Conference Proceeding
Refine
Year of publication
Document Type
- Conference Proceeding (1016) (remove)
Language
- English (1016) (remove)
Has Fulltext
- no (1016) (remove)
Keywords
- Enterprise Architecture (5)
- Energy storage (4)
- Gamification (4)
- Natural language processing (4)
- Power plants (4)
- hydrogen (4)
- solar sail (4)
- Associated liquids (3)
- Concentrated solar power (3)
- Hybrid energy system (3)
- MASCOT (3)
- Out-of-plane load (3)
- earthquakes (3)
- Additive manufacturing (2)
- Adjacent buildings (2)
- Case Study (2)
- Clustering (2)
- Deep learning (2)
- Digital Twin (2)
- Diversity (2)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (224)
- Fachbereich Luft- und Raumfahrttechnik (171)
- Fachbereich Energietechnik (158)
- Fachbereich Medizintechnik und Technomathematik (131)
- IfB - Institut für Bioengineering (109)
- Solar-Institut Jülich (108)
- Fachbereich Maschinenbau und Mechatronik (98)
- Fachbereich Bauingenieurwesen (70)
- ECSM European Center for Sustainable Mobility (50)
- Fachbereich Wirtschaftswissenschaften (42)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (42)
- INB - Institut für Nano- und Biotechnologien (33)
- Fachbereich Chemie und Biotechnologie (23)
- Kommission für Forschung und Entwicklung (16)
- Nowum-Energy (11)
- Fachbereich Architektur (7)
- Fachbereich Gestaltung (3)
- Institut fuer Angewandte Polymerchemie (2)
- ZHQ - Bereich Hochschuldidaktik und Evaluation (2)
- Arbeitsstelle fuer Hochschuldidaktik und Studienberatung (1)
- Digitalisierung in Studium & Lehre (1)
- Freshman Institute (1)
- IaAM - Institut für angewandte Automation und Mechatronik (1)
Biomechanical simulation of different prosthetic meshes for repairing uterine/vaginal vault prolapse
(2017)
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.