4.6 Article

Cyber attack taxonomy for digital environment in nuclear power plants

期刊

NUCLEAR ENGINEERING AND TECHNOLOGY
卷 52, 期 5, 页码 995-1001

出版社

KOREAN NUCLEAR SOC
DOI: 10.1016/j.net.2019.11.001

关键词

Cyber-attack taxonomy; Cyber security; Nuclear power plant; ICS; SCADA

资金

  1. Korea Institute of Energy Technology Evaluation and Planning(KETEP)
  2. Ministry of Trade, Industry & Energy(MOTIE) of the Republic of Korea [20171510102100]
  3. Korea Evaluation Institute of Industrial Technology (KEIT) [20171510102100] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG. 5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs. (C) 2019 Korean Nuclear Society, Published by Elsevier Korea LLC.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据