메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1-439

Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL INFRASTRUCTURES; ELECTRIC POWER SYSTEM SECURITY; ELECTRIC POWER TRANSMISSION NETWORKS; GAS INDUSTRY; PUBLIC WORKS; SCADA SYSTEMS; SMART POWER GRIDS;

EID: 84987802592     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-420114-9.00018-6     Document Type: Book
Times cited : (183)

References (175)
  • 2
    • 84987806715 scopus 로고    scopus 로고
    • North American Electric Corporation (NERC), Princeton, NJ, approved January 24
    • North American Electric Corporation, Standard CIP-002-4, Cyber Security, Critical Cyber Asset Identification, North American Electric Corporation (NERC), Princeton, NJ, approved January 24, 2011.
    • (2011) Standard CIP-002-4, Cyber Security, Critical Cyber Asset Identification
  • 3
    • 84987806708 scopus 로고    scopus 로고
    • North American Electric Corporation (NERC), Princeton, NJ, approved January 24
    • North American Electric Corporation, Standard CIP-002-5.1, Cyber Security, Critical Cyber Asset Identification, North American Electric Corporation (NERC), Princeton, NJ, approved January 24, 2011.
    • (2011) Standard CIP-002-5.1, Cyber Security, Critical Cyber Asset Identification
  • 4
    • 84987806715 scopus 로고    scopus 로고
    • North American Electric Corporation (NERC), Princeton, NJ, approved January 24
    • North American Electric Corporation, Standard CIP-002-4, Cyber Security, Critical Cyber Asset Identification, North American Electric Corporation (NERC), Princeton, NJ, approved January 24, 2011.
    • (2011) Standard CIP-002-4, Cyber Security, Critical Cyber Asset Identification
  • 6
  • 8
    • 84987823953 scopus 로고    scopus 로고
    • SCADA and ICS for security experts: How to avoid cyberdouchery
    • July
    • J. Arlen, SCADA and ICS for security experts: how to avoid cyberdouchery. in: Proc. 2010 BlackHat Technical Conference, July 2010.
    • (2010) Proc. 2010 BlackHat Technical Conference
    • Arlen, J.1
  • 10
    • 84987839309 scopus 로고    scopus 로고
    • Red Tiger, Electricity for free? The dirty underbelly of SCADA and smart meters
    • Las Vegas, NV, July
    • J. Pollet, Red Tiger, Electricity for free? The dirty underbelly of SCADA and smart meters, in: Proc. 2010 BlackHat Technical Conference, Las Vegas, NV, July 2010.
    • (2010) Proc. 2010 BlackHat Technical Conference
    • Pollet, J.1
  • 11
    • 84987823956 scopus 로고    scopus 로고
    • The Open-Source Vulnerability Database (OSVDB) Project, ID Nos. 79399/79400, cited: December 20
    • The Open-Source Vulnerability Database (OSVDB) Project, ID Nos. 79399/79400. (cited: December 20, 2013)
    • (2013)
  • 13
    • 84987816590 scopus 로고    scopus 로고
    • cited: December 21
    • International Society of Automation (ISA). Standards & Practices 95. (cited: December 21, 2013).
    • (2013) Standards & Practices 95
  • 14
    • 84987823935 scopus 로고    scopus 로고
    • cited: December 21
    • Purdue Enterprise Reference Architecture (PERA), "Purdue Reference Model for CIM." (cited: December 21, 2013).
    • (2013) Purdue Reference Model for CIM
  • 18
    • 84987841372 scopus 로고    scopus 로고
    • Threat Post. Move Over Conficker, Web Threats are Top Enterprise Risk, cited: December 20
    • Threat Post. Move Over Conficker, Web Threats are Top Enterprise Risk. (cited: December 20, 2013)
    • (2013)
  • 20
    • 84987833471 scopus 로고    scopus 로고
    • McAfee. Global Energy Cyberattacks: "Night Dragon." February 10
    • McAfee. Global Energy Cyberattacks: "Night Dragon." February 10, 2011
    • (2011)
  • 22
    • 84987841387 scopus 로고    scopus 로고
    • SCADAhacker.com. Agora+ SCADA Exploit Pack for CANVAS, March 17, 2011. (cited: December 20
    • J. Langill, SCADAhacker.com. Agora+ SCADA Exploit Pack for CANVAS , March 17, 2011. (cited: December 20, 2013)
    • (2013)
    • Langill, J.1
  • 23
    • 84987796683 scopus 로고    scopus 로고
    • Gleg releases Ver 1.28 of the SCADA+ Exploit Pack for Immunity Canvas, October 8, cited: October 8, 2013
    • J. Langill, SCADAhacker.com. Gleg releases Ver 1.28 of the SCADA+ Exploit Pack for Immunity Canvas, October 8, 2013. (cited: October 8, 2013)
    • (2013)
    • Langill, J.1
  • 30
    • 84987825947 scopus 로고    scopus 로고
    • cited: January 1
    • Open-Source Vulnerability Database (OSVDB) Project. . (cited: January 1, 2013)
    • (2013)
  • 31
    • 84987806788 scopus 로고    scopus 로고
    • October 19, 2000 (cited: November 29
    • Ladder logic. , October 19, 2000 (cited: November 29, 2010).
