首页> 外文期刊>CSI Transactions on ICT >SCADA security: a review and enhancement for DNP3 based systems
【24h】

SCADA security: a review and enhancement for DNP3 based systems

机译:SCADA安全性:对基于DNP3的系统的审查和增强

获取原文
获取原文并翻译 | 示例
           

摘要

Keywords SCADA security Vulnerabilities IDS Key management Page %P Close Plain text Look Inside Reference tools Export citation EndNote (.ENW) JabRef (.BIB) Mendeley (.BIB) Papers (.RIS) Zotero (.RIS) BibTeX (.BIB) Add to Papers Other actions Register for Journal Updates About This Journal Reprints and Permissions Share Share this content on Facebook Share this content on Twitter Share this content on LinkedIn Related Content Supplementary Material (0) References (44) References1.Tsang R (2010) Cyberthreats, vulnerabilities and attacks on SCADA Networks. University of California, Berkeley2.Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on SCADA system In: Proceedings of CPSCom 2011: the 4th IEEE international conference on cyber, physical and social computing, Dalian, China, October 19–223.Meserve J (2007) Sources: staged cyber attack reveals vulnerability in power grid. CNN, Washington, DC 4.Greenberg A (2008) Hackers Cut Cities’ Power. http://​www.​Forbes.​com. Accessed Feb 20125. http://​unix.​nocdesigns.​com/​aurora_​white_​paper.​htm. Accessed Feb 20126.Stamp J, Dillinger J, Young W, Depoy J (2003) Common vulnerabilities in critical infrastructure control systems. Sandia National Laboratories, Albuquerque7.DNP User Group. http://​www.​dnp.​org. Accessed Dec 20118.Makhija J, Subramanyan LR (2003) Comparison of protocols used in remote monitoring: DNP 3.0, IEC 870-5-101 and Modbus9.Cleveland F (2005) IEC TC57 security standards for the power systems info infrastructure: beyond simple encryption, IEC TC57 WG15 security standards ver510.IT Security Advisory Group (2005) SCADA security: advice for CEOs. Department of Communications, Information Technology and the Arts, Canberra11.East S, Butts J, Papa M, Shenoi S (2009) A taxonomy of attacks on the DNP3 protocol, crtical infrastructure protection III. IFIP Adv Inf Commun Technol 311:67–81CrossRef12.Ballman J (2003) The great blackout of 2003 Aug. 14 power outage largest in U.S. history. Disaster Recovery J 16(4)13.NCS (2004) Technical information bulletin 04-1, SCADA systems. NCS, Arlington14.Fovino IN, Coletta A, Masera M (2010) Taxonomy of security solutions for the SCADA sector, version 1.115.Ten CW, Manimaran G, Liu CC (2010) Cybersecurity for critical infrastructures: attack and defence modelling. IEEE Trans Syst Man Cybern 40(4):853–865CrossRef16.Beaver CL, Gallup DR, NeuMann WD, Torgerson MD (2002) Key management for SCADA (SKE). Sandia Lab, AlbuquerqueCrossRef17.Dawson R, Boyd C, Dawson E, Nieto JMG (2006) SKMA-A key management architecture for SCADA systems. In: Proceedings of the grid computing18.Lee S, Choi D, Park C, Kim S (2008) An efficient key management scheme for secure SCADA communication. In: Proceedings of world academy of science, engineering and technology, vol 3519.elec.qmul.ac.uk/resources/electricitydata/pages/electricitydata.html. Accessed Feb 201220.Patel A, Qassim Q, Wills C (2010) A survey of intrusion detection and prevention systems. Info Manage Comput Secur 18(4):27721.Zhu B, Sastry S (2010) SCADA-specific intrusion detection/prevention systems: a survey and taxonomy, secure control systems (SCS). Team for Research in Ubiquitous System Technology, Stockholm22. http://​www.​digitalbond.