跳到主要內容

臺灣博碩士論文加值系統

(18.206.76.226) 您好!臺灣時間:2021/07/30 23:22
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:徐翊城
研究生(外文):Hsu, Yi-Cheng
論文名稱:SCADA系統安全調查
論文名稱(外文):SCADA System Security Survey
指導教授:鄭伯炤
指導教授(外文):Cheng, Bo-Chao
口試委員:孫宏民唐文祥陳煥鄭伯炤
口試委員(外文):Sun, Hung-MinTang, Wen-ShiangChen, HuanCheng, Bo-Chao
口試日期:2012-07-27
學位類別:碩士
校院名稱:國立中正大學
系所名稱:通訊資訊數位學習碩士在職專班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:124
中文關鍵詞:SCADA系統安全關鍵基礎建設保護縱深防禦網路恐怖主義
外文關鍵詞:SCADA System SecurityCritical Infrastructure ProtectionDefense-in-DeepCyber Terrorism
相關次數:
  • 被引用被引用:3
  • 點閱點閱:1108
  • 評分評分:
  • 下載下載:57
  • 收藏至我的研究室書目清單書目收藏:0
以監督控制與數據採集(SCADA)系統為核心的各項關鍵基礎建設,由於漏洞層出不窮,加上政治目的以及管理的問題而成為網路犯罪者攻擊目標。本研究中,我們對這些SCADA系統的安全議題(包括漏洞與事件回應管理循環)展開一系列調查,並且詳加審視,於整合觀點上提供一致的SCADA安全性,讓管理者或專家們能全面理解這些SCADA系統安全的防護建議,期望透過本研究初探,將這些安全威脅消弭。
The supervisory control and data acquisition (SCADA) system is the core of the critical infrastructures, which becomes the target of cyber criminals due to the endless stream of vulnerability, political purpose and problems of management. In this study, we survey a series of the SCADA systems security issues (including vulnerability and incident response management cycle) and give a closer look at how to provide consistent SCADA security from the integration viewpoint. The security managers or specialists are able to have a comprehensive knowledge about SCADA system security protection recommendations and expect to eliminate security threats via this preliminary study.
致謝詞 I
中文摘要 III
Abstract IV
目錄 V
圖目錄 VIII
表目錄 XI
第一章 緒論 1
1.1 研究背景 1
1.2 研究動機 1
1.3 研究目的 2
1.4 研究工具、方法與論文導讀 3
第二章 SCADA系統簡介 9
2.1 SCADA系統與關鍵基礎建設 9
2.2 SCADA系統通訊協議 14
第三章 SCADA系統中的漏洞與攻擊 22
3.1 SCADA萬能的神話 22
3.2 SCADA風險因素 26
3.3 SCADA的威脅與攻擊途徑 30
3.4 攻擊樹對MODBUS通訊協議的評估與分析 34
第四章 SCADA系統安全方法與技術 47
4.1 SCADA系統的防衛機制 47
4.1.1 提升SCADA網路的安全性 47
4.1.2 實施安全改善 56
4.1.3 漏洞掃描與分析 65
4.1.4 安全認知 71
4.1.5 SCADA稽核日誌 73
4.2 SCADA系統管理實施議題與指導方針 77
4.2.1 SCADA文化與系統安全的管理成效 77
4.2.2 SCADA安全投資管理的指導方針 79
4.3 風險管理 89
第五章 SCADA安全標準與相關文件 93
5.1 NIST 93
5.2 NERC 95
5.3 其他 96
第六章 SCADA未來安全趨勢 103
結論 116
參考文獻 117
作者簡介 124
[1]行政院科技顧問,2010資通安全政策白皮書,中華民國99年11月。
[2]Keith Stouffer, Joe Falco, Karen Kent, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, June 2011.
[3]Identifying, Understanding and Analyzing Critical Infrastructure Interdependecies, IEEE Control Systems Magazine, December 2001.
[4]關鍵資訊基礎建設保護政策指引,行政院科技顧問組,中華民國100年12月。
[5]Ronald L. Krutz, Securing SCADA Systems, Wiley Publishing, Inc., 2006.
[6]维基百科 http://www.wikipedia.org/
[7]Electric Power Research Institute (EPRI), http://my.epri.com/
[8]US Army Training and Doctrine Command, DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, August 2006.
