메뉴 건너뛰기




Volumn 5, Issue , 2016, Pages 1060-1074

Cyber-physical Vulnerability Assessment in Manufacturing Systems

Author keywords

Cyber physical security; Decision tree analysis; Manufacturing systems; Vulnerability assessment

Indexed keywords

COMPUTER CRIME; CYBER PHYSICAL SYSTEM; DECISION TREES; INDUSTRIAL RESEARCH; NETWORK SECURITY;

EID: 85014362362     PISSN: None     EISSN: 23519789     Source Type: Conference Proceeding    
DOI: 10.1016/j.promfg.2016.08.075     Document Type: Conference Paper
Times cited : (45)

References (30)
  • 1
    • 85014391512 scopus 로고    scopus 로고
    • Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? [Online] Institute for Science and International Security (ISIS) Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\isis-online
    • org\\isis-reports\\detail\\did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant\\” isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/[Accessed 14 December 2014].
    • [1] Albright, D., Brannan, P. & Christina, W., 2010. Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? [Online] Institute for Science and International Security (ISIS) Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\isis-online.org\\isis-reports\\detail\\did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant\\” isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/[Accessed 14 December 2014].
    • (2010)
    • Albright, D.1    Brannan, P.2    Christina, W.3
  • 2
    • 85014372436 scopus 로고    scopus 로고
    • Anthem, Inc., 2015. How to Access & Sign Up For Identity Theft Repair & Credit Monitoring Services. [Online] Available at: HYPERLINK “ [Accessed 28 October 2015].
    • [2] Anthem, Inc., 2015. How to Access & Sign Up For Identity Theft Repair & Credit Monitoring Services. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\www.anthemfacts.com” www.anthemfacts.com [Accessed 28 October 2015].
  • 3
    • 84879733864 scopus 로고    scopus 로고
    • A Vulnerability Assessment Methodology for Critical Infrastructure Sites
    • In DHS Symposium. Boston, Massachusetts, 2005. Department of Homeland Security.
    • [3] Baker, G.H., 2005. A Vulnerability Assessment Methodology for Critical Infrastructure Sites. In DHS Symposium. Boston, Massachusetts, 2005. Department of Homeland Security.
    • (2005)
    • Baker, G.H.1
  • 4
    • 85014333641 scopus 로고    scopus 로고
    • Risk Analysis Review
    • Master's Thesis. Linköping, Sweden: Linköpings University.
    • [4] Bergvall, J. & Svensson, L., 2012. Risk Analysis Review. Master's Thesis. Linköping, Sweden: Linköpings University.
    • (2012)
    • Bergvall, J.1    Svensson, L.2
  • 5
    • 84902724251 scopus 로고    scopus 로고
    • The OCTAVE Allegro Guidebook, v1
    • 0. Software Engineering Institute.
    • [5] Caralli, R.A., Stevens, J.F., Young, L.R. & Wilson, W.R., 2007. The OCTAVE Allegro Guidebook, v1.0. Software Engineering Institute.
    • (2007)
    • Caralli, R.A.1    Stevens, J.F.2    Young, L.R.3    Wilson, W.R.4
  • 6
    • 85014367384 scopus 로고    scopus 로고
    • CCAM, 2015. Commonwealth Center For Advanced Manufacturing - About Us. [Online] Available at: HYPERLINK “ 24 November 2015].
    • [6] CCAM, 2015. Commonwealth Center For Advanced Manufacturing - About Us. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\www.ccam-va.com\\about-us\\” www.ccam-va.com/about-us/[Accessed 24 November 2015].
  • 7
    • 0141917866 scopus 로고
    • EDP Risk Analysis
    • Computer Audit Update, pp.9-30.
    • [7] Cerullo, M.J. & Cerullo, V., 1994. EDP Risk Analysis. Computer Audit Update, pp.9-30.
    • (1994)
    • Cerullo, M.J.1    Cerullo, V.2
  • 8
    • 85014405442 scopus 로고    scopus 로고
    • Sons of Stuxnet
    • [Online] Available at: HYPERLINK “ [Accessed 15 December 2014].
    • [8] Cherry, S., 2011. Sons of Stuxnet. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\spectrum.ieee.org\\podcast\\telecom\\security\\sons-of-stuxnet” spectrum.ieee.org/podcast/telecom/security/sons-of-stuxnet [Accessed 15 December 2014].
    • (2011)
    • Cherry, S.1
  • 9
    • 85014416631 scopus 로고    scopus 로고
    • Deloitte, 2014. Global Cyber Executive Briefing - Manufacturing. [Online] Available at: HYPERLINK “ # [Accessed 16 August 2015].