    • (2010)
  • 34
    • 84987806779 scopus 로고    scopus 로고
    • PLCTutor.com, PLC operations, October, 19, 2000 (cited: November 29
    • PLCTutor.com, PLC operations. , October, 19, 2000 (cited: November 29, 2010).
    • (2010)
  • 35
    • 84987816636 scopus 로고    scopus 로고
    • OSIsoft, OSIsoft company overview, 2010 (cited: November 29
    • OSIsoft, OSIsoft company overview. , 2010 (cited: November 29, 2010).
    • (2010)
  • 36
    • 84987804613 scopus 로고    scopus 로고
    • Idaho National Laboratories, Control systems at risk: Sophisticated penetration testers show how to get through the defenses
    • October
    • J. Larson, Idaho National Laboratories, Control systems at risk: sophisticated penetration testers show how to get through the defenses, in: Proc. 2009 SANS European SCADA and Process Control Security Summit, October, 2009.
    • (2009) Proc. 2009 SANS European SCADA and Process Control Security Summit
    • Larson, J.1
  • 37
    • 84987804617 scopus 로고    scopus 로고
    • cited: January 6
    • DigitalBond, "Portaledge," , (cited: January 6, 2014).
    • (2014) Portaledge
  • 38
    • 84987804618 scopus 로고    scopus 로고
    • cited: January 6
    • DigitalBond, "Bandolier," , (cited: January 6, 2014).
    • (2014) Bandolier
  • 41
    • 84987801751 scopus 로고    scopus 로고
    • Stuxnet: a breakthrough, November, 2010 (cited: November 16
    • E. Chien, Symantec. Stuxnet: a breakthrough. , November, 2010 (cited: November 16, 2010).
    • (2010) Symantec
    • Chien, E.1
  • 43
    • 84987812464 scopus 로고    scopus 로고
    • Advanced Metering Infra-structure Security Considerations, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, November
    • Raymond C. Parks, SANDIA Report SAND2007-7327, Advanced Metering Infra-structure Security Considerations, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, November 2007.
    • (2007) SANDIA Report SAND2007-7327
    • Parks, R.C.1
  • 44
    • 84987781077 scopus 로고    scopus 로고
    • October 19, 2000 (cited: November 29
    • Ladder logic. , October 19, 2000 (cited: November 29, 2010).
    • (2010)
  • 50
    • 84987844517 scopus 로고    scopus 로고
    • University of Texas at Austin. UT Austin Researchers Successfully Spoof an $80 million Yacht at Sea. July 29, Article on Internet
    • University of Texas at Austin. UT Austin Researchers Successfully Spoof an $80 million Yacht at Sea. July 29, 2013. Article on Internet. http://www.utexas.edu/news/2013/07/29/ut-austin-researchers-successfully-spoof-an-80-million-yacht-at-sea/
    • (2013)
  • 58
    • 84987803651 scopus 로고    scopus 로고
    • The DNP Users Group, DNP3 Primer, Revision A, March 2005 (cited: November 24
    • The DNP Users Group, DNP3 Primer, Revision A. , March 2005 (cited: November 24, 2010).
    • (2010)
  • 60
    • 84987786551 scopus 로고    scopus 로고
    • The DNP Users Group, DNP3 Primer, Revision A, March 2005 (cited: November 24
    • The DNP Users Group, DNP3 Primer, Revision A. , March 2005 (cited: November 24, 2010).
