원문정보
보안공학연구지원센터(IJMUE)
International Journal of Multimedia and Ubiquitous Engineering
Vol.3 No.4
2008.10
pp.75-86
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA (Supervisory Control and Data Acquisition) system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This study analyzes the vulnerabilities of SCADA systems through scenarios, designs a test-bed to prove such vulnerabilities, and suggests security devices..
목차
Abstract
1. Introduction
2. Related Works
2.1. SCADA System
2.2. SCADA Communication Methods and Media
2.3. MODBUS
2.4. Expected Hacking Method: Packet Sniffer
3. Vulnerability Analysis
3.1. Virtual Scenarios
3.2. Evaluation Factors
3.3. Open Tools for Access to SCADA systems
4. Design of Test-bed and Security Device
4.1. Sniffing-Detect
4.2. SCADA Test-bed
4.3. Structure of Prototype Security Device
4.4. Effects of the Designed Security Device
5. Conclusion
6. References
1. Introduction
2. Related Works
2.1. SCADA System
2.2. SCADA Communication Methods and Media
2.3. MODBUS
2.4. Expected Hacking Method: Packet Sniffer
3. Vulnerability Analysis
3.1. Virtual Scenarios
3.2. Evaluation Factors
3.3. Open Tools for Access to SCADA systems
4. Design of Test-bed and Security Device
4.1. Sniffing-Detect
4.2. SCADA Test-bed
4.3. Structure of Prototype Security Device
4.4. Effects of the Designed Security Device
5. Conclusion
6. References
저자정보
참고문헌
자료제공 : 네이버학술정보
