Browse > Article

MITRE ATT&CK 프레임워크 기반 에너지분야 기반시설 보안 모니터링 방안  

Choi, Seungoh (ETRI 부설연구소)
Kim, HyoungChun (ETRI 부설연구소)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Rizvi, R. J. Orr, A. Cox, P. Ashokkumar, and M. R. Rizvi, "Identifying the attack surface for IoT network," Internet of Things, Vol. 9, 2020.
2 R. Lee, J. Slowik, B. Miller, A. Cherepanov, and R. Lipovsky, "Industroyer/crashoverride: Zero things cool about a threat group targeting the power grid," Black Hat USA, 2017.
3 R.Spenneberg, M. Brüggemann, and H. Schwartke, "PLC-Blaster: A worm living solely in the PLC," Black Hat Asia, pp. 1-16, 2016.
4 D. Formby, S. Durbha, and R. Beyah, "Out of control: Ransomware for industrial control systems," RSA conference, 2017.
5 S. K. Damodaran and P. D. Rowe, " Limitations on observability of effects in cyber-physical systems," In Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security (HotSoS '19), pp. 1-10, April 2019.
6 H. Shin, W. Lee, J. Yun, and H. Kim, "Implementation of programmable CPS testbed for anomaly detection," USENIX Workshop on Cyber Security Experimentation and Test (CSET '19), Aug. 2019.
7 H. Shin, W. Lee, J. Yun, and H. Kim, "HAI 1.0: HIL-based augmented ICS security dataset," USENIX Workshop on Cyber Security Experimentation and Test (CSET '20), Aug. 2020.
8 B. E. Strom, A. Applebaum, D. P. Miller, K. C. Nickels, A. G. Pennington, and C. B. Thomas, "MITRE ATT&CK: Design and philosophy," MP180360, MITRE Corporation, July 2018.
9 E. M. Hutchins, M. J. Cloppert, and R. M. Amin, "Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains," Leading Issues in Information Warfare & Security Research, vol. 1, no. 1, pp. 80, 2011.
10 Pascal Ackerman, "Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems," Packt Publishing, 2017.
11 J. Choi, H. Kim, S. Choi, J. Yun, B. Min, and H. Kim, "POSTER: Vendor- Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management," In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (AsiaCCS '19), pp. 682-684, July 2019.
12 S. Choi, W. Lee, H. Shin, J. Yun, and S. Kim, "POSTER: CPS Security Testbed Development Using Controller-in-the- Middle," In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS '18), pp. 829-831, May 2018.
13 M. Guri, B. Zadov, D. Bykhovsky, and Y. Elovici, "PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1879-1890, 2020.   DOI