Acknowledgement
Grant : 원전 비안전등급 제어기기(DCS) 사이버침해 예방 및 탐지 기술 개발
Supported by : 한국에너지기술평가원(KETEP)
References
- K. Stouffer, J. Falce, K. Scarfone, "revision2: Guide to industrial control systems(ICS) security", NIST Special Publication, 800-82, 2014.
- Wikileak. Transferring Data Using NTFS Alternate Data Streams (DTNtfsAds_BK - Brutal Kangaroo). Available: https://wikileaks.org/ciav7p1/cms/page_13763236.html
- Wikileak. Emotional Simian v2.3 - User Guide. Available: https://wikileaks.org/vault7/document/Emotional_Simianv2_3-User_Guide/
- "Security Requirements for Industrial Control System - Part1: Concepts and Reference Model", Telecommunications Technology Association, TTAK.KO-12.0307, 2017.
- boannews. ICS / SCADA security, if not done properly, loses public trust. Available : http://www.boannews.com/media/view.asp?idx=66747&kind=3
- USA TODAY, AP Exclusive: Israeli tunnel hit by cyber attack. Available: https://www.usatoday.com/story/tech/2013/10/27/ap-exclusive-israeli-tunnel-hit-by-cyber-attack/3281133/
- 2016 ICS Vulnerability Trend Report. FireEye, 2016
- Alsiherov, F., & Kim, T. "Research trend on secure SCADA network technology and methods.", WSEAS Transactions on Systems and Control, Vol. 8, No. 5, pp 635-645.2010.
- Mahmood, A. N., Leckie, C., Hu, J., Tari, Z., & Atiquzzaman, M. "Network traffic analysis and SCADA security". In Handbook of Information and Communication Security, Springer, Berlin, Heidelberg. pp. 383-405. 2010.
- Sajid, A., Abbas, H., & Saleem, K. "Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges.", IEEE Access, Vol. 4, pp 1375-1384, 2016. https://doi.org/10.1109/ACCESS.2016.2549047
- B.J. Seok, Y. Kim, C. H. Lee, "A Study on Application Method of Crypto-module for Industrial Control System" Journal of Digital Contents Society, Vol. 18, No. 5 pp.1001-1008, Aug 2017. https://doi.org/10.9728/DCS.2017.18.5.1001
- Drias, Z., Serhrouchni, A., & Vogel, O.. "Analysis of cyber security for industrial control systems.", In Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on IEEE, pp. 1-8, 2015, August
- Fan, X., Fan, K., Wang, Y., & Zhou, R. "Overview of cyber-security of industrial control system." In Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on. IEEE, pp. 1-7. 2015.
- S. H. Kang, Y. H. Kim, S. H. Yang, "SDN core technology and evolution forecast analysis". Information & Communications Magazine, Vol. 30, No.3, pp3-8, 2013
- Piedrahita, A. F. M., Gaur, V., Giraldo, J., Cardenas, A. A., & Rueda, S. J. "Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems.", IEEE Software, Vol. 35, NO. 1, pp. 44-50, 2018.
- da Silva, E. G., Knob, L. A. D., Wickboldt, J. A., Gaspary, L. P., Granville, L. Z., & Schaeffer-Filho, A. "Capitalizing on SDN-based SCADA systems: An anti-eavesdropping case-study", In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on IEEE. pp. 165-173, 2015, May.
- Karnouskos, S. "Stuxnet worm impact on industrial cyber-physical system security." In IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society IEEE, pp. 4490-4494, 2011, November.