과제정보
This research was supported by the National R&D Program through the National Research Foundation of Korea (NRF) funded by the Korean Government. (MSIP: Ministry of Science, ICT and Future Planning) (No. NRF-2016R1A5A1013919)
참고문헌
- Kee-choon Kwon, Myeong-Soo Lee, Technical review on the localized digital instrumentation and control systems, Nuclear engineering and technology 41 (i) (2009) 447-454. https://doi.org/10.5516/NET.2009.41.4.447
- U.S, Nuclear Regulatory Commission, "REGULATORY GUIDE 5.71 Cyber Security Programs for Nuclear Facilities, 2010, pp. 1-105. January.
- Korea Institute of Nuclear Nonproliferation and Control (KINAC), "Regulatory Standard on Cyber Security for Computer and Information System of Nuclear Facilities" RS-015, 2014.
- International Atomic Energy Agency, (IAEA), Computer Security for Nuclear Security, IAEA Nuclear Security Series No. 42-G, IAEA, Vienna, 2021.
- International Atomic Energy Agency (IAEA), Computer security at nuclear facilities, in: IAEA Nuclear Security Series No., vol. 17, IAEA, Vienna, 2011.
- International Atomic Energy Agency (IAEA), Objective and Essential Elements of a State's Nuclear Security Regime, IAEA Nuclear Security Series No. 20, IAEA, Vienna, 2013.
- Jae-Gu Song, et al., A cyber security risk assessment for the design of I&C systems in nuclear power plants, Nuclear engineering and technology 44 (8) (2012) 919-928. https://doi.org/10.5516/NET.04.2011.065
- Jinsoo Shin, Hanseong Son, Gyunyoung Heo, Cyber security risk evaluation of a nuclear I&C using BN and ET, Nuclear Engineering and Technology 49 (3) (2017) 517-524. https://doi.org/10.1016/j.net.2016.11.004
- Chanyoung Lee, Yim Ho Bin, Seong Poong Hyun, Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerant concept, Ann. Nucl. Energy 112 (2018) 646-654. https://doi.org/10.1016/j.anucene.2017.11.002
- Chanyoung Lee, Sang Min Han, Poong Hyun Seong, Development of a quantitative method for identifying fault-prone cyber security controls in NPP digital I&C systems, Ann. Nucl. Energy 142 (2020) 107398. https://doi.org/10.1016/j.anucene.2020.107398
- Yunfei Zhao, et al., Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants, Reliab. Eng. Syst. Saf. 201 (2020) 106878. https://doi.org/10.1016/j.ress.2020.106878
- Caroline Baylon, Roger Brunt, David Livingstone, Cyber Security at Civil Nuclear Facilities: Understanding the Risks: Chatham House Report, Chatham House for the Royal Institute of International Affairs, 2015.
- Hamed Orojloo, Mohammad Abdollahi Azgomi, A game-theoretic approach to model and quantify the security of cyber-physical systems, Comput. Ind. 88 (2017) 44-57. https://doi.org/10.1016/j.compind.2017.03.007
- Fan Zhang, J. Wesley Hines, Jamie B. Coble, A robust cybersecurity solution platform architecture for digital instrumentation and control systems in nuclear power facilities, Nucl. Technol. 206 (7) (2020) 939-950. https://doi.org/10.1080/00295450.2019.1666599
- Jae-hee Roh, et al., Cyber security system with FPGA-based network intrusion detector for nuclear power plant, in: IECON 2020 the 46th Annual Conference of the IEEE Industrial Electronics Society, IEEE, 2020.
- International Atomic Energy Agency (IAEA), Computer Security Incident Response Planning at Nuclear Facilities, IAEA-TDL-005, IAEA, Vienna, 2016.
- Chanyoung Lee, Young Ho Chae, Poong Hyun Seong, Development of a method for estimating security state: supporting integrated response to cyber-attacks in NPPs, Ann. Nucl. Energy 158 (2021) 108287. https://doi.org/10.1016/j.anucene.2021.108287
- Lee, Chanyoung, et al. "Development of a cyberattack response planning method for nuclear power plants by using the Markov decision process model." Ann. Nucl. Energy 166 (2022): 108725. https://doi.org/10.1016/j.anucene.2021.108725
- Hyun Gook Kang, Seung-Cheol Jang, A quantitative study on risk issues in safety feature control system design in digitalized nuclear power plant, J. Nucl. Sci. Technol. 45 (8) (2008) 850-858. https://doi.org/10.3327/jnst.45.850
- Elias Levy, Crossover: online pests plaguing the off line world, IEEE Security & Privacy 1 (6) (2003) 71-73. https://doi.org/10.1109/MSECP.2003.1253573
- Thomas M. Chen, Saeed Abu-Nimeh, Lessons from stuxnet, Computer 44 (4) (2011) 91-93. https://doi.org/10.1109/MC.2011.115
- International Atomic Energy Agency (IAEA), Computer Security of Instrumentation and Control Systems at Nuclear Facilities, IAEA Nuclear Security Series No. 33-T, IAEA, Vienna, 2018.
