TU Darmstadt / ULB / TUbiblio

A Framework for Network Intrusion Detection on Open Platform Communications Unified Architecture

Bortoli, Tomas (2017)
A Framework for Network Intrusion Detection on Open Platform Communications Unified Architecture.
Technische Universität Darmstadt
Masterarbeit, Erstveröffentlichung

Kurzbeschreibung (Abstract)

Open Platform Communications Unified Architecture (OPC UA) is a Machine to Machine (M2M) communication standard, first released in 2008 as the evolution of OPC, created for Industrial Control Systems (ICS) and Internet of Things (IoT) programming. It was designed to create an abstract model on which any information exchange in form of structured data can be implemented. Industry and state actors use it to control factories and plants thus putting OPC UA dependent software in a critical security position. In December 2015, the German Federal Office for Information Security proved that an official reference implementation of OPC UA contained security flaws in the code that could compromise, if exploited, industrial machineries and other dependent systems [49]. Cyber attacks in ICS may be extremely expensive because of the critical processes which they aim to stop. This thesis proposes a Network Intrusion Detection System (NIDS) based solution to monitor malicious computer attacks on OPC UA. This work develops a plug-in for the dynamic Bro NIDS to support OPC UA based protocols, therefore it creates an Application Programming Interface (API) that can be used to write Turing complete security policies in the Bro language. Furthermore, policy scripts have been implemented to detect the exploitation of flaws and standard inconsistencies found in the analysis [49]. In addition, the parser is also able to detect malformed packets, also sources of attacks in general and those identified in [49]. The result has been tested and evaluated in efficiency, security and standard coverage terms. The aim of this project is to suggest the use of an additional tool that might be used by Computer Emergency Response Teams (CERTs) to investigate any attack and in order to safeguard OPC UA dependent machines.

Typ des Eintrags: Masterarbeit
Erschienen: 2017
Autor(en): Bortoli, Tomas
Art des Eintrags: Erstveröffentlichung
Titel: A Framework for Network Intrusion Detection on Open Platform Communications Unified Architecture
Sprache: Englisch
Referenten: Waidner, Prof. Dr. Michael ; Weber, Dr. Frank ; Larbig, Pedro
Publikationsjahr: 21 September 2017
Ort: Darmstadt
Datum der mündlichen Prüfung: 21 September 2017
URL / URN: https://tuprints.ulb.tu-darmstadt.de/6802
Kurzbeschreibung (Abstract):

Open Platform Communications Unified Architecture (OPC UA) is a Machine to Machine (M2M) communication standard, first released in 2008 as the evolution of OPC, created for Industrial Control Systems (ICS) and Internet of Things (IoT) programming. It was designed to create an abstract model on which any information exchange in form of structured data can be implemented. Industry and state actors use it to control factories and plants thus putting OPC UA dependent software in a critical security position. In December 2015, the German Federal Office for Information Security proved that an official reference implementation of OPC UA contained security flaws in the code that could compromise, if exploited, industrial machineries and other dependent systems [49]. Cyber attacks in ICS may be extremely expensive because of the critical processes which they aim to stop. This thesis proposes a Network Intrusion Detection System (NIDS) based solution to monitor malicious computer attacks on OPC UA. This work develops a plug-in for the dynamic Bro NIDS to support OPC UA based protocols, therefore it creates an Application Programming Interface (API) that can be used to write Turing complete security policies in the Bro language. Furthermore, policy scripts have been implemented to detect the exploitation of flaws and standard inconsistencies found in the analysis [49]. In addition, the parser is also able to detect malformed packets, also sources of attacks in general and those identified in [49]. The result has been tested and evaluated in efficiency, security and standard coverage terms. The aim of this project is to suggest the use of an additional tool that might be used by Computer Emergency Response Teams (CERTs) to investigate any attack and in order to safeguard OPC UA dependent machines.

URN: urn:nbn:de:tuda-tuprints-68029
Fachbereich(e)/-gebiet(e): 18 Fachbereich Elektrotechnik und Informationstechnik
Hinterlegungsdatum: 01 Dez 2019 20:55
Letzte Änderung: 01 Dez 2019 20:55
PPN:
Referenten: Waidner, Prof. Dr. Michael ; Weber, Dr. Frank ; Larbig, Pedro
Datum der mündlichen Prüfung / Verteidigung / mdl. Prüfung: 21 September 2017
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen