A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shin, Jiho | - |
dc.contributor.author | Choi, Hyunpyo | - |
dc.contributor.author | Seo, Jung Taek | - |
dc.date.accessioned | 2022-04-29T03:41:14Z | - |
dc.date.available | 2022-04-29T03:41:14Z | - |
dc.date.created | 2022-04-29 | - |
dc.date.issued | 2022-03 | - |
dc.identifier.issn | 2666-2817 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/84140 | - |
dc.description.abstract | Major control systems such as ICS/SCADA are currently being used in the key infrastructures of our society, notably in the energy, transportation, and healthcare sectors. The PLC, which is located in the lowest layer of the control system, is directly connected to diverse field devices including sensors and actuators. In the event of a cyber-attack on the PLC, the potential ripple effects, such as a collapse of the national infrastructure, could be very large, making a high level of cyber safety essential. Therefore, it is necessary to apply digital forensic technology to the PLC to respond to cyber-attacks against the control system. However, conventional methods of directly investigating the PLC, such as network and memory forensics, have practical difficulties as they could compromise the availability of the control system. As such, this paper proposes a method of detecting and restoring logic data when the logic data are changed as a result of a cyber-attack, by using the digital forensic technology developed for the Engineering Workstation (EWS), which has been used to develop, manage and set the control system program logic.(c) 2022 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCI LTD | - |
dc.relation.isPartOf | FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION | - |
dc.title | A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000779064300001 | - |
dc.identifier.doi | 10.1016/j.fsidi.2022.301354 | - |
dc.identifier.bibliographicCitation | FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, v.40 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85125832498 | - |
dc.citation.title | FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION | - |
dc.citation.volume | 40 | - |
dc.contributor.affiliatedAuthor | Choi, Hyunpyo | - |
dc.contributor.affiliatedAuthor | Seo, Jung Taek | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Industrial control system | - |
dc.subject.keywordAuthor | Digital forensic | - |
dc.subject.keywordAuthor | Engineering workstation | - |
dc.subject.keywordAuthor | Siemens TIA Portal | - |
dc.subject.keywordAuthor | Project file | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.