Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.2.279

A study on the managed security services(MSS) method for energy-based SCADA Systems  

Jang, Jeong-Woo (Graduate School of Information Security, Korea University)
Kim, Woo-Suk (Graduate School of Information Security, Korea University)
Yoon, Ji-Won (Graduate School of Information Security, Korea University)
Abstract
In this study, we propose an effective network managed security services model that can detect a presence of potential malicious codes inside the energy-based SCADA Systems. Especially, by analyzing the data obtained in the same environment of SCADA Systems, we develop detection factors to applicable to the managed security services and propose the method for the network managed security services. Finally, the proposed network managed security services model through simulation proved possibility to detect malicious traffic in SCADA systems effectively.
Keywords
SCADA; IDS; Firewall;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Dong-hwi Lee, Kyong-ho Choi, "A Study of an Anomalous Event Detection using White-List on Control Networks," Convergence security journal, 12(4), pp. 78-84, Sep. 2012.
2 Pauline Koh, Hwa-jae Choi, Se-ryoung Kim, Hyuk-min Kwon, Huy-kang Kim, "Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property," Journal of the Korean Institute of Information Security and Cryptology, 22(2), pp. 267-281, Apr. 2012.
3 K. Stouffer, J. Falco, and K. Kent, "Guide to supervisory control and data acquisition (SCADA) and industrial control systems security," Recommendations of the National Institute of Standards and Technology, pp. 498-506, Sep. 2006.
4 D. Yang, A. Usynin, and J. Hines, "Anomaly-based intrusion detection for SCADA systems," 5th International Topical Meeting on Nuclear Plant Instrumentation Controls and Human Machine Interface Technology, Nov. 2006.
5 R. Ramos, R. Barbosa, and A. Pras, "Intrusion detection in SCADA networks," Mechanisms for Autonomous Management of Networks and Services, LNCS 6155, pp. 163-166, 2010.
6 A. Carcano, I.N. Fovino, M. Masera, and Alberto Trombetta, "State-based network intrusion detection systems for SCADA protocols: a proof of concept," Critical Information Infrastructures Security, LNCS 6027, pp. 138-150, 2010.
7 Wan-jib Kim, Huy-kang Kim, Kyung-ho Lee, Heung-youll Youm, "Risk Analysis and Monitoring Model of Urban SCADA Network Infrastructure," Journal of the Korean Institute of Information Security and Cryptology, 21(6), pp. 67-81, Dec. 2011.
8 Homeland Security, ICS-CERT Year in Review, 2013
9 NCSC, MSIP, KCC, MOSPA, 2013 White Paper on National Intelligence, pp. 99-102, 2013
10 NCSC, The security guidelines for SCADA systems in national infrastructure, Apr. 2010
11 US Department of Commerce, NIST Special Publication 800-82, Guide to Industrial Control Systems(ICS) Security, June 2013