메뉴 건너뛰기




Volumn 12, Issue 6, 2016, Pages 2236-2246

A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems

Author keywords

Critical infrastructure (CI) protection; industrial control systems (ICS); intrusion detection systems (IDS); supervisory control and data acquisition (SCADA)

Indexed keywords

COMPUTER CRIME; CONTROL SYSTEMS; DATA ACQUISITION; INTELLIGENT CONTROL; INTRUSION DETECTION; MERCURY (METAL); NETWORK SECURITY;

EID: 85006762171     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2016.2599841     Document Type: Article
Times cited : (136)

References (25)
  • 1
    • 84922977838 scopus 로고    scopus 로고
    • A review of architectures and concepts for intelligence in future electric energy systems
    • Apr
    • T. Strasser et al., "A review of architectures and concepts for intelligence in future electric energy systems," IEEE Trans. Ind. Electron., vol. 62, no. 4, pp. 2424-2438, Apr. 2015.
    • (2015) IEEE Trans. Ind. Electron , vol.62 , Issue.4 , pp. 2424-2438
    • Strasser, T.1
  • 2
    • 84962815812 scopus 로고    scopus 로고
    • Cyberphysical security and dependability analysis of digital control systems in nuclear power plants
    • Mar
    • C.-S. Cho, W.-H. Chung, and S.-Y. Kuo, "Cyberphysical security and dependability analysis of digital control systems in nuclear power plants," IEEE Trans. Syst., Man, Cybern.: Syst., vol. 46, no. 3, pp. 356-369, Mar. 2016.
    • (2016) IEEE Trans. Syst., Man, Cybern.: Syst , vol.46 , Issue.3 , pp. 356-369
    • Cho, C.-S.1    Chung, W.-H.2    Kuo, S.-Y.3
  • 3
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • Mar
    • R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Comput. Surv., vol. 46, no. 4, pp. 55:1-55:29, Mar. 2014.
    • (2014) ACM Comput. Surv , vol.46 , Issue.4 , pp. 551-5529
    • Mitchell, R.1    Chen, I.-R.2
  • 4
    • 84861093550 scopus 로고    scopus 로고
    • SCADA security in the light of cyber-warfare
    • A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA security in the light of cyber-warfare," Comput. Secur., vol. 31, no. 4, pp. 418-436, 2012.
    • (2012) Comput. Secur , vol.31 , Issue.4 , pp. 418-436
    • Nicholson, A.1    Webber, S.2    Dyer, S.3    Patel, T.4    Janicke, H.5
  • 5
    • 84874917979 scopus 로고    scopus 로고
    • The real story of Stuxnet
    • Mar
    • D. Kushner, "The real story of Stuxnet," IEEE Spectrum, vol. 50, no. 3, pp. 48-53, Mar. 2013.
    • (2013) IEEE Spectrum , vol.50 , Issue.3 , pp. 48-53
    • Kushner, D.1
  • 8
    • 80052113604 scopus 로고    scopus 로고
    • Proposal strategies of key management for data encryption in SCADA network of electric power systems
    • D. Kang, J. Lee, B. Kim, and D. Hur, "Proposal strategies of key management for data encryption in SCADA network of electric power systems," Int. J. Electr. Power Energy Syst., vol. 33, no. 9, pp. 1521-1526, 2011.
    • (2011) Int. J. Electr. Power Energy Syst , vol.33 , Issue.9 , pp. 1521-1526
    • Kang, D.1    Lee, J.2    Kim, B.3    Hur, D.4
  • 9
    • 84879882523 scopus 로고    scopus 로고
    • Secure SCADA communication by using a modified key management scheme
    • A. Rezai, P. Keshavarzi, and Z. Moravej, "Secure SCADA communication by using a modified key management scheme," ISA Trans., vol. 52, no. 4, pp. 517-524, 2013.
    • (2013) ISA Trans , vol.52 , Issue.4 , pp. 517-524
    • Rezai, A.1    Keshavarzi, P.2    Moravej, Z.3
  • 10
    • 84865395858 scopus 로고    scopus 로고
    • Challenges in power system information security
    • Jul./Aug
    • G. Dan, H. Sandberg, M. Ekstedt, and G. Bjorkman, "Challenges in power system information security," IEEE Security Priv., vol. 10, no. 4, pp. 62-70, Jul./Aug. 2012.
    • (2012) IEEE Security Priv , vol.10 , Issue.4 , pp. 62-70
    • Dan, G.1    Sandberg, H.2    Ekstedt, M.3    Bjorkman, G.4
  • 14
    • 84913586160 scopus 로고    scopus 로고
    • Intrusion detection in cyberphysical systems: Techniques and challenges
    • Dec
