• Title/Summary/Keyword: SCADA System

Search Result 291, Processing Time 0.03 seconds

Classification of ICS abnormal behavior in terms of security (보안측면에서의 산업제어시스템 비정상 행위 분류)

  • Na, Jung-Chan;Cho, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.329-337
    • /
    • 2013
  • Cyber threats of the ICS(Industrial Control System) has been researched on the level to the threat to the network service as well as a specific system, even if the extent of damage was not intended. Although some range of "security" just include the protection of systems against the deliberate attacks of terrorists or cyber hackers, often more damage is done by carelessness, and equipment failures than by those deliberate attacks. This paper presented a taxonomy for classifying all abnormal behaviors of ICS, including deliberate attacks, inadvertent mistakes, equipment failures, and software problems. The classification criteria of ICS abnormal behaviors was selected to highlight commonalities and important features of deliberate attacks as well as inadvertent actions.

The Design of Operating System on Wind Power Plant (풍력발전기 운영시스템의 설계)

  • Yang, Soo-Young;Kwon, Jun-A;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.135-141
    • /
    • 2011
  • Recently, the more demand of reusable energy is globally increasing, the nationwide industry of wind power plants is more thriving. However, the level of native technology for operating wind power plants falls behind advanced countries. Thus, the most of management systems for wind power plants should be imported from the advanced countries. Additionally, advanced countries, which have possessed the controllable skills and consummate operating knowhow over decades, are blockading other countries which want to enter the market of wind power plants, and lead markets. This paper designs a prototype of HMI(Human Machine Interface) system which can effectively control and manage wind power plants.

Trend Analysis and Diagnosis for BWTS Remote Monitoring (BWTS 원격 모니터링을 위한 트렌드 분석 및 진단)

  • Choi, Wook-Jin;Kim, Chin-Hoon;Choi, Hwi-Min;Lee, Kwang-Seob;Choi, Woo-Jin;Kim, Joo-Man
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.3
    • /
    • pp.127-135
    • /
    • 2014
  • On lot of ships, Ballast Water Treatment Systems(BWTS) are in use, or the newly built ship should be mandatory installation by 2017. It is IMO(International Maritime Organization) regulations. Because the vessel is in long distance, It is managed this system only in the vessel and it may occur considerable cost of maintenance when a problem arises from BWTS. We describe in this paper how to monitor treated ballast water to make sure the ballast water and BWTS on a ship is in proper condition, but before the port entrance. In addition, analysing and forecasting trend signal to prevent failure. Also we can expect reduce the cost of BWTS maintenance. We can monitor the sensor data value's change which collected through satellite from BWTS. And we can observate the ballasting and de-ballasting state of the vessel easily.

Analysing and Neutralizing the Stuxnet's Stealthing Techniques (Stuxnet의 파일 은닉 기법 분석 및 무력화 방법 연구)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.838-844
    • /
    • 2010
  • This paper introduces Stuxnet, a malicious ware that presently stimulates severity of the cyber warfare worldwide, analyses how it propagates and what it affects if infected and proposes a process to cure infected systems according to its organization. Malicious wares such as Stuxnet secretes themselves within the system during propagation and it is required to analyze file hiding techniques they use to detect and remove them. According to the result of the analysis in this paper, Stuxnet uses the library hooking technique and the file system filter driver technique on both user level and kernel level, respectively, to hide its files. Therefore, this paper shows the results of the Stuxnet's file hiding approach and proposes an idea for countermeasure to neutralize it. A pilot implementation of the idea afterward shows that the stealthing techniques of Stuxnet are removed by the implementation.

