P. Ferrari, E. Sisinni, Abusayeed Saifullah, Raphael Machado, Alan Oliveira de Sá, M. Felser
{"title":"正在进行的工作:通过选择性队列饱和攻击危及实时以太网设备的安全性","authors":"P. Ferrari, E. Sisinni, Abusayeed Saifullah, Raphael Machado, Alan Oliveira de Sá, M. Felser","doi":"10.1109/WFCS47810.2020.9114505","DOIUrl":null,"url":null,"abstract":"The industrial control systems (ICS) are using Real-Time Ethernet (RTE) protocols for many years. Today, Ethernet based control systems are widely used in industries. The Time Sensitive Networking (TSN) initiative will definitely push their further diffusion. With the introduction of Industry 4.0, production machines and their components have been connected to the Internet. Currently adopted RTE protocols do not require authentication, and hence may exchange data also with potentially malicious partners. In this paper, a selective Denial of Service (DoS) attack is presented. The proposed Selective Queue Saturation Attack (SQSA) is aimed to jam the message queue of the RTE communication stack in selected devices. The SQSA minimizes the chances of being detected by keeping its requirements (in term generated traffic) as low as possible. The SQSA has been applied to a real scenario based on PROFINET. The results of the use case demonstrate: the feasibility of the proposed attack; the reduced footprint compared to known DoS attacks (more than one thousand times less); and the selectivity of the attack, which can disrupt the realtime behavior of even a single target node inside the RTE network.","PeriodicalId":272431,"journal":{"name":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Work-in-Progress: Compromising Security of Real-time Ethernet Devices by means of Selective Queue Saturation Attack\",\"authors\":\"P. Ferrari, E. Sisinni, Abusayeed Saifullah, Raphael Machado, Alan Oliveira de Sá, M. Felser\",\"doi\":\"10.1109/WFCS47810.2020.9114505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The industrial control systems (ICS) are using Real-Time Ethernet (RTE) protocols for many years. Today, Ethernet based control systems are widely used in industries. The Time Sensitive Networking (TSN) initiative will definitely push their further diffusion. With the introduction of Industry 4.0, production machines and their components have been connected to the Internet. Currently adopted RTE protocols do not require authentication, and hence may exchange data also with potentially malicious partners. In this paper, a selective Denial of Service (DoS) attack is presented. The proposed Selective Queue Saturation Attack (SQSA) is aimed to jam the message queue of the RTE communication stack in selected devices. The SQSA minimizes the chances of being detected by keeping its requirements (in term generated traffic) as low as possible. The SQSA has been applied to a real scenario based on PROFINET. The results of the use case demonstrate: the feasibility of the proposed attack; the reduced footprint compared to known DoS attacks (more than one thousand times less); and the selectivity of the attack, which can disrupt the realtime behavior of even a single target node inside the RTE network.\",\"PeriodicalId\":272431,\"journal\":{\"name\":\"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)\",\"volume\":\"90 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WFCS47810.2020.9114505\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 16th IEEE International Conference on Factory Communication Systems (WFCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WFCS47810.2020.9114505","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Work-in-Progress: Compromising Security of Real-time Ethernet Devices by means of Selective Queue Saturation Attack
The industrial control systems (ICS) are using Real-Time Ethernet (RTE) protocols for many years. Today, Ethernet based control systems are widely used in industries. The Time Sensitive Networking (TSN) initiative will definitely push their further diffusion. With the introduction of Industry 4.0, production machines and their components have been connected to the Internet. Currently adopted RTE protocols do not require authentication, and hence may exchange data also with potentially malicious partners. In this paper, a selective Denial of Service (DoS) attack is presented. The proposed Selective Queue Saturation Attack (SQSA) is aimed to jam the message queue of the RTE communication stack in selected devices. The SQSA minimizes the chances of being detected by keeping its requirements (in term generated traffic) as low as possible. The SQSA has been applied to a real scenario based on PROFINET. The results of the use case demonstrate: the feasibility of the proposed attack; the reduced footprint compared to known DoS attacks (more than one thousand times less); and the selectivity of the attack, which can disrupt the realtime behavior of even a single target node inside the RTE network.