Design of Idle-time Measurement System for Data Spoofing Detection |
Jung, Sung-Mo
(Department of Multimedia, Hannam University)
Song, Jae-Gu (Department of Multimedia, Hannam University) Kim, Tai-Hoon (Department of Multimedia, Hannam University) So, Yo-Hwan (Department of Multimedia, Hannam University) Kim, Seok-Soo (Department of Multimedia, Hannam University) |
1 | Introduction to MODBUS, Technical Tutorial, Dec. 2002. |
2 | What is a packet sniffer?.tech-faq.com.RetrievedonMar.2008. |
3 | 서우일, 박현민, 최병석, 박재현, "TCP Connection ARP Spoofing/Hijacking에 대한 탐지 및 추적에 대한 연구", 정보통신연구진흥원 학술기사, 2000. |
4 | 조제경, 이형우, "Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법", 인터넷정보학회논문지 제9권 제4호, 2008. 과학기술학회마을 |
5 | GAO, "Critical Infrastructure Protection: Challenge and Efforts to Secure Control System", http://www.gao.gov, Mar. 2004. |
6 | McClanahan, R.H., "The Benefits of Networked SCADA Systems Utilizing IP-Enabled Networks", Rural Electric Power Conference, 2002. 2002 IEEE, 5-7 May 2002 Pages: C5 - C5_7. |
7 | National Intelligence Service, "2004 The White Paper of National Information Security", http://www.nis.go.kr, 2004. |
8 | Ron Derynck, "Cyber-Security and System Integrity for Transportation Networks, Verono White paper", 2004. |
9 | David L, Fraley, "Cyberwarfare: VoIP and Convergence Increase Vulnerability", Gartner Report, http://www.gertnder.com, Jan. 2004. |
10 | Technical Information Bulletin 04-1, "Supervisory Control and Data Acquisition (SCADA) Systems", NCS TIB 04-1, Oct. 2004. |