Development of SaaS cloud infrastructure to monitor conditions of wind turbine gearbox (풍력발전기 증속기 상태를 감시하기 위한 SaaS 클라우드 인프라 개발)

  • Lee, Gwang-Se;Choi, Jungchul;Kang, Seung-Jin;Park, Sail;Lee, Jin-jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.9
    • /
    • pp.316-325
    • /
    • 2018
  • In this paper, to integrate distributed IT resources and manage human resource efficiently as purpose of cost reduction, infrastructure of wind turbine monitoring system have been designed and developed on the basis of SaaS cloud. This infrastructure hierarchize data according to related task and services. Softwares to monitor conditions via the infrastructure are also developed. Softwares are made up of DB design, field measurement, data transmission and monitoring programs. The infrastructure is able to monitor conditions from SCADA data and additional sensors. Total time delay from field measurement to monitoring is defined by modeling of step-wise time delay in condition monitoring algorithms. Since vibration data are acquired by measurements of high resolution, the delay is unavoidable and it is essential information for application of O&M program. Monitoring target is gearbox in wind turbine of MW-class and it is operating for 10 years, which means that accurate monitoring is essential for its efficient O&M in the future. The infrastructure is in operation to deal with the gearbox conditions with high resolution of 50 TB data capacity, annually.

Development of Platform for Connection of Electronic Power Backbone based on D-TRS (D-TRS 기반 전력기간망 접속을 위한 게이트웨이 플랫폼 개발)

  • Song, Byeong-Kwon;Lee, Sang-Hun;Jeong, Tae-Eui;Kim, Gun-Woong;Kim, Jin-Chul;Kim, Young-Eok
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.382-384
    • /
    • 2008
  • D-TRS is a method of wireless communication. This method will be able to use several frequency for multiple user used chanel together. TETRA of D-TRS technology is not rented network. Using TETRA network has the strong point which cost better than CDMA network of rental network. Master server of SCADA(Supervisory Control And Data Acquisition) system is realtime supervise control and a data acquire the control system or the RTU(Remote Terminal Unit). The present paper is developed and proposal the gateway platform for electronic power backbone network based on D-TRS. This gateway platform is converted DNP3.0 messages with TETRA PDU and converted TETRA PDU with DNP3.0 messages. Master server and FRTU will be able to send and receive DNP3.0 message via TETRA network using this gateway platform.

  • PDF

Whitelist-Based Anomaly Detection for Industrial Control System Security (제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법)

  • Yoo, Hyunguk;Yun, Jeong-Han;Shon, Taeshik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.641-653
    • /
    • 2013
  • Recent cyber attacks targeting control systems are getting sophisticated and intelligent notoriously. As the existing signature based detection techniques faced with their limitations, a whitelist model with security techniques is getting attention again. However, techniques that are being developed in a whitelist model used at the application level narrowly and cannot provide specific information about anomalism of various cases. In this paper, we classify abnormal cases that can occur in control systems of enterprises and propose a new whitelist model for detecting abnormal cases.

Analisys of Power System Remote Data Acquisition & Control System Operating (전력계통 원격자료취득.제어시스템 운영실적에 대한 고찰)

  • Sa, Kwan-Joo;Lee, Sung-Eun;Cho, Se-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2008.10a
    • /
    • pp.75-76
    • /
    • 2008
  • 전력거래소는 전격계통 안정된 운영과 공정한 전력시장 운영을 주요 임무로 하며, 이를 위하여 전국의 80여개의 발전소와 600여개 변전소로부터 발전량, 전압, 조류, 자단기 상태정보 등 다양한 전력계통 자료를 취득하고 있다 전력거래소의 중앙급전소에는 이와 같은 계통자료 취득은 물론 발전량 제어기능을 수행하기 위한 에너지관리시스템(이하 EMS 라 한다)을 운영하고 있으며, 발,변전소에는 현장의 전력설비와 연결되어 계통자료를 취득하여 EMS로 전송하는 원격소장치 (이하 RTU 라한다)를 운영하고 있다. 자료취득 경로는 모든 발전소와 34skv급 이상의 변전소의 경우 EMS와 RTU가 직접 연결되어 자료를 취득하며 154Kv급 이하 변전소는 12개 지역급전소의 자료취득제어시스템(이하 SCADA라 한다)를 경유하여 자료를 취득하고 있다. 전력계통의 대형화와 복잡화에 따라 계통해석기능 자동발전제어기능에 의한 계류운영으로 정보기술에 대한 의존도가 증가하고 있으며, 변동비 반영시장의 개선운영에 따라 공정한 전력시장 운영과 안정된 전력계통 운영을 위해 전력계통 취득자료의 신뢰도가 요구되고 있다. 따라서 EMS를 비롯한 RTU, 통신망 등 전력계통 자료취득 설비의 운영실적을 분석하여 각 시스템별 고장 고장원인 고장유형 등을 고찰하므로써 시스템 성능개선을 위한 설비투자와 운영개선에 반영하고자 한다.

