References
- ADT캡스, 2021년도 상반기 보안 트렌드, 2021.
- 김경호, "산업제어시스템 보안", 주간기술동향 1981호, 2021.
- 김희현, 유진호, "제어시스템의 웹 취약점에 대한 현황과 연구", 한국전자거래학회지, 제24권, 제2호, 2019, 15-27. https://doi.org/10.7838/JSEBS.2019.24.2.015
- 나중찬, 조현숙. "보안측면에서의 산업제어시스템 비정상 행위 분류", 정보보호학회논문지, 제23권, 제2호, 2013, 329-337. https://doi.org/10.13089/JKIISC.2013.23.2.329
- 박현애, 김성원, 이환수, "중소기업 기술보호 지원제도의 활성화 방안 연구", 중소기업연구, 제42권, 제1호, 2020, 1-17.
- 배병환, "주요국 스마트공장 보안 동향 분석 및 시사점", 주간기술동향 1920호, 2019.
- 이송하, 전효정, 김태성, "한국형 스마트팩토리 확산을 위한 사이버보안 위험관리 방안", 한국통신학회논문지, 제43권, 제10호, 2018, 1741-1750.
- 이희조, "스마트팩토리 취약성 분석", 2021 차세대 인프라 보안 워크숍, 2021.
- 정보통신기술진흥센터, ICT 기술수준조사보고서, 2017.
- 정제용, 김용호, Victoria Wang, "한국의 중소기업에 대한 사이버 보안 위협, 거버넌스 방안 및 시사점", 한국산업보안연구, 제10권, 제1호, 2020, 81-109.
- 중소기업기술정보진흥원, 중소기업 전략기술로드맵 2021-2023, 2020.
- 중소기업연구원, 중소기업 기술보호 지원정책의 현황 및 과제, 2014.
- 중소벤처기업부, 스마트공장 보급 2만개 달성, 2021.
- 한국인터넷진흥원, 스마트공장 사이버보안 가이드, 2019, 80-82.
- 한국정보보호산업협회, 2020년 정보보호 실태조사, 2021.
- Ahakonye, L.A.C., C.I. Nwakanma, J.-M. Lee, and D.-S. Kim, "Efficient Classification of Enciphered SCADA Network Traffic in Smart Factory Using Decision Tree Algorithm", IEEE Access, Vol. 9, 2021, 154892-154901. https://doi.org/10.1109/ACCESS.2021.3127560
- Ani, U.D., H. He, and A. Tiwari, "Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems", 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020, 1-8.
- Chen, Y., X. Lian, D. Yu, S. Lv, S. Hao, and Y. Ma, "Exploring Shodan from the Perspective of Industrial Control Systems", IEEE Access, Vol. 8, 2020, 75359-75369. https://doi.org/10.1109/ACCESS.2020.2988691
- Cisco, Cisco Annual Internet Report (2018-2023) White Paper, 2020.
- Cybersecurity & Infrastructure Security Agency (CISA), Retrieved Nov. 22, 2021, Available at http://www.cisa.gov/uscert/ics.
- Cybint, 15 Alarming Cyber Security Facts and Stats, Retrieved Jun. 22, 2021, Available at http://www.cybintsolutions.com/cyber-security-facts-stats/.
- Fortinet, Securing Industrial Control Systems with Fortinet: IEC-62443 Compliance Endto-End Security, 2019.
- Gartner, Hype Cycle for Manufacturing Operations Strategy, 2020.
- Gensen Web, Retrieved Nov. 18, 2021, Available at http://gensen.dl.itc.u-tokyo.ac.jp/gensenweb_eng.html.
- Green, B., D. Prince, J. Busby, and D. Hutchison. "The Impact of Social Engineering on Industrial Control System Security", In Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy (CPS-SPC '15), Association for Computing Machinery, 2015, 23-29.
- Hasselquist, D., A. Rawat, and A. Gurtov, "Trends and Detection Avoidance of Internet-Connected Industrial Control Systems", IEEE Access, Vol. 7, 2019, 155504-155512. https://doi.org/10.1109/ACCESS.2019.2948793
- Hou, Y., J. Such, and A. Rashid, "Understanding Security Requirements for Industrial Control System Supply Chains", 2019 IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), 2019, 50-53.
- KH Coder, Retrieved Nov. 09, 2021, Available at http://khcoder.net/en/.
- Khan, S. and S.E. Madnick, "Cybersafety: A System-theoretic Approach to Identify Cybervulnerabilities & Mitigation Requirements in Industrial Control Systems", IEEE Transactions on Dependable and Secure Computing, 2021, doi: 10.1109/TDSC.2021.3093214.
- Larkin, R.D., J. Lopez, J.W. Butts, and M.R. Grimaila. "Evaluation of Security Solutions in the SCADA Environment", SIGMIS Database, Vol. 45, , No. 1, 2014, 38-53. https://doi.org/10.1145/2591056.2591060
- Lee, T., S. Kim, and K. Kim, "A Research on the Vulnerabilities of PLC using Search Engine," 2019 International Conference on Information and Communication Technology Convergence (ICTC), 2019, 184-188.
- Lin, H., A. Slagell, Z. Kalbarczyk, P.W. Sauer, and R.K. Iyer, "Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids", In Proceedings of the First ACM Workshop on Smart Energy Grid Security (SEGS '13), Association for Computing Machinery, 2013, 29-34.
- Luo, Z., F. Zuo, Y. Shen, X. Jiao, W. Chang, and Y. Jiang, "ICS Protocol Fuzzing: Coverage Guided Packet Crack and Generation", 2020 57th ACM/IEEE Design Automation Conference (DAC), 2020, 1-6.
- National Vulnerability Database (NVD), Retrieved Oct. 12, 2021, Available at http://nvd.nist.gov/.
- NIST, Guide to Industrial Control Systems (ICS) Security, SP800-82 Rev. 2, 2015.
- Open Web Application Security Project(OWASP), OWASP Top 10, Retrieved Oct. 12, 2021, Available at http://owasp.org/.
- Pospisil, O., P. Blazek, R. Fujdiak, and J. Misurec, "Active Scanning in the Industrial Control Systems", 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC), 2021, 227-232.
- Shahzad, A., S. Musa, A. Aborujilah, and M. Irfan. "Industrial Control Systems(ICSs) Vulnerabilities Analysis and SCADA Security Enhancement Using Testbed Encryption", In Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication (ICUIMC '14), Association for Computing Machinery, Article 7, 2014, 1-6.
- Trend Micro Incorporated, The State of Industrial Cybersecurity: Converging IT and OT with People, Process, and Technology, 2021, 4.