论文标题
在拒绝服务攻击下进行实时操作的工业设备架构分析
Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks
论文作者
论文摘要
越来越多的工业设备连接到基于IP的网络,因为这对于行业4.0的成功至关重要。但是,这种互连还导致各种基于网络的攻击的攻击表面增加。最简单的攻击之一是DOS攻击,其中由于网络流量较高和相应的CPU负载,攻击目标被超载。因此,受攻击的设备无法再提供常规服务。这对于在工业流程中执行实时操作的设备尤其重要。为了防止DOS攻击,有可能在周围限制网络流量,例如通过防火墙开发可靠的设备体系结构。在本文中,我们分析了针对安全设备架构的各种概念,并将它们与DOS攻击的鲁棒性进行了比较。在这里,特别注意工业控制器在攻击过程中的表现方式。为此,我们比较了基于单核和双核Linux系统的不同调度程序,以及在各种网络负载和其他系统压力下的异质多核体系结构。
More and more industrial devices are connected to IP-based networks, as this is essential for the success of Industry 4.0. However, this interconnection also results in an increased attack surface for various network-based attacks. One of the easiest attacks to carry out are DoS attacks, in which the attacked target is overloaded due to high network traffic and corresponding CPU load. Therefore, the attacked device can no longer provide its regular services. This is especially critical for devices, which perform real-time operations in industrial processes. To protect against DoS attacks, there is the possibility of throttling network traffic at the perimeter, e.g. by a firewall, to develop robust device architectures. In this paper, we analyze various concepts for secure device architectures and compare them with regard to their robustness against DoS attacks. Here, special attention is paid to how the control process of an industrial controller behaves during the attack. For this purpose, we compare different schedulers on single-core and dual-core Linux-based systems, as well as a heterogeneous multi-core architecture under various network loads and additional system stress.