Conference Proceeding
Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (286) (remove)
Has Fulltext
- no (286) (remove)
Document Type
- Conference Proceeding (286) (remove)
Keywords
- Enterprise Architecture (5)
- Serious Game (3)
- Education (2)
- Engineering education (2)
- Engineering optimization (2)
- Gamification (2)
- MINLP (2)
- Machine Learning (2)
- Robotic Process Automation (2)
- Smart Building (2)
- Ventilation System (2)
- Water distribution system (2)
- autonomous driving (2)
- enhanced Telecom Operations Map (eTOM) (2)
- 3D object detection (1)
- Accuracy (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomalieerkennung (1)
- Anomaly detection (1)
- Artificial Intelligence (1)
- Automation (1)
- Awareness (1)
- BIM (1)
- Bewertungsframework (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- CDG (1)
- CO2 (1)
- Carbon Dioxide (1)
- Case Study (1)
- Case study (1)
- Competence Developing Gam (1)
- Competence Developing Game (1)
- Competence Developing Games (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Control engineering (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Orientation (1)
- DC machines (1)
- Data analysis (1)
- Data visualization (1)
- Datasets (1)
- Deep learning (1)
- DiggiTwin (1)
- Digital Age (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Digitale Transformation (1)
- Digitalisierung (1)
- Discrete Optimisation (1)
- Drinking Water Supply (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electronic learning (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Energy efficiency (1)
- Engineering optimisation (1)
- Experimental validation (1)
- FPGA (1)
- Frequency Doubler (1)
- Future Skills (1)
- GPU (1)
- Geschäftsmodelle (1)
- Graph Theory (1)
- Harmonic Radar (1)
- Heuristic algorithms (1)
- Home Assistant (1)
- Home Automation Platform (1)
- ICS (1)
- Image Database (1)
- Image Forensics (1)
- Implementation Case (1)
- Incremental Encoder (1)
- Industrial optimisation (1)
- Interdisciplinarity (1)
- IoT (1)
- LQR (1)
- Latin Hypercube Sampling (1)
- LiDAR (1)
- Literatur-analyse-prozess (1)
- Literaturanalyse (1)
- Literaturdaten (1)
- Literature review (1)
- Low voltage (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MPC (1)
- Malicious model (1)
- Manifolds (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Matlab (1)
- Minimum Risk Manoeuvre (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Monitoring (1)
- Mpc (1)
- Navigation (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Online services (1)
- Open Educational Resources (OER) (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Topology (1)
- Optimization (1)
- PPO (1)
- Path-following (1)
- Performance (1)
- Personality (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Player Types (1)
- Position Encoder (1)
- Power dissipation (1)
- Powertrain (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process engineering (1)
- Process optimization (1)
- Process reference model (1)
- Prototype (1)
- Pump System (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Reference Process Model (1)
- Referenzmodellierung (1)
- Reinforcement Learning (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- Secure multi-party computation (1)
- Sensors comparison (1)
- Serious Games (1)
- Similarity Theory (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software packages (1)
- Solver Per- formance (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Sustainability (1)
- Synchronous machines (1)
- System Design Problem (1)
- TGA (1)
- TM Forum (1)
- Tag (1)
- Teamwork (1)
- Technical Operations Research (1)
- Telecommunication (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text Analytics (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Throughput (1)
- Time-series synchronization (1)
- Training (1)
- Transdisciplinarity (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- Unternehmensarchitektur (1)
- Unternehmensarchitekturen (1)
- Unternehmensarchitekturen Internet der Dinge (1)
- Unternehmenstransformation (1)
- V2X (1)
- Validation (1)
- Video Game (1)
- Water (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wertschöpfungskettenanalyse (1)
- WiLMo (1)
- Wiegand Effect (1)
- Wirtschaftsinformatik (1)
- Wissenstransfer (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- business analytics (1)
- business simulation (1)
- competence developing games (1)
- cybersecurity (1)
- decision analytics (1)
- digital economy (1)
- do-it-yourself (1)
- eTOM (1)
- education (1)
- embedded hardware (1)
- fault detection (1)
- honeynet (1)
- honeypot (1)
- information systems (1)
- lab work (1)
- learning theories (1)
- mathematical optimization (1)
- metrological characterization (1)
- model-predictive control (1)
- motivation theories (1)
- passive inter-modulation (1)
- power integrity (1)
- professional skills (1)
- requirements (1)
- sensor networks (1)
- signal integrity (1)
- software engineering (1)
- systematic literature review (1)
- tablet game (1)
- water supply system (1)
- Überwachung & Optimierung (1)
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.