Skip to main content

2019 | OriginalPaper | Buchkapitel

No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP

verfasst von : Stefan Mehner, Hartmut König

Erschienen in: Detection of Intrusions and Malware, and Vulnerability Assessment

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Current developments in digitization and industry 4.0 bear new challenges for automation systems. In order to enable interoperability and vertical integration of corporate management systems, these networks have evolved from formerly proprietary solutions to the application of Ethernet-based communication and internet standards. This development is accompanied by an increase in the number of threats. Although the most critical IT protection objective for automation systems is availability, usually no security mechanisms have been integrated into automation protocols. Also Ethernet offers no protection by design for these protocols. One of the most popular real-time protocols for industrial applications is Profinet IO. In this paper, we describe a Denial-of-Service attack on Profinet IO that exploits a vulnerability in the Discovery and Basic Configuration Protocol (DCP) which interrupts the Application Relationship between an IO Controller and an IO Device, and thus prevents the system from being repaired by the operator. The attack combines port stealing with the sending of forged DCP packets and causes a system downtime, which in affected production networks probably lead to a serious financial damage and, in case of critical infrastructures, even represents a high risk for the supply of society. We demonstrate the practical feasibility of the attack using realistic hardware and scenarios and discuss its significance for also other setups.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
International Electrotechnical Commission.
 
Literatur
2.
Zurück zum Zitat IEC 61158-6-10:2014: Industrial communication networks - Fieldbus specifications - Part 6–10: Application layer protocol specification - Type 10 elements (2014) IEC 61158-6-10:2014: Industrial communication networks - Fieldbus specifications - Part 6–10: Application layer protocol specification - Type 10 elements (2014)
3.
Zurück zum Zitat IEC 61784–2:2014: Industrial communication networks - Profiles - Part 2: Additional fieldbus profiles for real-time networks based on ISO/IEC 8802–3 (2014) IEC 61784–2:2014: Industrial communication networks - Profiles - Part 2: Additional fieldbus profiles for real-time networks based on ISO/IEC 8802–3 (2014)
7.
Zurück zum Zitat Biondi, P.: Packet crafting for Python2 and Python3 (2018) Biondi, P.: Packet crafting for Python2 and Python3 (2018)
9.
Zurück zum Zitat Hui, H., McLaughlin, K.: Investigating current plc security issues regarding siemens s7 communications and TIA portal. In: 5th International Symposium for ICS & SCADA Cyber Security Research 2018: Proceedings, pp. 67–73. BCS, August 2018). https://doi.org/10.14236/ewic/ICS2018.8 Hui, H., McLaughlin, K.: Investigating current plc security issues regarding siemens s7 communications and TIA portal. In: 5th International Symposium for ICS & SCADA Cyber Security Research 2018: Proceedings, pp. 67–73. BCS, August 2018). https://​doi.​org/​10.​14236/​ewic/​ICS2018.​8
13.
Zurück zum Zitat Muller, T., Doran, H.D.: Profinet real-time protection layer: performance analysis of cryptographic and protocol processing overhead. In: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), vol. 1, pp. 258–265, September 2018. https://doi.org/10.1109/ETFA.2018.8502670 Muller, T., Doran, H.D.: Profinet real-time protection layer: performance analysis of cryptographic and protocol processing overhead. In: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), vol. 1, pp. 258–265, September 2018. https://​doi.​org/​10.​1109/​ETFA.​2018.​8502670
14.
16.
Zurück zum Zitat Pigan, R., Metter, M.: Automating with PROFINET: Industrial Communication Based on Industrial Ethernet. Wiley, Hoboken (2015) Pigan, R., Metter, M.: Automating with PROFINET: Industrial Communication Based on Industrial Ethernet. Wiley, Hoboken (2015)
17.
Zurück zum Zitat Popp, M.: Industrial Communication with PROFINET. PROFIBUS Nutzerorganisation (2014) Popp, M.: Industrial Communication with PROFINET. PROFIBUS Nutzerorganisation (2014)
18.
Zurück zum Zitat Poresky, C., Andreades, C., Kendrick, J., Peterson, P.: Cyber security in nuclear power plants: insights for advanced nuclear technologies. Department of Nuclear Engineering, University of California, Berkeley, Publication UCBTH-17-004 (2017) Poresky, C., Andreades, C., Kendrick, J., Peterson, P.: Cyber security in nuclear power plants: insights for advanced nuclear technologies. Department of Nuclear Engineering, University of California, Berkeley, Publication UCBTH-17-004 (2017)
Metadaten
Titel
No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP
verfasst von
Stefan Mehner
Hartmut König
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-22038-9_19

Premium Partner