another one and were able to show the advantages of
the proposed solution.
Taking care of replay attacks is very crucial since
PNIO devices are a worthwhile target. This is the case
because an attacker does not need any special skills
or knowledge of the process being controlled, making
these attacks easy to perform.
In order to enable data exchange with other sys-
tems in the use case of the so-called “Industry 4.0” or
“Internet of Things”, many companies connect their
industrial networks with their office networks and the
Internet. Improper and unsecure configurations of
these connections are raising risk and danger. And
the danger is proverbial: Industrial processes control
real devices. If e.g. motors, valves, robots do not be-
have as expected, serious physical damage to property
and lives may happen.
This strengthens the need for intrusion detection
systems adapted for the industrial environment. Oth-
erwise, if anything gets damaged by a cyber attack,
like the replay attacks presented in this paper, it will
not be possible to identify the reason of the attack.
This is the case because of the PNIO inherent features
which restore the initial connection and do not persist
any evidence in the network.
5.1 Future Work
Performing replay attacks in automation systems is
only one type of possible means to disturb or destroy
an industrial processes, yet a simple and easy to per-
form one. There are many more attack vectors, like
the tampering of data that is presented in visualiza-
tions, worth being considered and assessed. Evalua-
tion criteria include the amount of knowledge about
the industrial process an attacker needs, how easy the
attacks are to employ and the extend of possible dam-
age. This work will be extended by an overall at-
tack case study of the used demonstrator including the
PLC, the motor, the local HMI as well as an HMI that
accesses data from the PLC and presents it on a web
interface in the cloud.
Many automation systems in Europe are operated
with PNIO. Nevertheless, there are many other au-
tomation protocols which are widespread. We will
setup demonstrators with protocols besides PNIO (for
example with EtherCAT) and will try to transfer our
attack and detection techniques.
An ongoing task is the implementation work in
our distributed open-source IDS. This task deals with
the main problem that common IDS start with the IP
layer. They do not support Ethernet-based protocols
as they are usually used in industrial automation net-
works and are not able to pay attention to the real-time
requirements of such networks. An effort to close this
gap is the development of a preprocessor for the pop-
ular IDS Snort which enables it to deal with PNIO
traffic. Another effort is the work on different corre-
lation techniques that have to be employed in a central
correlation engine that controls the possible flood of
different alerts from both the IT and the automation
process side.
REFERENCES
˚
Akerberg, J. and Bj
¨
orkman, M. (2009a). Exploring network
security in profisafe. In International Conference on
Computer Safety, Reliability, and Security, pages 67–
80. Springer.
˚
Akerberg, J. and Bj
¨
orkman, M. (2009b). Exploring security
in profinet io. In Proceedings of the 2009 33rd Annual
IEEE International Computer Software and Applica-
tions Conference - Volume 01, COMPSAC ’09, pages
406–412, Washington, DC, USA. IEEE Computer So-
ciety.
˚
Akerberg, J. and Bj
¨
orkman, M. (2009c). Introducing se-
curity modules in profinet io. In 2009 IEEE Confer-
ence on Emerging Technologies & Factory Automa-
tion, pages 1–8. IEEE.
Baud, M. and Felser, M. (2006). Profinet io-device emula-
tor based on the man-in-the-middle attack. In ETFA,
pages 437–440.
Biondi, P. (2010). Scapy documentation.
http://www.secdev.org/projects/scapy/doc/. [On-
line; accessed 08-December-2016].
Claise, B. (2015). Specification of the IP Flow Informa-
tion Export (IPFIX) Protocol for the Exchange of IP
Traffic Flow Information. RFC 5101.
Ferrari, P., Flammini, A., and Vitturi, S. (2006). Perfor-
mance analysis of profinet networks. Computer stan-
dards & interfaces, 28(4):369–385.
Fullmer, M. and Romig, S. (2000). The osu flowtools pack-
age and cisco netflow logs. In Proceedings of the 2000
USENIX LISA Conference.
Haag, P. (2005). Watch your flows with nfsen and nfdump.
In 50th RIPE Meeting.
HMS Industrial Networks (2016a). Feldbusse
heute. http://www.feldbusse.de/trends/status-
feldbusse.shtml. [Online; accessed 08-December-
2016].
HMS Industrial Networks (2016b). Varianten-
vielfalt bei Kommunikationssystemen.
http://www.feldbusse.de/Trends/trends.shtml. [On-
line; accessed 08-December-2016].
IEC 61158-6-10 (2007). Industrial communication net-
works - Fieldbus specifications - Part 6-10: Applica-
tion layer protocol specification - Type 10 elements.
Standard, International Electrotechnical Commission,
Geneva, CH.
McHugh, J. (2004). Sets, bags, and rock and roll. In Euro-
pean Symposium on Research in Computer Security,
pages 407–422. Springer.
ForSE 2017 - 1st International Workshop on FORmal methods for Security Engineering
692