- Jong Woo Park, Seung Jun Lee, A quantitative assessment framework for cyber-attack scenarios on nuclear power plants using relative difficulty and consequence, Ann. Nucl. Energy 142 (2020) 107432. https://doi.org/10.1016/j.anucene.2020.107432
- Pierre Le Bot, Human reliability data, human error and accident models-illustration through the Three Mile Island accident analysis, Reliab. Eng. Syst. Saf. 83 (2) (2004) 153-167. https://doi.org/10.1016/j.ress.2003.09.007
- Yanhua Zou, et al., Human reliability analysis for digitized nuclear power plants: case study on the LingAo II nuclear power plant, Nuclear Engineering and Technology 49 (2) (2017) 335-341. https://doi.org/10.1016/j.net.2017.01.011
- Won Dea Jung, Dae Il Kang, Jae Whan Kim, Development of a Standard Method for Human Reliability Analysis of Nuclear Power Plants, 2005. KAERI/TR-2961/2005.
- Hee Eun Kim, et al., Systematic development of scenarios caused by cyber-attack-induced human errors in nuclear power plants, Reliab. Eng. Syst. Saf. 167 (2017) 290-301. https://doi.org/10.1016/j.ress.2017.05.046
- Myeong-Soo Lee, et al., Integrated Performance Validation Facility for KNICS MMIS, the Korean Nuclear Society Spring Meeting, 2007.
- Jae-Gu Song, et al., An analysis of technical security control requirements for digital I&C systems in nuclear power plants, Nuclear Engineering and Technology 45 (5) (2013) 637-652. https://doi.org/10.5516/NET.04.2012.091
- Harold Booth, Doug Rike, Gregory A. Witte, The National Vulnerability Database (Nvd): Overview, 2013.
- Marshall Abrams, Joe Weiss, Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services, MITRE CORP MCLEAN VA MCLEAN, Australia, 2008.
- Anton Cherepanov, WIN32/INDUSTROYER: a new threat for industrial control systems, White paper, ESET (June 2017) (2017).
- Robert M. Lee, M.J. Assante, T. Conway, Crashoverride: Analysis of the Threat to Electric Grid Operations, Dragos Inc., March, 2017.
- Suvi Leppanen, Shohel Ahmed, Robin Granqvist, Cyber security incident report-Norsk Hydro, Procedia Economics and Finance (2019).
- Andre Teixeira, et al., A secure control framework for resource-limited adversaries, Automatica 51 (2015) 135-148. https://doi.org/10.1016/j.automatica.2014.10.067
- Yilin Mo, Sinopoli Bruno, Secure Control against Replay attacks." 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), IEEE, 2009.
- Roy S. Smith, Covert misappropriation of networked control systems: presenting a feedback structure, IEEE Control Syst. Mag. 35 (1) (2015) 82-92. https://doi.org/10.1109/MCS.2014.2364723
- Hyun Gook Kang, Poong Hyun Seong, Information theoretic approach to manmachine interface complexity evaluation, IEEE Trans. Syst. Man Cybern. Syst. Hum. 31 (3) (2001) 163-171. https://doi.org/10.1109/3468.925655
- Jong Hyun Kim, Poong Hyun Seong, A quantitative approach to modeling the information flow of diagnosis tasks in nuclear power plants, Reliab. Eng. Syst. Saf. 80 (1) (2003) 81-94. https://doi.org/10.1016/S0951-8320(02)00289-2
- Chanyoung Lee, Poong-Hyun Seong, Development of a framework for NPP process-aware cyber attack detection and diagnosis methodology, in: Transactions of the American Nuclear Society, American Nuclear Society, 2020.
- Francesco Di Maio, Ajit Rai, Enrico Zio, A dynamic probabilistic safety margin characterization approach in support of Integrated Deterministic and Probabilistic Safety Analysis, Reliab. Eng. Syst. Saf. 145 (2016) 9-18. https://doi.org/10.1016/j.ress.2015.08.016
- Wei Wang, et al., A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants, Reliab. Eng. Syst. Saf. 175 (2018) 24-37. https://doi.org/10.1016/j.ress.2018.03.005
- Derui Ding, et al., A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing 275 (2018) 1674-1683. https://doi.org/10.1016/j.neucom.2017.10.009
- Theodore J. Williams, The Purdue enterprise reference architecture, Comput. Ind. 24 (2-3) (1994) 141-158. https://doi.org/10.1016/0166-3615(94)90017-5
- Nuclear Energy Institute (NEI), Identifying Systems and Assets Subject to the Cyber Security Rule, Jul. 2012. NEI 10-04 Rev.2.
