Browse > Article

무선통신기반 SCADA시스템 공격기법과 위협사례 및 연구 동향분석  

Kim, Ji-Hun (영남대학교)
Lee, Seong-Won (영남대학교)
Yun, Jong-Hui (영남대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Baker, George H., and Allan Berg. "Supervisory control and data acquisition (SCADA) systems." The Critical Infrastructure Protection Report 1.6 (2002).
2 Shahzad, A., et al. "The SCADA review: system components, architecture, protocols and future security trends." American Journal of Applied Sciences 11.8 (2014): 1418.   DOI
3 Sajid, Anam, Haider Abbas, and Kashif Saleem. "Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges." IEEE Access 4 (2016): 1375-1384.   DOI
4 Luders, Stefan. Control systems under attack?. No. CERN-OPEN-2005-025. 2005.
5 H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks,'' Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013. ,   DOI
6 U.S. Department of Homeland Security, "ICSALERT-13-016-02: Offline Brute-Force Password Tool Targeting Siemens S7," ICS-CERT, December 2013. Available: https://ics-cert.us-cert.gov/alerts/ICSALERT-13-016-02.
7 Syverson, Paul. "A taxonomy of replay attacks [cryptographic protocols]." Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE, 1994.
8 H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks,'' Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013. ,   DOI
9 Baker, George H., and Allan Berg. "Supervisory control and data acquisition (SCADA) systems." The Critical Infrastructure Protection Report 1.6 (2002).
10 http://www.etnews.com/20160405000068, 전자신문 etnews, 2016,04.05
11 Coffed, Jeff. "The threat of GPS jamming: The risk to an information utility." Report of EXELIS, Jan (2014)
12 3. 신천식. "GPS 전파교란 대응기술 동향." TTA Journal 149 (2013): 92-99.
13 New Technologies deployed to counter the threat of GPS Jamming,' Cellular-news, 2013. 2. 13
14 임종인, and 장규현. "전자적 제어시스템 침해 위협에 따른 법적 대응방안." 정보보호학회지 20.4 (2010): 52-65.
15 http://www.telegraph.co.uk/news/worldnews/1575293/Schoolboy-hacks-into-citys-tram-system.html, The telegraph, 11 Jan 2008, By Graeme Baker
16 Poulsen, Kevin. "Hacker disables more than 100 cars remotely." Internet]. Available: www.wired.com/threatlevel/2010/03/hacker-bricks-cars (2010).
17 Greenberg, Andy. "Hackers remotely kill a jeep on the highway-With me in it." Wired 7 (2015): 21.
18 Ghena, Branden, et al. "Green Lights Forever: Analyzing the Security of Traffic Infrastructure." WOOT 14 (2014): 7-7.
19 Ishtiaq Roufa, Rob Millerb, et al. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study." 19th USENIX Security Symposium, Washington DC. 2010
20 Francillon, Aurélien, Boris Danev, and Srdjan Capkun. "Relay attacks on passive keyless entry and start systems in modern cars." Proc. Network and Distributed System Security Symp.
21 Radcliffe, Jerome. "Hacking medical devices for fun and insulin: Breaking the human SCADA system." Black Hat Conference presentation slides. Vol. 2011. 2011.