    • [9] Deloitte, 2014. Global Cyber Executive Briefing - Manufacturing. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\www2.deloitte.com\\global\\en\\pages\\risk\\articles\\Manufacturing.html” www2.deloitte.com/global/en/pages/risk/articles/Manufacturing.html# [Accessed 16 August 2015].
  • 10
    • 84866409323 scopus 로고    scopus 로고
    • The Internet of Things: How the Next Evolution of the Internet is Changing Everything
    • White Paper. Cisco Internet Business Solutions Group (IBSG).
    • [10] Evans, D., 2011. The Internet of Things: How the Next Evolution of the Internet is Changing Everything. White Paper. Cisco Internet Business Solutions Group (IBSG).
    • (2011)
    • Evans, D.1
  • 11
    • 85014406350 scopus 로고    scopus 로고
    • FFIEC, 2015. FFIEC Cybersecurity Assessment Tool Overview. Federal Financial Institutions Examination Countil.
    • [11] FFIEC, 2015. FFIEC Cybersecurity Assessment Tool Overview. Federal Financial Institutions Examination Countil.
  • 12
    • 85014342516 scopus 로고    scopus 로고
    • A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems
    • In Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management. Venice, Italy, 2012. Springer-Verlag.
    • [12] Fray, I.E., 2012. A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems. In Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management. Venice, Italy, 2012. Springer-Verlag.
    • (2012)
    • Fray, I.E.1
  • 13
    • 85001088093 scopus 로고    scopus 로고
    • Hutchins, M.J. et al, 2015. Framework for Identifying Cybersecurity Risks in Manufacturing. Procedia Manufacturing, 1, pp.47-63.
    • [13] Hutchins, M.J. et al., 2015. Framework for Identifying Cybersecurity Risks in Manufacturing. Procedia Manufacturing, 1, pp.47-63.
  • 14
    • 85014387337 scopus 로고    scopus 로고
    • ICS-CERT, 2015. ICS-CERT Monitor [Accessed 26 January 2016].
    • [14] ICS-CERT, 2015. ICS-CERT Monitor Newsletters: November-December 2015. [Online] Department of Homeland Security Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\ics-cert.us-cert.gov\\sites\\default\\files\\Monitors\\ICS-CERT%20Monitor_Nov-Dec2015_S508C.pdf” ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT%20Monitor_Nov-Dec2015_S508C.pdf [Accessed 26 January 2016].
  • 15
    • 85014408215 scopus 로고    scopus 로고
    • Kaspersky, 2015. What is Spear Phishing? - Definition. [Online] Available at: HYPERLINK “ 3arQgs [Accessed 22 November 2015].
    • [15] Kaspersky, 2015. What is Spear Phishing? - Definition. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\usa.kaspersky.com\\internet-security-center\\definitions\\spear-phishing” \l “.VlIcL3arQgs” usa.kaspersky.com/internet-security-center/definitions/spear-phishing#.VlIcL3arQgs [Accessed 22 November 2015].
  • 16
    • 84951873175 scopus 로고    scopus 로고
    • The Sony Hack: How it Happened, Who is Responsible, and What we've Learned
    • [Online] Available at: HYPERLINK “ [Accessed 15 December 2014].
    • [16] Lee, T.B., 2014. The Sony Hack: How it Happened, Who is Responsible, and What we've Learned. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\www.vox.com\\2014\\12\\14\\7387945\\sony-hack-explained” www.vox.com/2014/12/14/7387945/sony-hack-explained [Accessed 15 December 2014].
    • (2014)
    • Lee, T.B.1
  • 17
    • 85014324399 scopus 로고    scopus 로고
    • Mandiant, 2014. M-Trends 2015: A view from the front line. Threat Report. Mandiant, a FireEye Company.
    • [17] Mandiant, 2014. M-Trends 2015: A view from the front line. Threat Report. Mandiant, a FireEye Company.
  • 18
    • 33845524230 scopus 로고    scopus 로고
    • Common Vulnerability Scoring System
    • Security & Privacy, IEEE, 4(6), pp.85-89.
    • [18] Mell, P., Scarfone, K. & Romanosky, S., 2006. Common Vulnerability Scoring System. Security & Privacy, IEEE, 4(6), pp.85-89.
    • (2006)
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3
  • 19
    • 85014343865 scopus 로고    scopus 로고
    • National Defense Industrial Association (NDIA), 2014. Cybersecurity for Advanced Manufacturing. White Paper. NDIA.
    • [19] National Defense Industrial Association (NDIA), 2014. Cybersecurity for Advanced Manufacturing. White Paper. NDIA.
  • 20
    • 85014393393 scopus 로고    scopus 로고
