최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.2, 2021년, pp.245 - 262
유정훈 (수원대학교) , 배춘석 (수원대학교) , 고승철 (수원대학교)
Although smart manufacturing innovation announced by the Ministry of SMEs and Startups is set as the government's core national task and is pushing to distribute 30,000 smart factories by 2022, security issues of Modbus protocol still remain. Accordingly, the current status of exposure to Modbus at ...
wikipedia, "modbus" https://en.wikipedia.org/wiki/Modbus,Dec. 2020.
Ministry of SMEs and Startups, https://www.mss.go.kr/site/smba/ex/bbs/View.do?cbIdx86&bcIdx1009410&parentSeq1009410, Dec. 2018.
I. N. Fovino, A. Carcano, M. Masera and A. Trombetta, "Design and implementation of a secure modbus protocol," Critical Infrastructure Protection III, Springer Berlin Heidelberg, vol. 311, pp. 83-96, 2009.
Shodan ICS Radar, https://ics-radar.shodan.io, Feb., 2020
National Vulnerability Database, "modbus" https://nvd.nist.gov/vuln/search, Feb. 2020.
Mitre CVE, "modbus" http;//https://cve.mitre.org/data/downloads/index.html, Feb. 2020.
IBMX-force Exchange, "modbus" https://exchange.xforce.ibmcloud.com, Feb., 2020.
Purdue Enterprise Reference Architecture, https://en.wikipedia.org/wiki/Purdue_Enterprise_Reference_Architecture, Feb. 2020.
P. Huitsing, R. Chandia, M. Papa, and S. Shenoi, "Attack taxonomies for the Modbus protocols," International Journal of Critical Infrastructure Protection, vol. 1, pp. 37-44, Dec. 2008.
Jae-gu Song, Sungmo Jung, Seoksoo Kim, Taihoon Kim, Dong-Ju Kang, Seok Ju Kim, "Design of Hacking Test System for Modbus based SCADA", Korean institute of information Technology, vol. 7, no. 5, pp. 183~190, Oct. 2009.
Yoo, Hyunguk, Yun, Jeong-Han, Shon, Taeshik, "Whitelist-Based Anomaly Detection for Industrial Control System Security", The Journal of Korea Information and Communications Society, vol. 38B(8), pp. 641-653, Aug. 2013.
Hyun-Seok Kim.Dong-Gue Park "Implementation of abnormal behavior detection system based packet analysis for industrial control system security", Journal of the Korea Academia-Industrial, vol.19(4). pp. 47-56, Apr. 2018.
Modbus Organization, "MODBUS Application Protocol Specification V1.1b3", pp.2, Apr. 2012.
Dailysecu, "Deadly loopholes in the SCADA system revealed... Easily hacked" https://www.dailysecu.com/news/articleView.html?idxno992, Nov. 2011.
Boannews, "The control facility network is no longer a "safe zone" https://www.boannews.com/media/view.asp?idx45439, Mar. 2015.
Boannews, "[OT Security Report-3] Concentrated Dissection of Cyber Security Solutions in Smart Factory" https://www.boannews.com/media/view.asp?idx93087&kind3, Dec. 2020.
ITWORLD, "ICS weaknesses revealed by protocol gateway flaws... Trend Micro Presentation at Black Hat Conference" https://www.itworld.co.kr/t/63417/%EC%82%AC%EB%AC%BC%EC%9D%B8%ED%84%B0%EB%84%B7/160645, Aug. 2020.
ISA, "Quick Start Guide: An Overview of the ISA/IEC 62443 Standards", https://gca.isa.org/blog/download-the-new-guide-to-the-isa/iec-62443-cybersecurity-standards, Jun. 2020.
ISO/IEC 27002, "Information Technology-Security Techniques-Code of practice for information security controls", Second edition, Oct, 2013.
Smart Manufacturing Standardization Forum, "Smart Factory Minimum Security Guide",http://smartforum.or.kr/policy/policy_read.html?seq46&page1, Sep, 2016.
KISA, "Smart Factory Cyber Security Guide", Dec, 2019
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.