  • PDF

Considerations on development of EMS applications based on power system database (전력계통 데이터베이스 기반 EMS 응용프로그램 개발에 관한 고찰)

  • Hue, Seong-Ii;Kim, Seon-Gu;Lee, Hyo-Sang;Lee, Jin-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.309-310
    • /
    • 2008
  • 전력계통 컨트롤센터에서 사용되는 SCADA/EMS 응용프로그램은, 전력계통의 해석을 위해 특정한 포맷의 입력데이터 파일을 사용하는 일반적인 오프라인 응용프로그램과는 달리, 물리적 특성이 통합된 전력계통 데이터베이스 기반위에서 수행된다. 응용프로그램들은 데이터베이스를 통해 필요한 데이터를 상호 교환하며, 개별 응용프로그램은 데이터베이스와 연동하는 사용자화면을 통해 컨트롤센터의 운전원과 상호작용을 하게 된다. 따라서 전력계통 데이터베이스 기반위에서 수행되는 EMS용 응용프로그램을 개발하기 위해서는 먼저 프로그램 고유의 기능적인 측면은 물론 운전원을 포함한 여러 사용자를 위한 프로그램 운용적인 측면의 요소까지 종합 분석하여 필요한 기능과 화면 그리고 그에 따른 데이터를 도출해야 한다. 도출된 기능 및 화면설계안에 따라 개발된 프로그램과 사용자화면은 모든 입출력 데이터들이 반영된 데이터베이스와의 인터페이스를 통해 통합 EMS용 응용프로그램으로서의 형태를 갖추게 된다. 최종적으로 응용프로그램은 사전에 준비된 시험절차에 따라 검증(프로그램의 정확성, 신속성 그리고 신뢰성을 평가)과정을 수행한다. 본 논문은 전력IT 국가전략과제로 개발 진행 중인 한국형 EMS(K-EMS) 응용프로그램의 개발 프로세스와 각 프로세스에서의 고려사항들을 소개함으로써, 한국형 EMS를 위한 응용프로그램의 추가 개발 혹은 전력계통 데이터베이스 구축과 이를 활용한 응용프로그램의 개발을 위한 방법론을 제안하고자 한다.

  • PDF

Investigation and Complementary Measures Establishment for Flood on Tidal Reclaimed Paddy Fields (간척지 논 침수 원인 조사와 방재 대책 수립)

  • Jeong, Ju-Hong;Yoon, Kwang-Sik;Choi, Soo-Myung;Yoon,, Suk-Gun;Go, Young-Bae;Kim, Young-Taek
    • KCID journal
    • /
    • v.17 no.2
    • /
    • pp.105-114
    • /
    • 2010
  • Tidal land reclamation provided water resources and land for agriculture and contributed stable crop production. However, climate change by global warming disrupts the hydrologic circulatory system of the earth resulting in sea level rise and more frequent flood for reclaimed arable land. Recently, Suyu reclaimed paddy field in Jindo-gun experienced prolonged inundation after heavy rainfall and there is a growing risk of flood damage. Onsite survey and flood analysis using GATE_Pro model of Korea Rural Corporation were conducted to investigate causes of flooding. To perform the analysis, input data such as inflow hydrograph, the lowest elevation of paddy field, neap tide level, management level of Gunnae estuary lake at the time of the flood were collected. Flood analysis confirmed that current drainage facilities are not enough to prevent 20year return period flood. The result of analysis showed flooding more than 24hours. Therefore, flood mitigation alternatives such as sluice gate expansion, installation drainage pumping station, refill paddy land, and catch canal were studied. Replacing drainage culvert of Suyu dike to sluice gate and installing drainage pumping station at the Gunne lake were identified as an effective flood control measures. Furthermore, TM/TC (SCADA) system and expert for gate management are required for the better management of drainage for estuary dam and flood mitigation.

  • PDF