Proceedings of the Third Central European Cybersecurity Conference 2019
DOI: 10.1145/3360664.3360675
|View full text |Cite
|
Sign up to set email alerts
|

Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks

Abstract: The usage of machine to machine communication and Industrial Internet of Things is increasing nowadays, in particular in industry environments. Devices with low hardware capabilities may e.g. be used for sensing data, for example, on an industrial network. Specific protocols and frameworks were being developed for these use cases. One such framework is OPC UA, which allows signed and encrypted communication and therefore addresses already important security requirements. However, an attacker may also be able t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…A study was conducted on an attack simulation for insecure OPC UA security configuration [11]. In addition, Varadarajan [12] focused on three major cyberattacks occurring in the industrial IoT [11]: packet sniffing, MiTM, and DoS. An attack scenario was constructed, and a penetration test was performed through a simulation [12].…”
Section: Opc Ua Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…A study was conducted on an attack simulation for insecure OPC UA security configuration [11]. In addition, Varadarajan [12] focused on three major cyberattacks occurring in the industrial IoT [11]: packet sniffing, MiTM, and DoS. An attack scenario was constructed, and a penetration test was performed through a simulation [12].…”
Section: Opc Ua Security Analysismentioning
confidence: 99%
“…Moreover, studies have demonstrated denial-of-service (DoS) attacks, packet sniffing, and man-in-the-middle (MiTM) attacks through attack simulations on OPC UA networks [8][9][10][11][12][13][14]. However, they focused on the impact assessment of industrial Internet of Things (IoT) systems and verified possible attack types for known security threats specified in the OPC UA system specifications.…”
Section: Introduction 1background and Motivationmentioning
confidence: 99%
“…Neu et al [43] and Polge et al [55] showed the feasibility of DoS attacks by a Rogue Client. They suggest network traffic anomaly detection as a countermeasure.…”
Section: Related Work 71 Security Of Open Source Opc Ua Librariesmentioning
confidence: 99%
“…Kim et al [5] indicates that there is an optimum point for the highest transferable data rate with respect to the query interval. Unix, Linux and Windows seem to be equivalently open to the Denial-of-Service attacks (DoS) which have been studied by Neu et al [6] for OPC UA.…”
Section: Validity Of Exponential Distribution For Modelling Inter-failure Arrival Times Of Windows Based Industrial Process Control Data mentioning
confidence: 99%