23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security in Industrial Communication Systems 22-9<br />

Process model<br />

Data storage<br />

component<br />

Data gathering<br />

Data processing component<br />

Response<br />

component<br />

Knowledge<br />

base<br />

FIGURE 22.3<br />

Intrusion detection system.<br />

as an attack, different techniques such as expert <strong>systems</strong> as well as signature detection mechanisms<br />

can be used. Anomaly-based intrusion detection tries to detect abnormal behavior by comparing the<br />

observed behavior with the normal and expected behavior also called reference pattern. To achieve such<br />

a comparison, a system model must be specified. This model must define the default reference pattern<br />

(i.e., network traffic or device behavior) that represents the expected and normal behavior of the system.<br />

Obviously, this default behavior is not static since it can change during the life time of the system.<br />

Therefore, self-learning techniques (e.g., neural networks) are usually applied.<br />

Collecting the results as well as the observed data (<strong>communication</strong> traces) is the task of the data storage<br />

unit. The response unit, finally, is responsible for initiating actions to minimize the consequences of a<br />

detected security attack. This can be done by performing a direct feedback to the network. For example,<br />

it could decouple the affected network segment(s).<br />

Clearly, DoS prevention is preferable to detection since prevention mechanisms avoid even the occurrence<br />

of an attack. Since a full prevention is not always possible, a combination of the advantages of both<br />

methods by using a hybrid approach is the most appropriate solution.<br />

22.4 Security Measures to Counteract Device Attacks<br />

So far, only the protection of network traffic has been discussed, yet also attacks to the device itself have<br />

to be considered. These attacks can be divided into two categories: physical protection of the device and<br />

security software environments.<br />

22.4.1 Protected Hardware and Security Token<br />

Keys used for authentication and encryption of messages typically are confidential information to be stored<br />

on a fieldbus node. Yet, confidential information is not limited to this and also includes application data<br />

such as application counters, e.g., the power consumption value of a electricity meter, which should not be<br />

altered illegitimately. Countermeasures on a first level restrict access to confidential data as offered by most<br />

cryptographic units in today’s <strong>communication</strong> chips—keys can be written to the key storage but only be<br />

retrieved by the crypto engine, and hence are not visible to the other applications on the node (cf. Section<br />

22.4.2). Yet, some implementations do not honor this fully, and in some fieldbus <strong>systems</strong> the key data can<br />

nevertheless be read by dedicated management commands originally designed to read an arbitrary part of<br />

the nodes’ memory. For application data, such protected memory areas do not exists in general.<br />

If equipment should be tamper resistant and tamper evident, additionally a protected security token<br />

must be added. A trade-off between security and costs is required. A first level measure might already be<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!