Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.6.67

Risk Analysis and Monitoring Model of Urban SCADA Network Infrastructure  

Kim, Wan-Jib (Soonchunhyang University)
Lee, Kyung-Ho (Korea University)
Kim, Huy-Kang (Korea University)
Youm, Heung-Youl (Soonchunhyang University)
Abstract
In recently years, there are cyber-weapon aim to national infrastructure such as 'stuxnet'. Security experts of the world are paying attention to this phenomenon. The networks which controls traffic, subway, waterworks of the city are safe from threats such as computer virus, malware, because the networks were built on closed-networks. However, it's about time to develop countermeasure for the cyber-weapon. In this paper, we review status-quo of the control systems for metropolitan infrastructure and analyze the risk of industrial control system in SCADA(Supervisory Control And Data Acquisition) network. Finally, we propose a security model for control systems of metropolitan infrastructure.
Keywords
SCADA; Network Monitoring; stuxnet; Risk Management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Holbert, K.E., Mishra, A., and Mili, L., "Intrusion Detection Through SCADA Systems Using Fuzzy Logic-Based State Estimation", International Journal of Critical Infrastructures, Vol. 3, No. 1-2, pp 58-87, Jan., 2007.   DOI
2 P. Oman and M. Phillips, "Intrusion detection and event monitoring in SCADA networks", in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 161 -173, Nov., 2007.
3 Tanya Roosta, Dennis K. Nilsson, Ulf Lindqvist, and Alfonso Valdes, "An Intrusion Detection System for Wireless Process Control Systems, Proceedings of the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 866-872, Sep., 2008.
4 Andrea Carcano, Igor Nai Fovino, Marcelo Masera and Alberto Trombetta, "State-Based Network Intrusion Detection systems for SCADA protocols A proof of concept", Lecture Notes in Computer Science, Vol. 6027/2010, pp.138-150, Jul., 2010.
5 SPC basic charts: https://controls.engin. umich.edu/wiki/index.php/SPC:_B asic_control_charts:_theory_and_constr uction,_sample_size,_x-bar,_r_charts,_s _charts
6 RFM analysis,
7 http://en.wikipedia.org/wiki/RFM
8 ISO/IEC 2000, "INTERNATIONAL STANDARD ISO/IEC 27001, Information technology — Security techniques — Information security management systems — Requirements," Oct 2005.
9 Keith Stouffer, Joe Falco, and Karen Scarfone, "Guide to Industrial Control Systems (ICS) Security," National Institute of Standards and Technology, Special Publication 800-82, Sep. 2008.
10 안철수연구소, "Stuxnet과 AhnLab Trus-Line," Stuxnet White Paper ver. 1.0, pp. 3-6, 2010년 10월.
11 김휘강, "RFM 분석 방법론을 통한 지능적인 서버기반 침입탐지 시스템", 석사학위 논문, 한국과학기술원, 1999년 12월.
12 Huy Kang Kim, Kwang Hyuk Im, and Sang Chan Park, "DSS for computer security incident response applying CBR and collaborative response," Expert Systems with Applications, Vol 37, Issue 1, pp. 852-870, Jan, 2010   DOI   ScienceOn
13 Cheung, S., Dutertre, B., Fong, M.,Lindqvist, U., Skinner, K., and Valdes, A., "Using model-based intrusion detection for SCADA network" In Proceedings of the SCADA Security Scientific Symposium, pp. 127-134 , Jan, 2007.
14 Verba, J. and Milvich, M., "Idaho national laboratory supervisory control and data acquisition intrusion detection system (SCADA IDS)", Technologies for Homeland Security, 2008 IEEE Conference on 12-13, pp.469-473. May 2008.