Industrial IoT 기반의 제어 시스템을 위한 통합 보안 프레임워크

DC Field Value Language
dc.contributor.advisor손태식-
dc.contributor.author이석철-
dc.date.accessioned2018-11-08T08:27:49Z-
dc.date.available2018-11-08T08:27:49Z-
dc.date.issued2018-08-
dc.identifier.other27771-
dc.identifier.urihttps://dspace.ajou.ac.kr/handle/2018.oak/13990-
dc.description학위논문(박사)--아주대학교 일반대학원 :컴퓨터공학과,2018. 8-
dc.description.tableofcontentsChapter 1 Introduction 1 1.1 Overall Framework 3 1.2 Contribution to the Field 5 1.3 Thesis Outline 6 Chapter 2 Background and Related Works 7 2.1 Security Frameworks 9 2.2 Related Methodologies 16 Chapter 3 Integrated Security Framework 29 3.1 Part1: Vulnerability Inspection 31 3.2 Part2: Security Architecture Modeling 35 3.3 Part3: System Assessment 43 Chapter 4 Experiment and Verification 53 4.1 Target System Modeling 53 4.2 Security Level Enhancement 56 4.3 Model Assessment 65 Chapter 5 Conclusion 84 5.1 Summary 84 5.2 Future Work 85 5.3 Closing Remarks 85-
dc.language.isoeng-
dc.publisherThe Graduate School, Ajou University-
dc.rights아주대학교 논문은 저작권에 의해 보호받습니다.-
dc.titleIndustrial IoT 기반의 제어 시스템을 위한 통합 보안 프레임워크-
dc.title.alternativeIntegrated Security Framework for Industrial IoT-based Control System-
dc.typeThesis-
dc.contributor.affiliation아주대학교 일반대학원-
dc.contributor.department일반대학원 컴퓨터공학과-
dc.date.awarded2018. 8-
dc.description.degreeMaster-
dc.identifier.localId887782-
dc.identifier.uciI804:41038-000000027771-
dc.identifier.urlhttp://dcoll.ajou.ac.kr:9080/dcollection/common/orgView/000000027771-
dc.subject.keywordIndustrial IoT-
dc.subject.keywordControl System-
dc.subject.keywordSecurity-
dc.subject.keywordFramework-
dc.subject.keywordAssessment-
dc.description.alternativeAbstractIn modern society introduced Industrial 4.0, Information and Communication Technology (ICT) such as Supervisory Control and Data Acquisition (SCADA) is applied to industrial control systems (ICS) applied to various fields such as power, factory, and financial is applied. Especially, in the field of power systems, ICT such as Industrial Internet of Things (IoT) is applied for efficient radio measurement. As a result, existing stand-alone systems have increased contact points with external networks. However, in case of most ICS, there is a lack of security guideline and operation guidance for a newly changed environment. Accordingly, various countermeasures have been developed to protect ICT-based ICS from cyber attacks. However, it is difficult to cope with cyber attacks that are evolving, such as potential security threats or Advanced Persistent Threat (APT). In order to effectively and proactively respond to new security threats including APT attacks, it is needed to understand and inspect the current security status of the system. It is necessary to identify the security requirements on the basis of the checked contents and establish an appropriate security response structure accordingly, thereby improving the security of the intelligent and open ICS and ensuring social safety. In this paper, we propose an Integrated Security Framework consisting of three steps to improve the security level of ICS environment using Industrial IoT technology. The first step is the 'vulnerability inspection' stage to check for potential security threats using the OSINT technique preemptively. The second step is the 'security architecture modeling' stage, where security functions are deployed by analyzing the security requirements necessary to mitigate the threats of the ICS environment. The third step is a 'system assessment' stage to evaluate the security vulnerability of the system using the security vulnerability quantification technique based on Game theory. And a case study showing that the security of ICS environment can be improved by verifying the proposed framework for ICS network composed of the analysis of reference models.-
Appears in Collections:
Graduate School of Ajou University > Department of Computer Engineering > 3. Theses(Master)
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse