• Title/Summary/Keyword: SCADA System

Search Result 290, Processing Time 0.025 seconds

Development of Anti-disaster System for Natural Gas Governor Station Using Wire and/or Wireless Communication ($\cdot$무선 데이터 통신을 이용한 천연가스 정압소의 안전방재 시스템 개발)

  • Yoo Hui Ryong;Park Dae Jin;Koo Sung Ja;Park Seoung Soo;Rho Yong Woo
    • Journal of the Korean Institute of Gas
    • /
    • v.3 no.2 s.7
    • /
    • pp.17-23
    • /
    • 1999
  • The wire and/or wireless data communication system for anti-disaster system of natural gas governor station was developed. In oder to prevent accidents of governor station, the operator was replaced by RTU(Remote Terminal Unit) which gather and transmit safety situation of governor station. The database and MMI(Man Machine Interface) were also developed to analyze the situation of governor station. The data communication between server and RTU was designed to switch automatically from wire to wireless communication and vice versa when one of them failed communication. We also have developed the patrol car management system which was applied GPS(Global Position System)/GIS(Geometric Information System), and the earthquake detection/transmission system which was adopted three dimension acceleration sensor. When a earthquake may occur, the earthquake detection/transmission system monitors data such as PGA(Peak Ground Acceleration), Sl(Spectrum Intensity) and orders the emergency shutoff valve close immediately.

  • PDF

A Case Study on the Implementation of a River Water Level Monitoring System using PLC(Programmable Logic Controller) and Public Telecommunication Network (PLC(Programmable Logic Controller)와 공중통신망을 이용한 하천수위감시시스템 구축 사례 연구)

  • Kim, Seokju;Kim, Minsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.1-17
    • /
    • 2015
  • A river water level monitoring system which prevents salt water damages and effectively excludes floods has been developed to contribute efficient operation of Nakdong river estuary barrage. The system can be used for monitoring upstream conditions more quickly and do appropriate responses over changes. Telemetry and telecontrols using PLCs have been built at the three sites that directly influence on the operation of barrage gates, and are linked to Nakdong river estuary barrage's IOS (Integrated Operation System) through public communication networks. By using PLC, the system can achieve even higher reliability and versatility than before as well as easy management. By power control devices, we can remotely control the power of PLCs to treat the minor troubles instantly without going on-sites. The power control devices also save data in preparation for the cases of communication failures. The system uses ADSL (FTTH) as a main network between SCADA server and PLCs, and CDMA (M2M) as a secondary network. In order to compensate security vulnerabilities of public communication network, we have installed the VPNs for secure communication between center and the observation stations, just like a dedicated network. Generally, river water level observations have been used custom-manufactured remote terminals to suit their special goals. However, in this case, we have established a system with open architecture considering the interface between different systems, the ease of use and maintenance, security, price, etc.

A Efficient Network Security Management Model in Industrial Control System Environments (산업제어시스템 환경에서 효과적인 네트워크 보안 관리 모델)

  • Kim, Il-Yong;Lim, Hee-Teag;Ji, Dae-Bum;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.664-673
    • /
    • 2018
  • The industrial control system (ICS) has operated as a closed network in the past, but it has recently been linked to information and communications services and has been causing damage due to cyber attacks. As a countermeasure, the Information Communication Infrastructure Protection Act was enacted, but it cannot be applied to various real control environments because there is only a one-way policy-from a control network to a business network. In addition, IEC62443 defines an industrial control system reference model as an international standard, and suggests an area security model using a firewall. However, there is a limit to linking an industrial control network, operating as a closed network, to an external network only through a firewall. In this paper, we analyze the security model and research trends of the industrial control system at home and abroad, and propose an industrial control system security model that can be applied to the actual interworking environments of various domestic industrial control networks. Also, we analyze the security of firewalls, industrial firewalls, network connection equipment, and one-way transmission systems. Through a domestic case and policy comparison, it is confirmed that security is improved. In the era of the fourth industrial revolution, the proposed security model can be applied to security management measures for various industrial control fields, such as smart factories, smart cars, and smart plants.

LSTM-based Anomaly Detection on Big Data for Smart Factory Monitoring (스마트 팩토리 모니터링을 위한 빅 데이터의 LSTM 기반 이상 탐지)

  • Nguyen, Van Quan;Van Ma, Linh;Kim, Jinsul
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.789-799
    • /
    • 2018
  • This article presents machine learning based approach on Big data to analyzing time series data for anomaly detection in such industrial complex system. Long Short-Term Memory (LSTM) network have been demonstrated to be improved version of RNN and have become a useful aid for many tasks. This LSTM based model learn the higher level temporal features as well as temporal pattern, then such predictor is used to prediction stage to estimate future data. The prediction error is the difference between predicted output made by predictor and actual in-coming values. An error-distribution estimation model is built using a Gaussian distribution to calculate the anomaly in the score of the observation. In this manner, we move from the concept of a single anomaly to the idea of the collective anomaly. This work can assist the monitoring and management of Smart Factory in minimizing failure and improving manufacturing quality.

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

Cyber-Threat Detection of ICS Using Sysmon and ELK (Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지)

  • Kim, Yongjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.331-346
    • /
    • 2019
  • Global cyber threats to industrial control systems are increasing. As a result, related research and cooperation are actively underway. However, we are focusing on strengthening security for physical network separation and perimeter. Internal threats are still vulnerable. This is because the easiest and strongest countermeasure is to enhance border security, and solutions for enhancing internal security are not easy to apply due to system availability problems. In particular, there are many vulnerabilities due to the large number of legacy systems remaining throughout industrial control systems. Unless these vulnerable systems are newly built according to the security framework, it is necessary to respond to these vulnerable systems, and therefore, a security solution considering availability has been verified and suggested. Using Sysmon and ELK, security solutions can detect Cyber-threat that are difficult to detect in unstructured ICS.

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

A Study on Development of Gas Accident Management System based on GIS (GIS 기반의 가스사고 관리시스템 개발에 대한 연구)

  • Kim, Kye-Hyun;Kim, Tae-Il
    • 한국지형공간정보학회:학술대회논문집
    • /
    • 2002.03a
    • /
    • pp.106-112
    • /
    • 2002
  • 최근 급속한 도시의 팽창 및 신도시 건설과 산업의 발전으로 가스시설은 꾸준히 확대되고 있는 실정이다. 그리고 94년 아현동 도시가스사고와 95년 대구 도시가스사고 이후로 도시 가스 시설물의 대한 안전 대책 및 시설물 관리에 대한 국민들의 관심이 증대되었다. 이러한 흐름에 따라 가스회사들은 GIS 기술을 도입하여 기존에 수작업으로 관리되고 있는 가스시설 정보체계를 전산화하여 항상 최신의 현황을 유지하고, 사고 발생시 신속한 대처 방안 및 피해예측을 위한 시스템을 개발하기 위하여 많은 연구를 진행하고 있는 실정이다. 본 연구의 목적은 안전이 중요시되는 가스시설물에 대하여 가스사고 발생시 신속한 대처 및 처리방안을 제시할 수 있는 GIS 기반의 가스사고 관리시스템을 개발하는데 있다. GIS의 가스사고 관리시스템에서는 사고 발생시에 시설물 관리자가 사고 지점을 선택하여 우선적으로 공급을 중단해야 할 관로를 제시하고 사고지점을 검색하여 차단해야 할 밸브에 대한 정보를 신속히 제공하여 대응 방안을 제시 할 수 있도록 하였다. 아울러 가스공급이 중단되는 지역에 대한 정보를 추출하여 피해범위를 산정하여 효율적인 사고 관리를 지원하도록 구성되었으며, 이와 함께 잔존가스량을 구하여 사고후의 대처방안을 마련할 수 있는 기능을 제공하도록 하였다. 향후 연구과제로는 원격으로 가스 시설물을 감시하고 제어할 수 있는 원격감시/제어시스템(SCADA System)과 연계를 통하여 가스사고 후에 신속한 피해예측 및 피해를 최소화 할 수 있는 방안제시 및 GPS를 활용하여 신속한 사고처리를 할 수 있는 활용 방안을 연구하여 체계적이고 종합적인 가스사고의 관리가 필요하다고 사료된다. 또한, 사고 후의 긴급 대처방안 뿐만 아니라 잔존가스량을 이용하여 수용가에 가스의 신속한 재공급을 위한 정보의 제공까지 한 단계 발전된 시스템의 개발이 추진되어야 한다.남산지역에 대해 정사영상과 10m간격의 DEM을 제작하였으며 1:1000 수치지도를 통해 제작된 DEM과 비교한 결과 총 43990개 격자점의 표고 차이는 평균 5.98m였다.여재 높이 100 cm에서 원수를 하향류 및 상향류로 주입하면서 하향류 20, 40, 80, 100 cm, 상향류 20, 40, 60, 80, 100 cm에서 시료를 채취하여 분석한 결과 모두 원수가 주입되는 부근 여재 높이 20 cm에서 가장 많이 제거되었다. 상향류 보다 하향류로 원수를 주입했을 때 제거효율이 높았다. $Fe^{+++}$$Fe^{++}$로 환원하는 $O^{-}_{2}{\cdot}$의 작용을 대신할 수 있음을 증명하며 이와같은 ascorbate 의존적인 $OH{\cdot}$ 의 생성은 ascorbate가 조직손상에 관여할 가능성을 시사하였다.었다. 정확한 예측치를 얻기 위하여 불균질 조직이 조사야에 포함되는 경우 보정이 요구되며, 골반의 경우 골 조직의 보정이 중요한 요인임을 알 수 있었다. 이를 위하여 불균질 조직에 대한 정확한 정보가 요구되며, 이는 CT 영상을 이용하는 것이 크게 도움이 되리라 생각된다.전시 슬러지층과 상등액의 온도차를 측정하여 대사열량의 발생량을 측정하고 슬러지의 활성을 측정할 수 있는 방법을 개발하였다.enin과 Rhaponticin의 작용(作用)에 의(依)한 것이며, 이는 한의학(韓醫學) 방제(方劑) 원리(原理)인 군신좌사(君臣佐使) 이론(理論)에서 군약(君藥)이 주증(主症)에 주(主)로 작용(作用)하는 약물(藥物)이라는 것을 밝혀주는 것이라고 사료(思料)된다.일전 $13.447\;{\mu}g/hr/g$, 섭취 7일중 $8.123\;{\mu}g/hr/g$, 절식 14일후 $10.612

  • PDF

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.