“Model-Based Stealth Attack to Networked Control System Based on Real-Time Ethernet”

From Navigators

Jump to: navigation, search

Paolo Ferrari, Emiliano Sisinni, Paolo Bellagente, Stefano Rinaldi, Marco Pasetti, Alan Oliveira de Sá, Raphael C. S. Machado, And Luiz F. R. da C. Carmo, António Casimiro

IEEE Transactions on Industrial Electronics, vol. Early Access, pp. 1–1, Jun. 2020.

DOI: 10.1109/TIE.2020.3001850.
Abstract: Industrial control systems (ICS) include networked control systems (NCS), which use Real-Time Ethernet (RTE) protocols since many years, well before the Time Sensitive Networking (TSN) initiative debut. Today, Ethernet based control systems are used all across Industry 4.0, including in critical applications, allowing for straight integration with IT layers. Even if it is known that current RTE protocols do not have strong authentication or ciphering options, it is still very challenging to perform undetected cyber-attacks to these protocols while the NSC is in operation, in particular because such attacks must comply with very strict and small temporal constraints. In this paper, a model based attack is proposed for service degradation of NCS. The attack is carried out in real-time and it can remain undetected for the entire plant life. The attack can be applied to any RTE protocols and, without loss of generality, a detailed analysis of stealth techniques is provided for a specific real use case based on PROFINET. The experimental results demonstrate the feasibility of the proposed attack and its high effectiveness. The paper also points out some possible future investigation directions in order to mitigate the attack.

Download paper

[DOI: 10.1109/TIE.2020.3001850 Download Model-Based Stealth Attack to Networked Control System Based on Real-Time Ethernet]

Export citation

BibTeX

Project(s):

Research line(s): Fault and Intrusion Tolerance in Open Distributed Systems (FIT), Timeliness and Adaptation in Dependable Systems (TADS)

Personal tools
Navigators toolbox