참고문헌
- NIST, "Special Publication 800-82, Revision 2 Draft : Guide to Industrial Control Systems (ICS) Security", NIST SP 800-82, May 2014.
- 장문수, 이건희, 김신규, 민병길, 김우년, 서정택, "DNP3 제어시스템 프로토콜 취약점 실험," 보안공학연구논문지, 7(1), pp. 15-28, Feb 2010.
- 권성문, 손태식, "제어시스템 DNP3 프로토콜 취약점과 현황," 정보보호학회지, 24(1), pp. 53-58, Feb. 2014.
- Jaebok Cha, "Information Communication Technology Glossary Book", 2004 from http://www.ktword.co.kr/
- NIST, "Special Publication 800-82, Revision 1 Draft : Guide to Industrial Control Systems (ICS) Security", NIST SP 800-82, 3-2 Threat, May 2013. http://dx.doi.org/10.6028/NIST.SP.800-82r1
- 유형욱, 윤정한, 손태식, "제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법," 한국통신학회 논문지, 38B(8), pp. 646-647, June 2013.
- IEEE, "IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)", 7.Secure authentication, pp.171-266, Oct 2012
- IEC, "IEC/TS 62351-2 TECHNICAL SPECIFICATION", 2.Terms and definitions, Aug 2008
- Digital Bond, SCADA Security Portal, DNP3 User Group, 8. Feb. 2011 from http://www.digitalbond.com/DNP3UserGroupPolit ics
- Digital Bond, SCADA Security Portal, DNP3 User Group, Function Code, Feb. 2011 from http://www.digitalbond.com/DNP3UserGroupPoli tics
- Digital Bond, SCADA Security Portal, DNP3 User Group, Cryptography, Feb. 2011 from http://www.digitalbond.com/DNP3UserGroupPoli tics
- Trend Micro, "TrandLabs SECURITY BLOG", 産業制御システムに対するサイバー攻撃, 攻撃を 狙っているのは誰か?, Aug 2013 from http://www.trendmicro.co.jp/ics_cyberreport2