    • (2010)
  • 61
    • 84987796455 scopus 로고    scopus 로고
    • Digitalbond SCADAPEDIA, Secure DNP3, August 2008 (cited: November 24
    • Digitalbond SCADAPEDIA, Secure DNP3. , August 2008 (cited: November 24, 2010).
    • (2010)
  • 62
    • 84987785297 scopus 로고    scopus 로고
    • The DNP Users Group, DNP3 Primer, Revision A, March, 2005 (cited: November 24
    • The DNP Users Group, DNP3 Primer, Revision A. , March, 2005 (cited: November 24, 2010).
    • (2010)
  • 67
    • 84987847289 scopus 로고    scopus 로고
    • Ethernet POWERLINK Standardization Group, Issue 2, February
    • Industrial Ethernet Facts, "System Comparison: The 5 Major Technologies," Ethernet POWERLINK Standardization Group, Issue 2, February 2013.
    • (2013) System Comparison: The 5 Major Technologies
  • 68
    • 84987847289 scopus 로고    scopus 로고
    • Ethernet POWERLINK Standardization Group, Issue 2, February
    • Industrial Ethernet Facts, "System Comparison: The 5 Major Technologies," Ethernet POWERLINK Standardization Group, Issue 2, February 2013.
    • (2013) System Comparison: The 5 Major Technologies
  • 69
    • 55849152970 scopus 로고    scopus 로고
    • Publication PUB00122R0-ENGLISH
    • Open Device Vendor Assocation (ODVA), "Common Industrial Protocol (CIP)," Publication PUB00122R0-ENGLISH, 2006.
    • (2006) Common Industrial Protocol (CIP)
  • 71
    • 84863682817 scopus 로고    scopus 로고
    • Introduction to Real-Time Ethernet II
    • Contemporary Control Systems, Inc., Downers Grove, IL, July
    • P. Doyle, Introduction to Real-Time Ethernet II. The Extension: A Technical Supplement to Control Network, vol. 5, Issue 4, Contemporary Control Systems, Inc., Downers Grove, IL, July 2004.
    • (2004) The Extension: A Technical Supplement to Control Network , vol.5 , Issue.4
    • Doyle, P.1
  • 72
    • 84987829516 scopus 로고    scopus 로고
    • Ethernet POWERLINK Standardization Group, CANopen, 2009 (cited: November 24
    • Ethernet POWERLINK Standardization Group, CANopen. , 2009 (cited: November 24, 2010).
    • (2010)
  • 73
    • 84987819456 scopus 로고    scopus 로고
    • SERCOS International, Technology: Introduction to SERCOS interface, 2010 (cited: November 24
    • SERCOS International, Technology: Introduction to SERCOS interface. , 2010 (cited: November 24, 2010).
    • (2010)
  • 74
    • 84987807923 scopus 로고    scopus 로고
    • SERCOS International, Technology: Cyclic Operation, 2010 (cited: November 24
    • SERCOS International, Technology: Cyclic Operation. , 2010 (cited: November 24, 2010).
    • (2010)
  • 75
    • 84987785309 scopus 로고    scopus 로고
    • SERCOS International, Technology: Service & IP Channels, 2010 (cited: November 24
    • SERCOS International, Technology: Service & IP Channels. , 2010 (cited: November 24, 2010).
    • (2010)
  • 76
    • 84987792629 scopus 로고    scopus 로고
    • cited: January 9
    • OPC Foundation, "What is OPC?," , (cited: January 9, 2014).
    • (2014) What is OPC?
  • 77
    • 84987792627 scopus 로고    scopus 로고
    • cited: January 9
    • OPC Foundation, "Certified Products," , (cited: January 9, 2014).
    • (2014) Certified Products
  • 78
    • 84987840161 scopus 로고    scopus 로고
    • Microsoft Corporation, RPC Protocol Operation, cited: November 4
    • Microsoft Corporation, RPC Protocol Operation. (cited: November 4, 2010).
    • (2010)
  • 79
    • 84987793228 scopus 로고    scopus 로고
    • European Organization for Nuclear Research (CERN), A Brief Introduction to OPC™ Data Access, November 11, 2000 (cited: November 29
    • European Organization for Nuclear Research (CERN), A Brief Introduction to OPC™ Data Access. , November 11, 2000 (cited: November 29, 2010).
    • (2010)
  • 80
    • 84987807979 scopus 로고    scopus 로고
    • DigitalBond, British Columbia Institute of Technology, Byres Research, November 13
    • "OPC Security Whitepaper #3: Hardening Guidelines for OPC Hosts," DigitalBond, British Columbia Institute of Technology, Byres Research, November 13, 2007.