- U.S., Nuclear Regulatory Commission, "The U.S. Nuclear Regulatory Commission's Cyber Security Regulatory Framework for Nuclear Power Reactors, " NUREG/CR-7141 November, 2014, pp. 1-77.
- Dong Hyuk Lim, Lee Sung Han, Na Man Gyun, Smart soft-sensing for the feedwater flowrate at PWRs using a GMDH algorithm, IEEE Trans. Nucl. Sci. 57 (1) (2010) 340-347. https://doi.org/10.1109/TNS.2009.2035121
- Young Gyu No, Poong Hyun Seong, Monitoring the performance of Aux. Feedwater pump using smart sensing model, KNS Autumn Meeting (2015) 29-30.
- Seung Geun Kim, Young Ho Chae, Poong Hyun Seong, Development of a generative-adversarial-network-based signal reconstruction method for nuclear power plants, Ann. Nucl. Energy 142 (2020) 107410. https://doi.org/10.1016/j.anucene.2020.107410
- Francois Auger, et al., Industrial applications of the Kalman filter: a review, IEEE Trans. Ind. Electron. 60 (12) (2013) 5458-5471. https://doi.org/10.1109/TIE.2012.2236994
- Samira Roshany-Yamchi, et al., Kalman filter-based distributed predictive control of large-scale multi-rate systems: application to power networks, IEEE Trans. Control Syst. Technol. 21 (1) (2011) 27-39. https://doi.org/10.1109/TCST.2011.2172444
- Xinan Zhang, et al., Sensor fault detection, isolation and system reconfiguration based on extended Kalman filter for induction motor drives, IET Electr. Power Appl. 7 (7) (2013) 607-617. https://doi.org/10.1049/iet-epa.2012.0308
- Kebina Manandhar, et al., Detection of faults and attacks including false data injection attack in smart grid using Kalman filter, IEEE transactions on control of network systems 1 (4) (2014) 370-379. https://doi.org/10.1109/TCNS.2014.2357531
- Venkata Reddy Palleti, Yu Chong Tan, Lakshminarayanan Samavedham, A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems, J. Process Control 68 (2018) 160-170. https://doi.org/10.1016/j.jprocont.2018.05.005
- Takashi Irita, Toru Namerikawa, Decentralized fault detection of multiple cyber attacks in power network via Kalman filter, in: 2015 European Control Conference (ECC), IEEE, 2015.
- Jairo Giraldo, et al., A survey of physics-based attack detection in cyber-physical systems, ACM Comput. Surv. 51 (4) (2018) 1-36.
- Jean-Yves Keller, Dominique Sauter, Monitoring of stealthy attack in networked control systems, in: 2013 Conference on Control and Fault-Tolerant Systems (SysTol), IEEE, 2013.
- Chuadhry Mujeeb Ahmed, Adepu Sridhar, Aditya Mathur, Limitations of state estimation based cyber attack detection schemes in industrial control systems, in: 2016 Smart City Security and Privacy Workshop, SCSP-W). IEEE, 2016.
- Jae-gu Song, et al., Development of hardware in the loop system for cyber security training in nuclear power plants, Journal of The Korea Institute of Information Security & Cryptology 29 (4) (2019) 867-875. https://doi.org/10.13089/JKIISC.2019.29.4.867
- S.I.L.V.A. e, R.A. Busquim, et al., Advanced method for neutronics and system code coupling RELAP, PARCS, and MATLAB for instrumentation and control assessment, Ann. Nucl. Energy 140 (2020) 107098. https://doi.org/10.1016/j.anucene.2019.107098
- e Silva, RA Busquim, et al. "Cybersecurity assessment framework for digital interface between safety and security at nuclear power plants." International Journal of Critical Infrastructure Protection 34 (2021): 100453. https://doi.org/10.1016/j.ijcip.2021.100453
- Chanyoung Lee, et al., Development of a demonstrable nuclear cyber security test-bed and application plans, in: In Transactions of the, vol. 2019, KNS Spring Meeting, 2019, pp. 23-25.
- Jinsoo Shin, et al., Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed, Nucl. Eng. Technol. 53 (10) (2021) 3319-3326. https://doi.org/10.1016/j.net.2021.04.031
- MathWorks, System Identification Toolbox User's Guide, MathWorks, 2016.
- Jae-gu Song, et al., Preparation for cyber security incident response training in nuclear power plants, in: In Transactions of the 2020, KNS Spring Meeting, 2020, pp. 9-11.