23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security in Industrial Communication Systems 22-5<br />

of the application, it is not always necessary to guarantee all of the security objectives mentioned above.<br />

For example, if the nondisclosure of the transmitted data is not a strict requirement, guaranteeing data<br />

integrity, availability, and freshness may be sufficient. In general, only those security mechanisms that<br />

are absolutely necessary to satisfy the security demands of the application shall be implemented (good<br />

enough security). This is especially true for embedded networks that consist of devices with limited<br />

system resources that are just sufficient to fulfill the devices’ tasks. This concerns primarily processing<br />

power (persistent and volatile), memory, power consumption, and network bandwidth. Since security<br />

mechanisms are computationally intensive, the realization of security objectives is a critical design step<br />

and must not exceed the available device resources.<br />

Guaranteeing data confidentiality, integrity, and freshness can be achieved using cryptographic techniques<br />

(cf. Section 22.3.3). However, counteracting interruption attacks like DoS attacks is not possible<br />

using a cryptographically secured data transmission. Therefore, additional security measures are<br />

required to guarantee data availability (cf. Section 22.3.4).<br />

22.3.1 Virtual Private Networks<br />

A VPN is a logical secure network that is built upon a possibly insecure network. A VPN is transparent<br />

to the connected devices. Usually, a device opens a secure unicast connection to a trusted third<br />

party (e.g., centralized VPN server) where the whole network traffic to and from the device is tunneled<br />

through. In <strong>industrial</strong> <strong>systems</strong>, VPNs are most commonly used to connect either two dislocated fieldbus<br />

segments or to connect remote maintenance or control centers. Section 22.5.3 describes the open VPN<br />

solution and IPsec application. Chapter 15 is further dedicated to Virtual Automation Networks.<br />

22.3.2 Firewalls<br />

A firewall is a network entity that protects a trusted network, host, or service against unauthorized<br />

access by inspecting the incoming and outgoing network traffic to decide whether the traffic is allowed<br />

or not [PFL]. The decision about allowing or denying network traffic is made based on the firewall’s<br />

security policy. Such a security policy commonly consists of a default policy and a set of applicationspecific<br />

rules that specify exceptions or amendments to the default policy. Consider, for example, a management<br />

interface to an automation controller. The default policy to that interface may be set to “DENY”<br />

while a specific rule may be added that allows the system operator’s management workstation to access<br />

the interface. A security policy is normally predefined according to the system’s policy. However, it may<br />

also be necessary to dynamically change the rule set of a firewall. For example, if an intrusion detection<br />

system (IDS) (cf. Section 22.3.4) identifies a malicious host within a network, the IDS may add a specific<br />

rule to the rule set of the firewall that explicitly drops all traffic originated from the identified malicious<br />

host (dynamic blacklist).<br />

Depending on the capabilities provided by the firewall, three different types can be distinguished:<br />

A packet filtering firewall is the simplest form of firewall. It uses part of the header information to decide<br />

whether a packet shall be accepted or dropped. For example, to filter IP traffic, the address information<br />

(IP address, UDP/TCP port number) as well as the encapsulated application protocol type (e.g., HTTP,<br />

FTP) may be considered for identifying valid traffic. However, the state of connections (e.g., has the<br />

connection already been closed?) as well as details about the application data (e.g., distinguish between<br />

different HTTP methods) are not considered.<br />

A stateful filtering firewall, on the other hand, additionally maintains the state of a connection. Using<br />

this extra information, the firewall is able to detect illegal connection states and so it is possible to<br />

specify a more advanced rule set. For example, to avoid unsolicited connections with a protected entity,<br />

the firewall only permits client packets after a dedicated connection has been established to the server.<br />

Finally, an application proxy also inspects the application data of network packets. To fully analyze<br />

the effects of incoming and outgoing network packets, an application proxy simulates the behavior of the<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!