    • (2007) OPC Security Whitepaper #3: Hardening Guidelines for OPC Hosts
  • 81
    • 84987804618 scopus 로고    scopus 로고
    • cited: January 9
    • DigitalBond, "Bandolier," (cited: January 9, 2014).
    • (2014) Bandolier
  • 82
    • 84987814585 scopus 로고    scopus 로고
    • cited: January 9
    • DigitalBond, "QuickDraw SCADA IDS," (cited: January 9, 2014).
    • (2014) QuickDraw SCADA IDS
  • 84
    • 84987829500 scopus 로고    scopus 로고
    • Secure ICCP Integration: Considerations and Recommendations, Sandia Report SAND2007-3345, printed June
    • J. Michalski, A. Lanzone, J. Trent, S. Smith, "Secure ICCP Integration: Considerations and Recommendations," Sandia Report SAND2007-3345, printed June 2007.
    • (2007)
    • Michalski, J.1    Lanzone, A.2    Trent, J.3    Smith, S.4
  • 86
    • 55849152970 scopus 로고    scopus 로고
    • PUB00122R0-ENGLISH
    • Open Device Vendors Association (ODVA), "Common Industrial Protocol," PUB00122R0-ENGLISH, 2006.
    • (2006) Common Industrial Protocol
  • 87
    • 84881143298 scopus 로고    scopus 로고
    • (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, MD and Intelligent Systems Division, Manufacturing Engineering Laboratory, National Institute of Standards and Technology Gaithersburg, MD, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology, Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, MD and Intelligent Systems Division, Manufacturing Engineering Laboratory, National Institute of Standards and Technology Gaithersburg, MD, September 2008.
    • (2008) National Institute of Standards and Technology, Special Publication 800-82
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 88
    • 84987817057 scopus 로고    scopus 로고
    • Cyber Effects Analysis Using VCSE Promoting Control System Reliability, Sandia National Laboratories Albuquerque, New Mexico and Livermore, California, September
    • M.J. McDonald, G.N. Conrad, T.C. Service, R.H. Cassidy, SANDIA Report SAND2008-5954, Cyber Effects Analysis Using VCSE Promoting Control System Reliability, Sandia National Laboratories Albuquerque, New Mexico and Livermore, California, September 2008.
    • (2008) SANDIA Report SAND2008-5954
    • McDonald, M.J.1    Conrad, G.N.2    Service, T.C.3    Cassidy, R.H.4
  • 89
    • 70449412262 scopus 로고    scopus 로고
    • Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, and School of Electrical Engineering, Royal Institute of Technology (KTH), Berkeley, CA
    • A. Giani, S. Sastry, K.H. Johansson, H. Sandberg, The VIKING Project: An Initiative on Resilient Control of Power Networks, Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, and School of Electrical Engineering, Royal Institute of Technology (KTH), Berkeley, CA, 2009.
    • (2009) The VIKING Project: An Initiative on Resilient Control of Power Networks
    • Giani, A.1    Sastry, S.2    Johansson, K.H.3    Sandberg, H.4
  • 90
    • 84987829479 scopus 로고    scopus 로고
    • Document from the Internet. Cited Sep 4, Available from
    • SearchSecurity. Definition: Blended Threat. Document from the Internet. Cited Sep 4, 2012. Available from: http://searchsecurity.techtarget.com/definition/blended-threat
    • (2012) Definition: Blended Threat
  • 94
    • 84987840208 scopus 로고    scopus 로고
    • cited: December 20
    • WinCC Database Problem. (cited: December 20, 2013)
    • (2013)
  • 97
    • 84987848589 scopus 로고    scopus 로고
    • ICS-CERT. Joint Security Awareness Report (JSAR-12-241-01B) Shamoon/DistTrack Malware - Update B. Document from the Internet. April 30, Cited December 22, 2013. Available at
    • ICS-CERT. Joint Security Awareness Report (JSAR-12-241-01B) Shamoon/DistTrack Malware - Update B. Document from the Internet. April 30, 2013. Cited December 22, 2013. Available at: https://ics-cert.us-cert.gov/jsar/JSAR-12-241-01B-0
    • (2013)
