general net theory
    • In, vol. Brauer W (ed). Springer: Berlin and Heidelberg; ; -.
    • Petri CA. Introduction to general net theory. In Net Theory and Applications, vol. 84. Brauer W (ed). Springer: Berlin and Heidelberg; 1980; 1-19.
    • (1980) Net Theory and Applications , vol.84 , pp. 1-19
    • Petri, C.A.1
  • 18
    • 77958523395 scopus 로고    scopus 로고
    • Research on modeling and simulation of cruise missile interception system based on object-oriented Petri net
    • Vol. . IEEE: Chengdu, China; ; -.
    • Yu L, Shuo T. Research on modeling and simulation of cruise missile interception system based on object-oriented Petri net. 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Vol. 6. IEEE: Chengdu, China; 2010; 9-11.
    • (2010) 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) , vol.6 , pp. 9-11
    • Yu, L.1    Shuo, T.2
  • 19
    • 0001859277 scopus 로고    scopus 로고
    • An integrated object-oriented Petri net paradigm for manufacturing control systems
    • Wang L. An integrated object-oriented Petri net paradigm for manufacturing control systems. International Journal of Computer Integrated Manufacturing 1996; 9(1):73-87.
    • (1996) International Journal of Computer Integrated Manufacturing , vol.9 , Issue.1 , pp. 73-87
    • Wang, L.1
  • 20
    • 78651270818 scopus 로고    scopus 로고
    • Modeling of reconfigurable manufacturing systems based on colored timed object-oriented Petri nets
    • Meng X. Modeling of reconfigurable manufacturing systems based on colored timed object-oriented Petri nets. Journal of Manufacturing Systems 2010; 29(2):81-90.
    • (2010) Journal of Manufacturing Systems , vol.29 , Issue.2 , pp. 81-90
    • Meng, X.1
  • 21
    • 0034593376 scopus 로고    scopus 로고
    • Attack net penetration testing
    • In . Zurko ME, Greenwald SJ (ed). ACM: Victoria, Canada; ; -.
    • McDermott JP. Attack net penetration testing. In Proceedings of the 2000 workshop on New security paradigms. Zurko ME, Greenwald SJ (ed). ACM: Victoria, Canada; 2001; 15-18.
    • (2001) Proceedings of the 2000 workshop on New security paradigms , pp. 15-18
    • McDermott, J.P.1
  • 22
    • 0034497238 scopus 로고    scopus 로고
    • Software modeling and analysis using a hierarchical object-oriented Petri net
    • Hong J, Bae D. Software modeling and analysis using a hierarchical object-oriented Petri net. Information Sciences 2000; 130(1):133-164.
    • (2000) Information Sciences , vol.130 , Issue.1 , pp. 133-164
    • Hong, J.1    Bae, D.2
  • 23
    • 40349110120 scopus 로고    scopus 로고
    • From formal specifications to ready-to-use software components: the concurrent object oriented Petri Net approach
    • Newcastle Upon Tyne, UK, 99-110.
    • Chachkov S, Buchs D. From formal specifications to ready-to-use software components: the concurrent object oriented Petri Net approach. 2001 International Conference on Application of Concurrency to System Design, Newcastle Upon Tyne, UK, 2001; 99-110.
    • (2001) 2001 International Conference on Application of Concurrency to System Design
    • Chachkov, S.1    Buchs, D.2
  • 24
    • 84881303122 scopus 로고    scopus 로고
    • Reusable object-oriented model
    • Žáček J, Huňka F. Reusable object-oriented model. e-Informatica 2013; 7(1):35-44.
    • (2013) e-Informatica , vol.7 , Issue.1 , pp. 35-44
    • Žáček, J.1    Huňka, F.2
  • 26
    • 81255140876 scopus 로고    scopus 로고
    • A survey on the object-oriented Petri net modeling
    • Liu Y, Fu J, Feng H. A survey on the object-oriented Petri net modeling. Applied Mechanics and Materials 2012; 121:4350-4356.
    • (2012) Applied Mechanics and Materials , vol.121 , pp. 4350-4356
    • Liu, Y.1    Fu, J.2    Feng, H.3
  • 29
    • 84956741684 scopus 로고    scopus 로고
    • The data acquisition in smart substation of China
    • In . Karakehayov Z (ed). InTech Open Access Publisher: Rijeka, Croatia; ; -.
    • Fan C. The data acquisition in smart substation of China. In Data Acquisition Applications. Karakehayov Z (ed). InTech Open Access Publisher: Rijeka, Croatia; 2012; 123-164.
    • (2012) Data Acquisition Applications , pp. 123-164
    • Fan, C.1
  • 30
    • 84869593595 scopus 로고    scopus 로고
    • Research on smart substation equipment condition monitoring system based on wireless sensor networks
    • In . Sénac P, Ott M, Seneviratne A (ed). Springer: Berlin and Heidelberg; vol. ; -.
    • Jie H, Huang X, Yang Y. Research on smart substation equipment condition monitoring system based on wireless sensor networks. In Wireless Communications and Applications. Sénac P, Ott M, Seneviratne A (ed). Springer: Berlin and Heidelberg; vol. 2012; 75-89.
    • (2012) Wireless Communications and Applications , pp. 75-89
    • Jie, H.1    Huang, X.2    Yang, Y.3
  • 31
    • 84863699190 scopus 로고    scopus 로고
    • Authentication and integrity in the smart grid: an empirical study in substation automation systems
    • Xiang L, Wang W, Ma J. Authentication and integrity in the smart grid: an empirical study in substation automation systems. International Journal of Distributed Sensor Networks 2012; 2012:1-13.
    • (2012) International Journal of Distributed Sensor Networks , vol.2012 , pp. 1-13
    • Xiang, L.1    Wang, W.2    Ma, J.3
  • 34
    • 84870797793 scopus 로고    scopus 로고
    • Requirements and proposed solutions for future smart distribution substations
    • Valtari J, Verho P. Requirements and proposed solutions for future smart distribution substations. Journal of Energy and Power Engineering 2011; 5(8):766-775.
    • (2011) Journal of Energy and Power Engineering , vol.5 , Issue.8 , pp. 766-775
    • Valtari, J.1    Verho, P.2
  • 37
    • 84956733421 scopus 로고    scopus 로고
    • CPN tools, Accessed April 16, 2015.
    • Westergaard M, Verbeek H. CPN tools, 2012. http://www.daimi.au.dk/CPNTools. Accessed April 16, 2015.
    • (2012)
    • Westergaard, M.1    Verbeek, H.2
  • 40
    • 37549002621 scopus 로고    scopus 로고
    • CPN tools state space manual
    • Department of Computer Science, Univerisity of Aarhus
    • Jensen K, Christensen S, Kristensen LM. CPN tools state space manual. Department of Computer Science, Univerisity of Aarhus, 2006.
    • (2006)
    • Jensen, K.1    Christensen, S.2    Kristensen, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.