​com. Accessed Nov 201123.Verba J, Milvich M (2008) Idaho national laboratory supervisory control and data acquisition intrusion detection system (SCADA IDS) IEEE conference on technologies for homeland security24.Dayu Y, Alexander U, Hines JW (2006) Anomaly-based intrusion detection for SCADA systems, 5th international topical meeting on nuclear plant instrumentation, controls, and human machine interface technology25.Fovino IN, Coletta A, Carcano A, Masera M, Trombetta A (2010) Modbus/DNP3 state-based intrusion detection system 24th IEEE international conference on advanced information networking and applications26.Cheung S, Dutertre B, Fong M, Lindqvist U, Skinner K, Valdes A (2007) Using model-based intrusion detection for SCADA networks SCADA security scientific symposium 27.Liu CC, Stefanov A, Hong J, Panciatici P (2012) Intruders in the grid IEEE power and energy magazine28. http://​www.​vikingproject.​eu. Accessed April 201229. http://​www.​uclm.​edu/​area/​gsee/​Web/​Federico/​psat.​htm. Accessed March 201230.Liu Y, Ning P, Reiter MK (2009) False data injection attacks against state estimation in electric power grids. In: Proceedings of the 15th ACM conference on computer and communications security, pp 21–3231.Bagaria S, Prabhakar SB, Saquib Z (2011) Flexi-DNP3:flexible distributed network protocol version 3 (DNP3) for SCADA security. ReTIS, Kolkatta32.Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S (2002) Specification based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the 9th ACM conference on computer and communications security33.NCS (2004) DNP3 (Distributed Network Protocol version 3.0) , and Modbus NCS Technical Information Bulletin 04-1, SCADA Systems 34.Shahzad AA, Musa S (2012) Securing SCADA communication using hybrid cryptography ICUIMC. In: Proceedings of the 6th international conference35.Carcano A, Coletta A, Guglielmi M, Masera M, Nai Fovino I, Trombetta A (2011) A multidimensional critical state analysis for detecting intrusions in SCADA systems. IEEE Trans Ind inform 7(2):179–186CrossRef36.Fovino IN, Coletta A, Carcano A, Masera M (2012) Critical state-based filtering system for securing SCADA network protocols. IEEE Trans Ind Electron 59:1037.Orset JM, Alcade B, Cavalli A (2005) An EFSM based Intrusion detection system for ad hoc networks, automated technology for verification and analysis, LNCS 3707, pp 400–41338.Smith R, Estan C, Jha S (2008) XFA: faster signature matching with extended automata IEEE symposium on security and privacy39.Barry BIA, Chan HA (2007) A hybrid, stateful and cross-protocol intrusion detection system for converged applications. In: Lecture notes in computer science, vol 4804. pp 1616–163340.Garcia Teodoro P, Diaz Verdejo J, Macia Fernandez G, Yazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28:18–28CrossRef41.Mander T, Cheung R, Nabhani F (2010) Power system DNP3 data object security using data sets. Computer and Security 29:487–500CrossRef42. http://​164.​100.​176.​38/​patentsearch/​search/​index.​aspx. Accessed July 201243.Queiroz C, Mahmood A, Tari Z (2011) SCADASim a framework for building SCADA simulations. IEEE Trans Smart Grid 2(4):589-597CrossRef44. http://​www.​ee.​washington.​edu/​research/​pstca. Accessed Feb 2012 About this Article Title SCADA security: a review and enhancement for DNP3 based systems Journal CSI Transactions on ICT Volume 1, Issue 4 , pp 301-308 Cover Date2013-12 DOI 10.1007/s40012-013-0024-2 Print ISSN 2277-9078 Online ISSN 2277-9086 Publisher Springer India Additional Links Register for Journal Updates Editorial Board About This Journal Manuscript Submission Topics Software Engineering/Programming and Operating Systems Systems and Data Security Computer Communication Networks Input/Output and Data Communications Computer Science, general Keywords SCADA security Vulnerabilities IDS Key management Authors Peeyush Jain (1) Paritosh Tripathi (1) Author Affiliations 1. Centre for Development of Advanced Computing, Gulmohar Cross Road No. 9, Juhu, Mumbai, India Continue reading... To view the rest of this content please follow the download PDF link above.