  • 98
    • 84987840198 scopus 로고    scopus 로고
    • August 2012. Document from the Internet. Cited December 22, Available at
    • Kelly Jackson Higgins. 30,000 Machines Infected In Targeted Attack On Saudi Aramco. Dark Reading. August 2012. Document from the Internet. Cited December 22, 2013. Available at: http://www.darkreading.com/attacks-breaches/30000-machines-infected-in-targeted-atta/240006313
    • (2013) 30,000 Machines Infected In Targeted Attack On Saudi Aramco. Dark Reading
    • Higgins, K.J.1
  • 99
    • 84987812482 scopus 로고    scopus 로고
    • Document from the Internet. June 4, 2012. Cited Sep 18, Available from
    • Kaspersky Labs. Virus News: Kaspersky Lab Experts Provide In-Depth Analysis of Flame’s C&C Infrastructure. Document from the Internet. June 4, 2012. Cited Sep 18, 2012. Available from: http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_Experts_Provide_In_Depth_Analysis_of_Flames_Infrastructure
    • (2012) Virus News: Kaspersky Lab Experts Provide In-Depth Analysis of Flame’s C&C Infrastructure
  • 100
    • 84987812482 scopus 로고    scopus 로고
    • Document from the Internet. June 4, 2012. Cited Sep 18, Available from
    • Kaspersky Labs. Virus News: Kaspersky Lab Experts Provide In-Depth Analysis of Flame’s C&C Infrastructure. Document from the Internet. June 4, 2012. Cited Sep 18, 2012. Available from: http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_Experts_Provide_In_Depth_Analysis_of_Flames_Infrastructure
    • (2012) Virus News: Kaspersky Lab Experts Provide In-Depth Analysis of Flame’s C&C Infrastructure
  • 101
    • 84987840201 scopus 로고    scopus 로고
    • Escape from PDF March 2010 (cited: November 4
    • D. Stevens, Escape from PDF. , March 2010 (cited: November 4, 2010).
    • (2010)
    • Stevens, D.1
  • 102
    • 84987845004 scopus 로고    scopus 로고
    • Sudosecure.net. Worm-Able PDF Clarification, April 4, 2010 (cited: November 4
    • J. Conway, Sudosecure.net. Worm-Able PDF Clarification. , April 4, 2010 (cited: November 4, 2010).
    • (2010)
    • Conway, J.1
  • 103
    • 84987812502 scopus 로고    scopus 로고
    • Kali Linux. .
  • 104
    • 84987822025 scopus 로고    scopus 로고
    • Social Engineering Framework, Computer based social engineering tools: Social Engineer Toolkit (SET). .
  • 105
    • 84987812710 scopus 로고    scopus 로고
    • 86 Security Labs, PDF "Launch" Feature Used to Install Zeus, April 14, 2010 (cited: November 4
    • 86 Security Labs, PDF "Launch" Feature Used to Install Zeus. , April 14, 2010 (cited: November 4, 2010).
    • (2010)
  • 107
    • 84987848621 scopus 로고    scopus 로고
    • Twitter-based Botnet Command Channel, August 13, 2009 (cited: November 4
    • J. Nazario, Arbor networks. Twitter-based Botnet Command Channel. , August 13, 2009 (cited: November 4, 2010).
    • (2010) Arbor networks
    • Nazario, J.1
  • 109
    • 84987848619 scopus 로고    scopus 로고
    • sited: February 20
    • National Institute of Standards and Technologies (NIST) - Computer Forensic Tools Catalog, , .
    • (2014)
  • 112
    • 84987792718 scopus 로고    scopus 로고
    • sited July 1
    • Open-Source Vulnerability Database, , sited July 1, 2014.
    • (2014)
  • 117
    • 84987819500 scopus 로고    scopus 로고
    • sited July 29
    • "The Shamoon Attacks," Symantec Security Response, , sited July 29, 2014.
    • (2014) The Shamoon Attacks
  • 119
    • 84906979106 scopus 로고    scopus 로고
    • sited July 30
    • "National Vulnerability Database Version 2.2," National Institute of Standards and Technology / U.S. Dept. of Homeland Security National Cyber Security Division, , sited July 30, 2014.
    • (2014) National Vulnerability Database Version 2.2
  • 122
    • 84929297127 scopus 로고    scopus 로고
    • sited July 30
    • "CIS Security Benchmarks," Center for Internet Security, , sited July 30, 2014.