[9]Scott Berinato, Debunking the Threat to Water Utilities, March 2002, CIO magazine, http://www.cio.com/article/30935/Debunking_the_Threat_to_Water_Utilities
[10]Scott Berinato, CYBERSECURITY - The Truth About Cyberterrorism, March 2002, CIO magazine,
http://www.cio.com/article/30933/CYBERSECURITY_The_Truth_About_Cyberterrorism
[11]Arden Bement, Critical Infrastructure Protection for SCADA & IT, October 2003, NSF Workshop, http://www.nist.gov/public_affairs/techbeat/tb2003_1023.htm, http://www.nist.gov/director/speeches/bement_102003.cfm
[12]Barton Gellman, U.S. Fears Al Qaeda Cyber Attacks, Washington Post 2002-06-26, http://www.securityfocus.com/news/502
[13]Drew Cullen, Teen hacker is not guilty, The Register 2003-10-17,
http://www.securityfocus.com/news/7240
[14]Kevin Poulsen, Slammer worm crashed Ohio nuke plant network, SecurityFocus 2003-08-19, http://www.securityfocus.com/news/6767
[15]Marty Niland, Associated Press Writer, Computer Virus Brings Down Train Signals, August 20, 2003 06:00 PM,
http://www.informationweek.com/news/13100807
[16]Tom Jowitt, Chinese Weapon Systems Vulnerable To SCADA Hack, June 20, 2011, http://www.techweekeurope.co.uk/news/chinese-weapon-systems-vulnerable-to-scada-hack-32020
[17]顧寶裕,ISAC安全資訊分享與分析中心應用與發展,中華民國99年12 月。
[18]楊中皇與樊國楨,整合生命財產安全與資訊安全風險評鑑平台之探討-根基於CORAS,中華民國97年3月。
[19]Eric Byres, David Leversage and Nate Kube, Security incidents and trends in SCADA and process industries, THE INDUSTRIAL ETHERNETBOOK, May 2007.
[20]Eric J. Byres, The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems, Group for Advanced Information Technology, British Columbia Institute of Technology, November 2004.
[21]U.S., Department Of Energy, 21 Steps to Improve Cyber Security of SCADA Networks, September 2002.
[22]Chris Kulseth, 22 Steps to Improve Cyber Security of SCADA Networks, the Midwest Reliability Organization, June 2011.
[23]U.S. DOE NSTB and NERC CSSWG, Top 10 Vulnerabilities of Control Systems and Their Associated Mitigations – 2006, March 2006.
[24]ECSS駭客攻防技術,學承電腦有限公司,中華民國99年1月。
[25]Free IP Scanner 免費的 IP 區段及端口掃描工具,找出電腦名稱(免安裝),發表日期:2011-07-22,http://key.chtouch.com/ContentView.aspx?P=991
[26]Author:admin, Project"NINJA", 06.06.2011, infracritical,
http://www.infracritical.com/?p=4909
[27]Posted by Ron Gula, Nessus 3 SCADA Plugins, December 2006, TENABLE Network Security,
http://blog.tenablesecurity.com/2006/12/nessus_3_scada_.html
[28]BackTrack Linux, BackTrack 5 R2 Released, http://www.backtrack-linux.org/
[29]刑事局通訊監察中心,蔡宜縉,數位鑑識工具之介紹與比較(以Encase, FTK鑑識網拍木馬程式詐騙案為例),刑事雙月刊38期,中華民國99年12月。
[30]Honeynet Project 台灣支會簡介,
http://www.honeynet.org.tw/index.php?option=com_content&view=article&id=46:about-taiwan-honeynet-project&catid=34:tw-honeynet-&Itemid=54
[31]樊國楨,資訊安全法制化初探之一:根基於美國聯邦資訊安全管理法,國立交通大學資訊管理研究所,中華民國100年10月。
[32]Homeland Security, Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies, October 2009.
[33]NIST Interagency Report 7756, CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Model, January 2012.
[34]NIST Special Publication 800-18 Revision 1, Guide for Developing Security Plans for Federal Information Systems, February 2006.
[35]NIST Special Publication 800-34 Rev. 1, Contingency Planning Guide for Federal Information Systems, May 2010.
[36]NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems, February 2010.
[37]NIST Special Publication 800-53 Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, August 2009.
[38]NIST Special Publication 800-53A Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations, June 2010.
[39]NIST Special Publication 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations, SEPTEMBER 2011.
[40]National Institute of Standards & Technology, System Protection Profile - Industrial Control Systems Version 1.0, October 2004.
[41]Special Publication 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, September 1996.
[42]NERC Standards CIP-002-5, Cyber Security - Critical Cyber Asset Identification, November 2011.
[43]NERC Standards CIP-003-5, Cyber Security - Security Management Controls, November 2011.
[44]NERC Standards CIP-004-5, Cyber Security - Personnel and Training, November 2011.
[45]NERC Standards CIP-005-5, Cyber Security - Electronic Security Perimeter(s), November 2011.
[46]NERC Standards CIP-006-5, Cyber Security - Physical Security of BES Cyber Systems, November 2011.
[47]NERC Standards CIP-007-5, Cyber Security - Systems Security Management, November 2011.
[48]NERC Standards CIP-008-5, Cyber Security - Incident Reporting and Response Planning, November 2011.
[49]NERC Standards CIP-009-5, Cyber Security - Recovery Plans for BES Cyber Assets and Systems, November 2011.