机译:关键字SCADA安全漏洞IDS密钥管理页%P关闭纯文本查找内部参考工具导出引用EndNote(.ENW)JabRef(.BIB)Mendeley(.BIB)论文(.RIS)Zotero(.RIS)BibTeX(.BIB)添加拍拍其他动作注册期刊更新关于本期刊的转载和许可共享在Facebook上共享此内容在Twitter上共享此内容在LinkedIn上共享此内容相关内容补充材料(0)参考(44)参考1. Tsang R(2010)网络威胁,漏洞和对SCADA网络的攻击。加利福尼亚大学伯克利分校2朱B,约瑟夫A,萨斯特里S(2011)SCADA系统的网络攻击分类法于:CPSCom会议录2011:第四届IEEE国际网络,物理和社交计算会议,中国大连,10月19–223.Meserve J(2007)资料来源:分阶段的网络攻击揭示了电网中的漏洞。美国有线电视新闻网(CNN),华盛顿特区4.格林伯格A(2008)黑客砍伐城市的力量。 http://www.Forbes.com。访问2012年2月5日。http://unix.nocdesigns.com/aurora_white_paper.htm。 2012年2月访问。邮票J,Dillinger J,Young W,Depoy J(2003)关键基础设施控制系统中的常见漏洞。 Sandia国家实验室,Albuquerque7.DNP用户组。 http://www.dnp.org。 2011年12月访问,Makhija J,Subramanyan LR(2003),远程监控所用协议的比较:DNP 3.0,IEC 870-5-101和Modbus9.Cleveland F(2005)电力系统信息基础设施的IEC TC57安全标准:不只是简单加密,IEC TC57 WG15安全标准ver510。IT安全咨询小组(2005)SCADA安全:给CEO的建议。堪培拉通信,信息技术与艺术系11. East S,Butts J,Papa M,Shenoi S(2009)DNP3协议攻击分类法,关键基础设施保护III。 IFIP Adv Inf Commun Technol 311:67–81CrossRef12.Ballman J(2003)2003年8月14日的大停电是美国历史上最大的一次停电。 Disaster Recovery J 16(4)13.NCS(2004)技术信息公告04-1,SCADA系统。 NCS,Arlington 14.Fovino IN,Coletta A,Masera M(2010)SCADA部门安全解决方案分类法,版本1.115.Ten CW,Manimaran G,Liu CC(2010)关键基础设施的网络安全:攻击和防御建模。 IEEE Trans Syst Man Cyber​​n 40(4):853–865CrossRef16.Beaver CL,Gallup DR,NeuMann WD,Torgerson MD(2002)SCADA(SKE)的密钥管理。 Sandia实验室,AlbuquerqueCrossRef17。DawsonR,Boyd C,Dawson E,Nieto JMG(2006)SKMA-SCADA系统的密钥管理体系结构。见:网格计算学报,18,Lee S,Choi D,Park C,Kim S(2008)一种用于安全SCADA通信的有效密钥管理方案。在:世界科学,工程和技术研究院学报,vol 3519.elec.qmul.ac.uk/resources/electricitydata/pages/electricitydata.html中。访问2012年2月20日,Patel A,Qassim Q,Wills C(2010)入侵检测和防御系统调查。 Info Manage Comput Secur 18(4):27721.Zhu B,Sastry S(2010)特定于SCADA的入侵检测/防御系统:调查和分类法,安全控制系统(SCS)。斯德哥尔摩泛在系统技术研究团队22。 http://www.digitalbond.com。 2011年11月访问23 Verba J,Milvich M(2008)爱达荷州国家实验室监督控制和数据采集入侵检测系统(SCADA IDS)IEEE国土安全技术会议24. Dayu Y,Alexander U,Hines JW(2006)基于异常的入侵SCADA系统的检测,第五届核电站仪器仪表,控制和人机界面技术国际专题会议25.Fovino IN,Coletta A,Carcano A,Masera M,Trombetta A(2010)基于状态的Modbus / DNP3第24届IEEE高级信息网络和应用国际会议26.Cheung S,Dutertre B,Fong M,Lindqvist U,Skinner K,Valdes A(2007)使用基于模型SCADA网络的入侵检测SCADA安全科学研讨会27. Liu CC,Stefanov A,Hong J,Panciatici P(2012)电网入侵者IEEE电力和能源杂志28。 