Acknowledgement
이 논문은 2021년 정부(방위사업청)의 재원으로 국방기술진흥연구소의 지원을 받아 수행된 연구임(KRIT-CT-21-037)
References
- Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., & Meskin, N, "Cybersecurity for industrial control systems: A survey", computers & security, Vol. 89, 101677. Feb. 2020.
- Ackerman. P, "Industrial Cybersecurity: Efficiently secure critical infrastructure systems", in Packt Publishing, England, 2017, pp. 30-39
- "Duqu: A Stuxnet-like malware found in the wild", CRYSYS, [Online]. Available: https://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf
- "BlackEnergy & Quedagh: The convergence of crimeware and APT attack", F-Secure Labs, [Online]. Available: https://blog.f-secure.com/wpcontent/uploads/2019/10/BlackEnergy_Quedagh.pdf
- "BE2 custom plugins, router abuse, and target profiles", SECURELIST, [Online]. Available: https://securelist.com/be2-custom-plugins-router-abuse-and-target-profiles/67353/
- "BE2 extraordinary plugins, Siemens targeting, dev fails", SECURELIST, [Online]. Available: https://securelist.com/be2-extraordinary-plugins-siemens-targeting-dev-fails/68838/
- "BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry", weliveserucrity, [Online]. Available: https://www.welivesecurity.com/2016/01/03/blackenergysshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry/
- "UK exposes series of Russian cyber attacks against Olympic and Paralympic Games", UK NCSC, [Online]. Available: https://www.gov.uk/government/news/uk-exposes-series-of-russian-cyberattacks-against-olympic-and-paralympic-games
- "Win32/Industroyer: A new threat for industrial controls systems", ESET LLC, [Online]. Available: https://web-assets.esetstatic.com/wls/2017/06/Win32_Industroyer.pdf
- "CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations", DRAGOS, [Online]. Available: https://www.dragos.com/wp-content/uploads/CrashOverride-01.pdf
- "CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection- Focused Attack", DRAGOS, [Online]. Available: https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE.pdf
- "Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign", Varonis, [Online]. Available: https://www.varonis.com/blog/darkside-ransomware
- Ekisa, C., Briain, D. O., & Kavanagh, Y, "An open-source testbed to visualise ics cybersecurity weaknesses and remediation strategies-a research agenda proposal", In 2021 32nd Irish Signals and Systems Conference (ISSC), IEEE, pp. 1-6. Jun. 2021.
- Koay, A. M., Ko, R. K. L., Hettema, H., & Radke, K, "Machine learning in industrial control system (ICS) security: current landscape, opportunities, and challenges", Journal of Intelligent Information Systems, Vol. 60(2), pp. 377-405. Oct. 2023. https://doi.org/10.1007/s10844-022-00753-1
- Alwakeel, A. M, "An overview of fog computing and edge computing security and privacy issues", Sensors, Vol.21(24), 8226, Dec. 2021.
- "SANS Institute Information Security Reading Room Secure Architecture for Industrial Control Systems", Semantic Scholar, [Online]. Available: https://www.semanticscholar.org/paper/SANSInstitute-Information-Security-Reading-Room-Obregon/cf1193740974922c2fd29733ac204f06a3de7b08
- Kim. D. H., Choi. S. H, "A Study on the Active Defense Strategy of Honey System Using MTD", Korea Institute of Information Technology Magazine, Vol. 20(1), 27-32, Dec. 2022 https://doi.org/10.14801/jkiit.2022.20.3.27
- Ahn. M. K., Lee. J. R, "Research on System Architecture and Methodology based on MITRE ATT&CK for Experiment Analysis on Cyber Warfare Simulation", Journal of the Korea Society of Computer and Information, Vol. 25(8), pp. 31-37, Aug. 2020 https://doi.org/10.9708/JKSCI.2020.25.08.031
- Liao, Y. C, "Generating Targeted Attack Scenarios against Availability for Critical Infrastructures", In 2021 14th CMI International Conference-Critical ICT Infrastructures and Platforms (CMI), IEEE, pp. 1-7, Nov. 2021.
