Refine
Year of publication
- 2017 (254) (remove)
Document Type
- Article (108)
- Conference Proceeding (85)
- Part of a Book (33)
- Book (13)
- Other (11)
- Report (2)
- Doctoral Thesis (1)
- Patent (1)
Has Fulltext
- no (254) (remove)
Keywords
- Autonomous mobile robots (2)
- Gamification (2)
- Industry 4.0 (2)
- MASCOT (2)
- Multi-robot systems (2)
- Smart factory (2)
- 3D nonlinear finite element model (1)
- Acceptance tests (1)
- Ausfachungsmauerwerk (1)
- Automated Optimization (1)
- Bein (1)
- Bewertungsframework (1)
- Biomolecular logic gate (1)
- CNOT (1)
- Capacitive field-effect (1)
- Chemical images (1)
- Chemical sensor (1)
- Chimeric liver-humanized mice (1)
- Competence Developing Gam (1)
- Competence Developing Games (1)
Institute
- Fachbereich Medizintechnik und Technomathematik (66)
- Fachbereich Elektrotechnik und Informationstechnik (37)
- IfB - Institut für Bioengineering (34)
- Fachbereich Luft- und Raumfahrttechnik (32)
- Fachbereich Wirtschaftswissenschaften (32)
- Fachbereich Energietechnik (27)
- INB - Institut für Nano- und Biotechnologien (27)
- Fachbereich Maschinenbau und Mechatronik (23)
- Fachbereich Bauingenieurwesen (14)
- Fachbereich Chemie und Biotechnologie (12)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (12)
- Fachbereich Architektur (10)
- Solar-Institut Jülich (6)
- ZHQ - Bereich Hochschuldidaktik und Evaluation (6)
- ECSM European Center for Sustainable Mobility (5)
- Institut fuer Angewandte Polymerchemie (4)
- Fachbereich Gestaltung (2)
- IBB - Institut für Baustoffe und Baukonstruktionen (1)
- Kommission für Forschung und Entwicklung (1)
- Nowum-Energy (1)
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.