http://www.vikingproject.eu。访问2012年4月29日.http://www.uclm.edu/area/gsee/Web/Federico/psat.htm。 2012年3月访问,刘Y,宁平,雷特·MK(2009)对电网状态估计的虚假数据注入攻击。在:第15届ACM计算机和通信安全会议论文集,第21–3231页。Bagaaria S,Prabhakar SB,Saquib Z(2011)Flexi-DNP3:SCADA安全性的灵活分布式网络协议版本3(DNP3)。 ReTIS,Kolkatta32.Sekar R,Gupta A,Frullo J,Shanbhag T,Tiwari A,Yang H,Zhou S(2002)基于规范的异常检测:一种用于检测网络入侵的新方法。在:第9届ACM计算机和通信安全性会议上的会议记录33.NCS(2004)DNP3(分布式网络协议版本3.0)和Modbus NCS技术信息公告04-1,SCADA系统34.Shahzad AA,Musa S(2012)安全使用混合加密ICUIMC的SCADA通信。在:第六届国际会议论文集35.Carcano A,Coletta A,Guglielmi M,Masera M,Nai Fovino I,Trombetta A(2011)用于检测SCADA系统入侵的多维临界状态分析。 IEEE Trans Ind通知7(2):179–186CrossRef36.Fovino IN,Coletta A,Carcano A,Masera M(2012)用于保护SCADA网络协议的基于状态的关键过滤系统。 IEEE Trans Ind Electron电子59:1037.Orset JM,Alcade B,Cavalli A(2005)基于EFSM的Ad hoc网络入侵检测系统,用于验证和分析的自动化技术,LNCS 3707,第400–41338页。SmithR,Estan C ,Jha S(2008)XFA:更快的签名匹配和扩展的自动机IEEE安全和隐私研讨会,39.Barry BIA,Chan HA(2007)一种用于融合应用的混合,有状态和跨协议入侵检测系统。在:计算机科学讲义中,第4804卷。第1616–163340页。Garcia Teodoro P,Diaz Verdejo J,Macia Fernandez G,Yazquez E(2009)基于异常的网络入侵检测:技术,系统和挑战。 Comput Secur 28:18–28CrossRef41。ManderT,Cheung R,Nabhani F(2010)使用数据集的电力系统DNP3数据对象安全性。计算机与安全29:487–500CrossRef42。 http://164.100.176.38/patentsearch/search/index.aspx。访问2012年7月43.Queiroz C,Mahmood A,Tari Z(2011)SCADASim一个用于构建SCADA模拟的框架。 IEEE Trans Smart Grid 2(4):589-597交叉引用44。 http://www.ee.washington.edu/research/pstca。 2012年2月访问关于本文标题SCADA安全:对基于DNP3的系统的审查和增强期刊CSI ICT事务,第1卷,第4期,第301-308页封面日期2013-12 DOI 10.1007 / s40012-013-0024-2打印ISSN 2277 -9078在线ISSN 2277-9086出版商Springer印度其他链接注册期刊更新编辑委员会关于本期刊的投稿主题软件工程/编程和操作系统系统与数据安全计算机通信网络输入/输出和数据通信计算机科学,一般性关键字SCADA安全漏洞IDS密钥管理作者Peeyush Jain(1)Paritosh Tripathi(1)作者所属1.开发中心印度孟买Juhu Gulmohar Cross Road 9号Advanced Computing继续阅读...要查看本内容的其余部分,请点击上面的下载PDF链接。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号