Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.1.151

Design of Idle-time Measurement System for Data Spoofing Detection  

Jung, Sung-Mo (Department of Multimedia, Hannam University)
Song, Jae-Gu (Department of Multimedia, Hannam University)
Kim, Tai-Hoon (Department of Multimedia, Hannam University)
So, Yo-Hwan (Department of Multimedia, Hannam University)
Kim, Seok-Soo (Department of Multimedia, Hannam University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.1, 2010 , pp. 151-158 More about this Journal
Abstract
The industrial foundation of the inside and outside of a country has brought significant damages due to attacks from hackers. Especially, if the national primary core infrastructures(like electric power, dam, railroad, atomic energy, etc.) has been significantly damaged, it can be directly linked not only to economic problems but also to people's lives. These national primary core infrastructures usually constitute SCADA system using Modbus RS486 communication. Because of this characteristic, SCADA system has RTU master and slave linked to RJ11 cables to directly pass commands. RJ11 is possible in data spoofing using physical connection because the transmission range of RJ11 has a wide bandwidth(almost 1km). Hence, this paper designed an idle-time measurement system for SCADA system for emerging security improvement in the national primary core infrastructures.
Keywords
Smart Grid; Spoofing; Measurement System; SCADA Security; Industrial Facilities Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Introduction to MODBUS, Technical Tutorial, Dec. 2002.
2 What is a packet sniffer?.tech-faq.com.RetrievedonMar.2008.
3 서우일, 박현민, 최병석, 박재현, "TCP Connection ARP Spoofing/Hijacking에 대한 탐지 및 추적에 대한 연구", 정보통신연구진흥원 학술기사, 2000.
4 조제경, 이형우, "Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법", 인터넷정보학회논문지 제9권 제4호, 2008.   과학기술학회마을
5 GAO, "Critical Infrastructure Protection: Challenge and Efforts to Secure Control System", http://www.gao.gov, Mar. 2004.
6 McClanahan, R.H., "The Benefits of Networked SCADA Systems Utilizing IP-Enabled Networks", Rural Electric Power Conference, 2002. 2002 IEEE, 5-7 May 2002 Pages: C5 - C5_7.
7 National Intelligence Service, "2004 The White Paper of National Information Security", http://www.nis.go.kr, 2004.
8 Ron Derynck, "Cyber-Security and System Integrity for Transportation Networks, Verono White paper", 2004.
9 David L, Fraley, "Cyberwarfare: VoIP and Convergence Increase Vulnerability", Gartner Report, http://www.gertnder.com, Jan. 2004.
10 Technical Information Bulletin 04-1, "Supervisory Control and Data Acquisition (SCADA) Systems", NCS TIB 04-1, Oct. 2004.