    • S. Han, M. Xie, H.-H. Chen, and Y. Ling, "Intrusion detection in cyberphysical systems: Techniques and challenges," IEEE Syst. J., vol. 8, no. 4, pp. 1049-1059, Dec. 2014.
    • (2014) IEEE Syst. J , vol.8 , Issue.4 , pp. 1049-1059
    • Han, S.1    Xie, M.2    Chen, H.-H.3    Ling, Y.4
  • 15
    • 77958115258 scopus 로고    scopus 로고
    • Trustworthy hardware: Identifying and classifying hardware trojans
    • R. Karri and J. Rajendran, "Trustworthy hardware: Identifying and classifying hardware trojans," Computer, vol. 43, no. 10, pp. 39-46, 2010.
    • (2010) Computer , vol.43 , Issue.10 , pp. 39-46
    • Karri, R.1    Rajendran, J.2
  • 16
    • 79952527986 scopus 로고    scopus 로고
    • On SCADA control system command and response injection and intrusion detection
    • W. Gao, T. Morris, B. Reaves, and D. Richey, "On SCADA control system command and response injection and intrusion detection," in Proc. eCrime Researchers Summit, 2010, pp. 1-9.
    • (2010) Proc. ECrime Researchers Summit , pp. 1-9
    • Gao, W.1    Morris, T.2    Reaves, B.3    Richey, D.4
  • 17
    • 84901604278 scopus 로고    scopus 로고
    • Multiattribute SCADA-specific intrusion detection system for power networks
    • Jun
    • Y. Yang et al. "Multiattribute SCADA-specific intrusion detection system for power networks," IEEE Trans. Power Del., vol. 29, no. 3, pp. 1092-1102, Jun. 2014.
    • (2014) IEEE Trans. Power Del , vol.29 , Issue.3 , pp. 1092-1102
    • Yang, Y.1
  • 18
    • 84928173034 scopus 로고    scopus 로고
    • Integrated OCSVM mechanism for intrusion detection in SCADA systems
    • L. Maglaras, J. Jiang, and T. Cruz, "Integrated OCSVM mechanism for intrusion detection in SCADA systems," Electron. Lett., vol. 50, no. 25, pp. 1935-1936, 2014.
    • (2014) Electron. Lett , vol.50 , Issue.25 , pp. 1935-1936
    • Maglaras, L.1    Jiang, J.2    Cruz, T.3
  • 19
    • 84939266661 scopus 로고    scopus 로고
    • Constructing cost-effective and targetable industrial control system honeypots for production networks
    • M. Winn, M. Rice, S. Dunlap, J. Lopez, and B. Mullins, "Constructing cost-effective and targetable industrial control system honeypots for production networks," Int. J. Crit. Infrastructure Protection, vol. 10, pp. 47-58, 2015.
    • (2015) Int. J. Crit. Infrastructure Protection , vol.10 , pp. 47-58
    • Winn, M.1    Rice, M.2    Dunlap, S.3    Lopez, J.4    Mullins, B.5
  • 20
    • 84906939980 scopus 로고    scopus 로고
    • Fault detection based on a robust one class support vector machine
    • S. Yin, X. Zhu, and C. Jing, "Fault detection based on a robust one class support vector machine," Neurocomputing, vol. 145, pp. 263-268, 2014.
    • (2014) Neurocomputing , vol.145 , pp. 263-268
    • Yin, S.1    Zhu, X.2    Jing, C.3
  • 21
    • 84937401230 scopus 로고    scopus 로고
    • A novel LS-SVM modeling method for a hydraulic press forging process with multiple localized solutions
    • Jun
    • X. Lu, B. Fan, and M. Huang, "A novel LS-SVM modeling method for a hydraulic press forging process with multiple localized solutions," IEEE Trans. Ind. Informat., vol. 11, no. 3, pp. 663-670, Jun. 2015.
    • (2015) IEEE Trans. Ind. Informat , vol.11 , Issue.3 , pp. 663-670
    • Lu, X.1    Fan, B.2    Huang, M.3
  • 23
    • 84942683814 scopus 로고    scopus 로고
    • Improving network security monitoring for industrial control systems
    • May
    • T. Cruz et al. "Improving network security monitoring for industrial control systems," in Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage., May 2015, pp. 878-881.
    • (2015) Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage , pp. 878-881
    • Cruz, T.1
  • 24
    • 85009067795 scopus 로고    scopus 로고
    • Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
    • L. A. Maglaras, J. Jiang, and T. Cruz, "Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems," J. Inf. Security Appl., 2016. [Online]. Available: http://dx.doi.org/10.1016/j.jisa.2016.04.002.
    • (2016) J. Inf. Security Appl
    • Maglaras, L.A.1    Jiang, J.2    Cruz, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.