    • NIST, 2014. Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology.
    • [20] NIST, 2014. Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology.
  • 21
    • 84877775202 scopus 로고    scopus 로고
    • Improving Critical Infrastructure Cybersecurity
    • Executive Order. Federal Register.
    • [21] Obama, B., 2013. Improving Critical Infrastructure Cybersecurity. Executive Order. Federal Register.
    • (2013)
    • Obama, B.1
  • 22
    • 84875144115 scopus 로고    scopus 로고
    • The Dark Side of Software Engineering: Evil on Computing Projects
    • Wiley-IEEE Computer Society Press. Available at: HYPERLINK “ [accessed 14 December 2014].
    • [22] Rost, J. & Glass, R.L., 2011. The Dark Side of Software Engineering: Evil on Computing Projects. Wiley-IEEE Computer Society Press. Available at: HYPERLINK “http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470597178.html” http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470597178.html [accessed 14 December 2014].
    • (2011)
    • Rost, J.1    Glass, R.L.2
  • 23
    • 85014404704 scopus 로고    scopus 로고
    • 2003. Information Technology Security Handbook. Washington, DC, United States of America: The World Bank.
    • [23] Sadowsky, G. et al., 2003. Information Technology Security Handbook. Washington, DC, United States of America: The World Bank.
    • Sadowsky, G.1
  • 24
    • 85014383208 scopus 로고    scopus 로고
    • Strum, L.D. et al, 2014. Cyber-physical Vulnerabilities in Additive Manufacturing Systems. In Proceedings of the 25th Annual International Solid Freeform Fabrication Symposium. Austin, TX, 2014.
    • [24] Strum, L.D. et al., 2014. Cyber-physical Vulnerabilities in Additive Manufacturing Systems. In Proceedings of the 25th Annual International Solid Freeform Fabrication Symposium. Austin, TX, 2014.
  • 25
    • 85014321089 scopus 로고    scopus 로고
    • Symantec, 2014. Internet Security Threat Report 2014, Volume 19. Annual Threat Report. Symantec Corporation.
    • [25] Symantec, 2014. Internet Security Threat Report 2014, Volume 19. Annual Threat Report. Symantec Corporation.
  • 26
    • 85014322235 scopus 로고    scopus 로고
    • Symantec, 2015. Internet Security Threat Report 2015, Volume 20. Annual Threat Report. Symantec Corporation.
    • [26] Symantec, 2015. Internet Security Threat Report 2015, Volume 20. Annual Threat Report. Symantec Corporation.
  • 27
    • 85014414650 scopus 로고    scopus 로고
    • [Accessed 28 October 2015]. Target, 2014. Data Breach FAQ. [Online] Available at: HYPERLINK “
    • [27] Target, 2014. Data Breach FAQ. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\corporate.target.com\\about\\shopping-experience\\payment-card-issue-faq” corporate.target.com/about/shopping-experience/payment-card-issue-faq [Accessed 28 October 2015].
  • 28
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability Assessment of Cybersecurity for SCADA Systems
    • IEEE Transactions on Power Systems, 23, pp.1836-46.
    • [28] Ten, C.-W., Liu, C.-C. & Manimaran, G., 2008. Vulnerability Assessment of Cybersecurity for SCADA Systems. IEEE Transactions on Power Systems, 23, pp.1836-46.
    • (2008)
    • Ten, C.-W.1    Liu, C.-C.2    Manimaran, G.3
  • 29
    • 84990043576 scopus 로고    scopus 로고
    • Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems
    • Procedia Manufacturing, 1, pp.77-85. Available at: HYPERLINK “
    • [29] Vincent, H., Wells, L., Tarazaga, P. & Camelio, J., 2015. Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems. Procedia Manufacturing, 1, pp.77-85. Available at: HYPERLINK “http://www.sciencedirect.com/science/article/pii/S2351978915010653” http://www.sciencedirect.com/science/article/pii/S2351978915010653.
    • (2015)
    • Vincent, H.1    Wells, L.2    Tarazaga, P.3    Camelio, J.4
  • 30
    • 84899102995 scopus 로고    scopus 로고
    • Cyber-physical Security Challenges in Manufacturing Systems
    • Manufacturing Letters, 2(2), pp.74-77.
    • [30] Wells, L.J., Camelio, J.A., Wiliams, C.B. & White, J., 2014. Cyber-physical Security Challenges in Manufacturing Systems. Manufacturing Letters, 2(2), pp.74-77.
    • (2014)
    • Wells, L.J.1    Camelio, J.A.2    Wiliams, C.B.3    White, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.