23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22-8 Industrial Communication Systems<br />

22.3.4 DoS Prevention and Detection<br />

Nevertheless, there are security attacks that cannot be prevented using cryptographic methods. Typical<br />

representatives of such attacks are DoS attacks that threaten data availability. DoS attacks can be classified<br />

into host-based and network-based DoS attacks. Host-based DoS attacks try to waste system<br />

resources (e.g., by consuming processor time of a server by sending multiple requests) to prevent the<br />

target from performing its expected function. Network-based DoS attacks, on the other hand, try to<br />

interrupt the <strong>communication</strong> in a network. A common example is an adversary that tries to consume<br />

the network bandwidth (e.g., by flooding the network with unsolicited messages). The situation is further<br />

aggravated if multiple sources attack a single victim (distributed DoS attack).<br />

DoS attacks foremost have massive economic impact. Consider, for example, an assembly line that is<br />

the target of a DoS attack. A shutdown of the line leads to an economic impact that can be easily compared<br />

to the impact of a successful attack on the company Web server. The only difference is that for the<br />

Web server elaborate IT security measures are already common practice.<br />

To counteract DoS attacks, two possibilities exist. DoS prevention, on the one hand, has the aim to<br />

limit the access to system resources in a way that an adversary does not have the opportunity to successfully<br />

perform DoS attacks. One opportunity to fully prevent DoS attacks is to limit the physical access<br />

to the network medium and to the devices that have an interface to the medium. (e.g., immuring the<br />

network cable or by locking the devices into a safe containment.) Obviously, such isolation is not always<br />

easy to achieve.<br />

Another possibility to prevent host-based DoS attacks is the use of so-called client puzzles [TUO]. The<br />

main objective of a client puzzle is to make a DoS attack at least as expensive for the adversary as for the<br />

target in terms of computational cost. Consider, for example, a client (e.g., operator workstation) wants<br />

to establish a connection to a server (e.g., controller). To set up a connection, the client sends an initial<br />

request to the server. If the server is busy (e.g., there are other open connections), the server sends back a<br />

client puzzle that the client has to solve. A typical example of such a client puzzle would be a hash value<br />

of limited length [WEI]. The client has the objective to find the input value that produces this hash value.<br />

To achieve this, the client has to solve this problem by brute force. As it is very easy to verify whether the<br />

solution is valid or not, the client must pay more computing costs than the server. After the client has<br />

solved the puzzle, it sends the solution to the server. The server verifies the solution, and if it is correct<br />

the server accepts further requests. If the solution is not valid, access to the requested service is denied<br />

and further requests are temporally blocked from this client.<br />

In situations where prevention methods are inapplicable, DoS attacks shall at least be detected (DoS<br />

detection). In general, the aim is to make the system intrusion tolerant and limit the affected area. A typical<br />

example would be the use of an IDS [CHR]. An IDS tries to detect abnormal system states by comparing<br />

the actual behavior with the expected one. If a situation that may lead to a security attack has<br />

been detected, countermeasures have to be initiated to minimize the consequences.<br />

An IDS commonly consists of four components (cf. Figure 22.3). The data gathering component is<br />

responsible for collecting the data by observing the network traffic as well as the behavior of the different<br />

network devices. IDS are classified according to the type of data collection (i.e., the location of the data<br />

gathering components). A host-based IDS tries to discover abnormal activities on a single host. These<br />

methods observe the activities on a single device and compare the behavior pattern with a reference pattern<br />

(profiling). Host-based intrusion detection is especially applicable for security-critical devices (e.g.,<br />

key servers). A network-based IDS observes the entire network traffic. Therefore, these <strong>systems</strong> are able<br />

to discover anomalies that affect more than a single host.<br />

The core unit of an IDS is the data processing component. This component processes the collected<br />

data and determines whether abnormal behavior is present. Again, different approaches exist. The two<br />

most important ones are called misuse-based and anomaly-based. Misuse-based <strong>systems</strong> use a priori<br />

knowledge of activities that form an attack. This knowledge is stored in a database that contains typical<br />

patterns of known attacks also called signatures. To determine whether an observation can be classified<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!