    • (2014) CIS Security Benchmarks
  • 123
    • 84987785317 scopus 로고    scopus 로고
    • sited July 30
    • "Security Configuration Guides," National Security Agency / Central Security Service, , sited July 30, 2014.
    • (2014) Security Configuration Guides
  • 125
    • 84987804618 scopus 로고    scopus 로고
    • sited July 30
    • "Bandolier," DigitalBond, , sited July 30, 2014.
    • (2014) Bandolier
  • 131
    • 10944258302 scopus 로고    scopus 로고
    • sited July 31
    • "Threat Modeling," Microsoft Developer Network, , sited July 31, 2014.
    • (2014) Threat Modeling
  • 134
    • 84987785246 scopus 로고    scopus 로고
    • Regulatory Guide 5.71 (New Regulatory Guide), Cyber Security Programs for Nuclear Facilities, January
    • U.S. Nuclear Regulatory Commission, Regulatory Guide 5.71 (New Regulatory Guide), Cyber Security Programs for Nuclear Facilities, January, 2010.
    • (2010)
  • 137
    • 84987785228 scopus 로고    scopus 로고
    • Standard CIP-002-3. Cyber Security-Critical Cyber Asset Identification, December 16, 2009 (cited: January 19
    • North American Reliability Corporation, Standard CIP-002-3. Cyber Security-Critical Cyber Asset Identification. , December 16, 2009 (cited: January 19, 2011).
    • (2011)
  • 139
    • 84987785222 scopus 로고    scopus 로고
    • December 2, 2010 (cited: January 19
    • , December 2, 2010 (cited: January 19, 2011).
    • (2011)
  • 140
    • 84987785212 scopus 로고    scopus 로고
    • cited: December 26
    • Snort. www.snort.org> (cited: December 26, 2013).
    • (2013)
  • 141
    • 84889689023 scopus 로고    scopus 로고
    • cited: December 26
    • Open Information Security Foundation. "Suricata" (cited: December 26, 2013).
    • (2013) Suricata
  • 143
    • 84987839728 scopus 로고    scopus 로고
    • cited: December 26
    • NexDefense, Inc., "About Sophia," (cited: December 26, 2013).
    • (2013) About Sophia
  • 145
    • 84987832407 scopus 로고    scopus 로고
    • cited: December 27
    • Trustifier, www.trustifier.com> (cited: December 27, 2013).
    • (2013)
  • 147
    • 84987809791 scopus 로고    scopus 로고
    • cited: December 27
    • Waterfall Security Solutions, Ltd. www.waterfall-security.com> (cited: December 27, 2013).
    • (2013)
  • 148
    • 85029233483 scopus 로고    scopus 로고
    • Special Publication 800-82 Revision 1, Guide to Industrial Control Systems (ICS) Security, Section 6.11 System and Information Integrity, May
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology (NIST), Special Publication 800-82 Revision 1, Guide to Industrial Control Systems (ICS) Security, Section 6.11 System and Information Integrity, May, 2013.
    • (2013) National Institute of Standards and Technology (NIST)
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 149
    • 84987807869 scopus 로고    scopus 로고
    • February, 2000 (cited: January 19
    • A. Chuvakin, Content aware SIEM. http://www.sans.org/security-resources/idfaq/vlan.php, February, 2000 (cited: January 19, 2011).
    • (2011) Content aware SIEM
    • Chuvakin, A.1
  • 150
    • 84987819445 scopus 로고    scopus 로고
    • Correlating Risk Events and Process Trends
    • Kenexis Security Corporation and Digital Bond Press
    • B. Singer, Correlating Risk Events and Process Trends. Proceedings of the SCADA Security Scientific Symposium (S4). Kenexis Security Corporation and Digital Bond Press, 2010.
    • (2010) Proceedings of the SCADA Security Scientific Symposium (S4)
    • Singer, B.1
  • 152
    • 84987819445 scopus 로고    scopus 로고
    • Correlating Risk Events and Process Trends
    • Kenexis Security Corporation and Digital Bond Press, Sunrise, FL
    • B. Singer, Correlating Risk Events and Process Trends. Proceedings of the SCADA Security Scientific Symposium (S4). Kenexis Security Corporation and Digital Bond Press, Sunrise, FL, 2010.
    • (2010) Proceedings of the SCADA Security Scientific Symposium (S4)
    • Singer, B.1
  • 155
    • 84987839702 scopus 로고    scopus 로고
    • Computerworld.com, July 28, 2003 (cited: February 13
    • R. Kay, QuickStudy: event correlation. Computerworld.com , July 28, 2003 (cited: February 13, 2011).