- Hacks, S., Katsikeas, S., Ling, E., Lagerstrom, R., & Ekstedt, M, "powerLang: a probabilistic attack simulation language for the power domain", Energy Informatics, Vol. 3, pp. 1-17, Nov. 2020 https://doi.org/10.1186/s42162-020-0103-1
- "ICS Matrix", MITRE ATT&CK, [Online]. Available: https://attack.mitre.org/matrices/ics/
- Georgiadou, A., Mouzakitis, S., & Askounis, D, "Assessing mitre att&ck risk using a cybersecurity culture framework", Sensors, Vol. 21(9), 3267, May. 2021.
- "W32.Stuxnet Dossier (Version 1.4)", Symantec, [Online]. Available: https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en
- "ICS Advisory (ICSA-10-272-01)", CISA, [Online]. Available: https://www.cisa.gov/newsevents/ics-advisories/icsa-10-272-01
- "Stuxnet Under the Microscope", ESET LLC, [Online]. Available: http://www.rpac.in/image/ITR%201.pdf
- "To Kill a Centrifuge", The Langner Group, [Online]. Available: https://www.langner.com/wpcontent/uploads/2017/03/to-kill-a-centrifuge.pdf
- "Global Energy Cyberattacks: "Night Dragon"", McAfee, [Online]. Available: https://www.mcafee.com/blogs/wp-content/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdf
- "Attackers deploy new ICS attack framework "TRITON" and cause operational disruption to critical infrastructure", Mandiant, [Online]. Available: https://www.mandiant.com/resources/blog/attackers-deploy-new-ics-attack-framework-triton
- "First-of-a-kind U.S. grid cyberattack hit wind, solar", Energywire, [Online]. Available: https://subscriber.politicopro.com/article/eenews/1061421301
- "DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers", Kaspersky, [Online]. Available: https://usa.kaspersky.com/about/press-releases/2019_dtrackpreviously-unknown-spy-tool-hits-financial-institutions-and-research-centers
- "Hello! My name is Dtrack", SECURELIST, [Online]. Available: https://securelist.com/myname-is-dtrack/93338/
- "Industroyer2: Industroyer reloaded", weliveserucrity, [Online]. Available: https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded
- "Vulnerabilities", NIST, [Online]. Available: https://nvd.nist.gov/vuln
- Korodi, A., Nicolae, A., & Draghici, I. A, "Proactive decentralized historian-improving legacy system in the water industry 4.0 context", Sustainability, Vol. 15(15), 11487, Jul. 2023.
- Michalec, O., Milyaeva, S., & Rashid, A, "When the future meets the past: Can safety and Cybersecurity coexist in modern critical infrastructures?", Big Data & Society, Vol. 9(1), Jun. 2022.
- "HMI Works C Programming pt3", ICP DAS USA, [Online]. Available: https://www.icpdasusa.com/HMI-works-CProgramming-pt3.html
- "SIMATIC M7 Only Available on a Spare Part Basis as of October 2003", Siemens, [Online]. Available: https://support.industry.siemens.com/cs/document/14044569/simatic-m7-onlyavailable-on-a-spare-part-basis-as-of-october-2003-?dti=0&lc=en-WW
- "Touch HMI Devices", ICP DAS, [Online]. Available: https://www.bbrc.ru/upload/iblock/cf1/i8z9k9u6vd9enme563mqkw7jxwc177hx/603adb8b_0fed_11e8_80d8_0cc47a1243ef_58fbaa64_2692_11e8_80d8_0cc47a1243ef.pdf
- "Software Security Weakness Diagnostic Guide", KISA, [Online]. Available: https://www.kisa.or.kr/2060204/form?postSeq=9&page=1
- "Secure Coding Guide C", MOIS, [Online]. Available: https://www.mois.go.kr/
- "SEI CERT C Coding Standard", Carnegie Mellon University SEI, [Online]. Available: https://resources.sei.cmu.edu/downloads/secure-coding/assets/sei-cert-c-coding-standard-2016-v01.pdf