DOI QR코드

DOI QR Code

Analysis on Presidential Security Threat of Cyber Physical System by Cyber Attack Focusing Intelligent Building System

사이버물리시스템에 대한 사이버공격 경호위협 분석 - 지능형건물관리시스템을 중심으로 -

  • Received : 2020.05.31
  • Accepted : 2020.06.22
  • Published : 2020.06.30

Abstract

In this paper, we analyzed the characteristics of cyber attacks and major threat scenarios that could occur around intelligent building management Systems(IBS) by cyber attack security threats against cyber physics systems. Generally determined that lowering the likelihood of aggression against predictable threats would be a more realistic approach to attack response. The countermeasures against this need to be applied to multi-layered defense systems, and three alternatives were proposed: preliminary cyber safety diagnosis for protection targets and the establishment of mobile security control systems.

본 논문에서는 사이버물리시스템에 대한 사이버공격 경호위협 중 지능형건물관리시스템(IBS)을 중심으로 발생할 수 있는 사이버공격의 특성과 주요 위협 시나리오를 분석했다. 분석한 결과 일반적으로 예측이 가능한 위협에 대해 공격의 성공 가능성을 낮추는 것이 현실적인 공격의 대응방법이 되는 것으로 판단하였고, 구체적인 대응방안으로는 다계층 방어시스템의 적용과 보호대상 시스템에 대한 사이버안전진단 사전점검, 이동식 보안관제 시스템과 같은 방안들을 제시하였다.

Keywords

References

  1. Jeffrey Carr, Inside Cyber Warfare : Mapping the Cyber Underworld, O Relly, 2009.
  2. Richard Clarke, Cyber War : The Next Threat to National Security and What to Do About, 2011.
  3. Junesung Choi, "C4ISR Systems IDS Performance Enhancing Method," Convergence security journal, vol.12, no.4, pp.57-69, 2012.
  4. Junesung Choi, "The Analysis of the Malware Trend and the Prediction on the Defense Service and Industry," Convergence security journal, vol.12, no.4, pp.97-108, 2012.
  5. Junesung Choi, "Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection," The Journal of Korea Information and Communications Society. vol.38C, no.8, pp.651-662, 2013. DOI: 10.7840/kics.2013.38C.8.651
  6. Raj Rajkumar, Dionisio de Niz, Mark Klein, "Cyber-Physical Systems," Addison-Wesley Professional, 2017.
  7. Pascal Ackerman, Industrial Cybersecurity : Efficiently secure critical infrastructure systems, Packt Publishing, 2017.
  8. Abdulmalik Humayed, "Cyber physical systems security A survey," IEEE Internet of Things Journal, 2017. DOI: 10.1109/JIOT.2017.2703172
  9. Yosef Ashibani, "Cyber physical systems security : Analysis," challenges and solutions. Computers & Security Journal. 2017. DOI: 10.1109/ACC.2013.6580348
  10. Murat Fiskiran, "Runtime execution monitoring (REM) to detect and prevent malicious code execution," IEEE International Conference on Computer Design 2004 Proceedings, 2004. DOI: 10.1109/ICCD.2004.1347961