[50]NERC Standards CIP-010-1, Cyber Security - Configuration Management and Vulnerability Assessments, November 2011.
[51]NERC Standards CIP-011-1, Cyber Security - Information Protection, November 2011.
[52]United States Government Accountability Office,
CRITICAL INFRASTRUCTURE PROTECTION - Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use, December 2011.
[53]U.S. DEPARTMENT OF COMMERCE & TECHNOLOGY ADMINISTRATION & NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems, February 2004.
[54]U.S. DEPARTMENT OF COMMERCE & TECHNOLOGY ADMINISTRATION & NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, FIPS PUB 200, Minimum Security Requirements for Federal Information and Information Systems, March 2006.
[55]ANSI/ISA-TR99.00.01-2007, Security Technologies for Industrial Automation and Control Systems, October 2007.
[56]ANSI/ISA-TR99.00.02-2004, Integrating Electronic Security into the
Manufacturing and Control Systems Environment, April 2004.
[57]API STANDARD 1164, SECOND EDITION, Pipeline SCADA Security, June 2009.
[58]AGA Report No.12, Draft 3, Cryptographic Protection of SCADA
Communications:General Recommendations, August 2004.
[59]AGA Report No.12, Part 1, Cryptographic Protection of SCADA
Communications:Background, Policies and Test Plan, March 2006.
[60]F5 Friday: Goodbye Defense in Depth. Hello Defense in Breadth., January 27, 2012, https://devcentral.f5.com/weblogs/macvittie/archive/2012/01/27/f5-friday-goodbye-Defense-in-Depth.-hello-Defense-in-Breadth.aspx
[61]Paul Ferguson, Toward a More Secure Posture for Industrial Control System Networks, Trend Micro Research Paper 2012, January 2012.
[62]Cloud City, http://maat-g.knowleer.org/maat-g/cloud-city
[63]Smart Networks for Consumption Optimization,
http://smart.kactoo.com/smart-networks.htm
[64]Dr. Tony Lange, Optin, Automation & Control Technical, Intelligent SCADA systems, April 2007.
[65]E. Mares, J.H. Sokolowski, Artificial intelligence-based control system for the analysis of metal casting properties, June 2010.
[66]美承認網路攻擊伊朗,網路武器成未來武器,中廣新聞網,2012年6月4日,
http://tw.news.yahoo.com/%E7%BE%8E%E6%89%BF%E8%AA%8D%E7%B6%B2%E8%B7%AF%E6%94%BB%E6%93%8A%E4%BC%8A%E6%9C%97-%E7%B6%B2%E8%B7%AF%E6%AD%A6%E5%99%A8%E6%88%90%E6%9C%AA%E4%BE%86%E6%AD%A6%E5%99%A8-215035987.html
[67]Duqu病毒利用Windows核心臭蟲作為感染途徑,文\陳曉莉(編譯),2011年11月2日,http://www.ithome.com.tw/itadm/article.php?c=70594
[68]Duqu蠕蟲的針對性攻擊目標位於伊朗和蘇丹,2011年10月26日,
http://www.kaspersky.com.tw/news/2011_10/news_20111026-2.html
[69]Stuxnet二代Duqu 2012將帶來更大威脅,Information Security 資安人科技網,2011年12月19日,
http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=6525
[70]新病毒 Duqu 利用 Windows 系統漏洞發動零時差攻擊,2011年11月9日,
http://www.nownews.com/2011/11/09/339-2755961.htm
[71]新型"網路重武器"入侵中東多國,南方日報,2012年05月30日,
http://big5.ce.cn/gate/big5/intl.ce.cn/qqss/201205/30/t20120530_23366210.shtml
[72]UPDATE 1-Nations must talk to halt "cyber terrorism"-Kaspersky, Jun 6, 2012,
http://www.reuters.com/article/2012/06/06/net-us-cyberwar-flame-kaspersky-idUSBRE8550HM20120606
[73]Committee on National Security Systems, CNSS Instruction No. 4009, April 2010.
[74]NIST ICS Security Workshop, Defending the United States in the Digital Age, September 2010.
[75]力控科技,http://www.sunwayland.com.cn
[76]Ishikawa diagram,
http://zh.wikipedia.org/wiki/%E7%9F%B3%E5%B7%9D%E5%9B%BE
[77]The Limits of Reductionism: Misreading the Mind,
http://www.blog.davemsw.com/archives/2008/03/the_limits_of_reductionism.php
[78]PDCA環與回饋控制系統,
http://cdnet.stpi.org.tw/techroom/analysis/pat_A027.htm
[79]PDCA-SDCA,
http://pilotage.industriel.free.fr/qhse/pdca_sdca.htm
[80]Open Smart Grid Protocol (OSGP), ETSI GS OSG 001, ETSI, January 2012.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top