    • (2011) QuickStudy: Event correlation
    • Kay, R.1
  • 156
    • 84987815065 scopus 로고    scopus 로고
    • Softpanorama, Event correlation technologies, January 10, 2002 (cited: February 13
    • Softpanorama, Event correlation technologies. , January 10, 2002 (cited: February 13, 2011).
    • (2011)
  • 157
    • 84987798321 scopus 로고    scopus 로고
    • May 27, 2010 (cited: February 13
    • The MITRE Corporation, About CEE (common event expression). , May 27, 2010 (cited: February 13, 2011).
    • (2011)
  • 159
    • 84987798318 scopus 로고    scopus 로고
    • 27, 2010 (cited: February 13
    • The MITRE Corporation, About CEE (common event expression). , May 27, 2010 (cited: February 13, 2011).
    • (2011)
  • 160
    • 84987807869 scopus 로고    scopus 로고
    • February 2000 (cited: January 19
    • A. Chuvakin, Content aware SIEM. , February 2000 (cited: January 19, 2011).
    • (2011) Content aware SIEM
    • Chuvakin, A.1
  • 161
    • 84987819445 scopus 로고    scopus 로고
    • Correlating risk events and process trends
    • Kenexis Security Corporation and Digital Bond Press, Sunrise, FL
    • B. Singer, Correlating risk events and process trends. Proceedings of the SCADA Security Scientific Symposium (S4). Kenexis Security Corporation and Digital Bond Press, 2010, Sunrise, FL.
    • (2010) Proceedings of the SCADA Security Scientific Symposium (S4)
    • Singer, B.1
  • 163
    • 84987778748 scopus 로고    scopus 로고
    • Microsoft. Windows Management Instrumentation, January 6, 2011 (cited: March 3
    • Microsoft. Windows Management Instrumentation. , January 6, 2011 (cited: March 3, 2011).
    • (2011)
  • 164
    • 84987792092 scopus 로고    scopus 로고
    • Flow.org. Traffic Monitoring using sFlow, 2003 (cited: March 3
    • Flow.org. Traffic Monitoring using sFlow. , 2003 (cited: March 3, 2011).
    • (2011)
  • 165
    • 84987791380 scopus 로고    scopus 로고
    • Kenexis Security Corporation
    • D. Peterson (Ed.), 2: Correlating Risk Events and Process Trends to Improve Reliability, Digital Bond Press
    • B. Singer, Kenexis Security Corporation, in: D. Peterson (Ed.), Proceedings of the SCADA Security Scientific Symposium, 2: Correlating Risk Events and Process Trends to Improve Reliability, Digital Bond Press, 2010.
    • (2010) Proceedings of the SCADA Security Scientific Symposium
    • Singer, B.1
  • 166
    • 84987830801 scopus 로고    scopus 로고
    • 2003 (cited: March 3
    • Securonix, Inc., Securonix Indentity Matcher: Overview. , 2003 (cited: March 3, 2011).
    • (2011)
  • 167
    • 84987807869 scopus 로고    scopus 로고
    • February, 2000 (cited: January 19
    • A. Chuvakin, Content Aware SIEM. February, 2000 (cited: January 19, 2011).
    • (2011) Content Aware SIEM
    • Chuvakin, A.1
  • 170
    • 84987815075 scopus 로고    scopus 로고
    • North American Electric Reliability Corporation. NERC CIP Reliability Standards, version 4, February 3, 2011 (cited: March 3
    • North American Electric Reliability Corporation. NERC CIP Reliability Standards, version 4. February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 172
    • 84987798342 scopus 로고    scopus 로고
    • cited: March 21
    • International Standards Organization/International Electrotechnical Commission (ISO/IEC), About ISO. http://www.iso.org/iso/about.htm (cited: March 21, 2011).
    • (2011)
  • 174
    • 84987815059 scopus 로고    scopus 로고
    • sited July 21
    • ISA99 Committee on Industrial Automation and Control Systems Security, , sited July 21, 2014.
    • (2014)
  • 175
    • 84987846118 scopus 로고    scopus 로고
    • The Unified Compliance Framework, What is the UCF?, cited: March 21
    • The Unified Compliance Framework, What is the UCF? (cited: March 21, 2011).
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.