首页    期刊浏览 2024年11月13日 星期三
登录注册

文章基本信息

  • 标题:Securing the network for industrial infrastructure.
  • 作者:Truican, Ion ; Dan, Stefan ; Kristaly, Dominic Mircea
  • 期刊名称:Annals of DAAAM & Proceedings
  • 印刷版ISSN:1726-9679
  • 出版年度:2007
  • 期号:January
  • 语种:English
  • 出版社:DAAAM International Vienna
  • 摘要:Key words: security, availability, confidentiality, network.
  • 关键词:Computer networking equipment;Computer networks;Corporate security;Data processing;Data security;Electronic data processing;Industry;Network administrators;Systems and data security software

Securing the network for industrial infrastructure.


Truican, Ion ; Dan, Stefan ; Kristaly, Dominic Mircea 等


Abstract: Nowadays, building and maintaining a secure network is a challenge for network technicians, independently on which environment that network will be used. Confidentiality of data, which is transported and availability of the network for industrial infrastructure it is a must and should be assured by network devices those are used to keep the network alive, by software that is running on these devices and by technicians those are setting up the network, maintaining it into operation and exploit.

Key words: security, availability, confidentiality, network.

1. INTRODUCTION

The network is used to transport data from one entity to another, independent if end entity is a computer, a multiprocessor platform or any other form of hardware, which has proper software installed and is able to interpret, received data and use it in the scope for which it was designed. If this network is an Intranet and data flows internally, confidentiality of data is ensured by who is sending the data. If this network is connected to Internet and this is used to be nowadays, ensuring the security for our network it is a must.

To be able to transport data, a network should be available and resist to known insecure conditions, which could affect the normal operation status. For industrial network, availability of network is a must and should be counted in small numbers when downtime is taken in consideration as a risk factor. By choosing the right devices those are used to implement the network, a technician should ensure that it is still possible to access key devices (router, switch, server) regardless on what kind of attack are those devices involved (flood of messages, viruses, unrecognized or disabled commands) (Bajenescu, 2000).

The responsibility for securing the network is not only for technicians those are responsible for network infrastructure, but also for people those are using the network. An expert in building and setting up a network, which will ensure the current requirements parameters and future challenges related to speed (transfer rate--throughput) and increasing number of devices, which should populate the network to increase the productivity of industrial sector, will not be able to prevent and stop normal users to read their emails and open malicious attachments, which will spread a virus to all available computers from that network (Marghescu et al., 1999).

2. SECURING THE NETWORK TO FEAT FOR INDUSTRIAL INFRASTRUCTURE ENVIRONMENT

The need for confidentiality of data which is passing trough the network is a desire that should be respected and network must be designed and implemented in such a manner that this requirement is reached independent of what kind of information is going to be transported trough the network. By securing the network it is assured that information will be delivered to the end point from the network and message that was issued by the source will reach its destination without being affected by any trials to corrupt the data by any intruders or malicious devices.

When data is going to be interpreted by different processors those are using the information to take different decision in industrial network, by trusting the content of what was received, means some times a double check of what was delivered and what reached the end point. Such verifications could be done by using proprietary algorithms, public keys and simple checks for what is expected at the receiver from the sender or by checking the sequence of messages from a chain, before the entire payload data is delivered (Tannenbaum, 1997).

Availability of an industrial network is an important aspect and actions like maintenance of the network should not affect the normal operation of devices those are served by the information, which is transported trough the network. To ensure reliable transport of data and 99.999% availability of the network for industrial infrastructure, redundancy of devices those are keeping the network up and running is taken in consideration from the beginning of design phase, even that this will imply to increase the budget and higher the cost to implement that network.

3. PROPOSED SOLUTION TO SECURE THE NETWORK

3.1 How to make a network secure

There are three different aspects those are taken into consideration when network is deigned and implemented:

* Selected hardware to implement the network should take in consideration present requirements, but also the future need for bandwidth and increasing number of users and devices those must be able to access the network and use it;

* The software that makes the network to perform its job in proper condition, respecting the initial requirements, is coming usually with initial hardware (router, switch, hub) and is most of the time a proprietary solution. There are possible solutions for improvement regarding software side when application those are running on the servers could be developed and customized by specific needs;

* Last but not least, users those will access the network and stress its resources should be taken into consideration as an important factor when performances of the network will be measured. By simple explanations and concrete examples, the persons those are accessing the network could understand their role regarding network security. Involving them into the responsibility about who is going to respect the rules of secure network and introducing them in the culture of securing the network, they will be able to understand that in the future, the network will be able to serve their exigencies by protecting the network against insecure materials (Tesch & Abelar, 2007).

Having the industrial network infrastructure connected to the Internet will bring the network technician to face different situations. There will be users those wants to have remote access to devices those are running in the field, to be able to monitor the performances of devices and send remote commands to adjust different parameters of running systems. There should be a solution available to distinguish a user who has rights to access the network from an intruder.

Hardware devices (routers, switches, servers) those are keeping the network alive should be able to face and pass an unpleased situations like flooding of messages from malicious persons. Some resources from these devices like memory and processor should not be bring to their limit, to give the chance to network technician to be able to open a connection (telnet or console connection) to key devices and disable the link or restrict the access for requests those are coming from trustless sites (Davis, 2002).

Software is prone to bugs and there are all the time persons those wants to exploit it. When we talk about a secure network all the software those are running on this network should be up to date regarding the last patch releases and network technician should be aware about monitoring the group discussions for possible "open gates" related to software from his devices.

3.2 Concrete proposals

By choosing the hardware that is used to implement the network some factors should be taken in consideration regarding the specific environment conditions from industrial infrastructure:

* The dust is an important topic, due to the fact that different industrial machines are processing different materials to obtain concrete objects;

* There are different machines that are operating in industrial environment and cables rolled there should be protected in a proper way to avoid tearing of those and bring some segments of the network down and out of operation;

* People those are working in industrial environment should be instructed what are the network cables used for and how this should be protected, independent of level of knowledge those have about the way of operation of a network and devices those are used to make this thing possible.

It is important to have hardware devices those are able to sustain certain requirements regarding the performances of network operation, but also to have still some resources available in case of unpredicted situation, when it is necessary not to have a device which is blocked due to the fact that is not able to process any more information and messages those arrives, e.g. by flooding of messages at one moment from a network attack. Devices those make a network to operate needs also to be administrated and there are specific protocols those are used to make communication possible between different network devices. For instance SNMP (Simple Network Management Protocol) is used to make updates regarding network status and announce other devices, when one gets out of operation for some reasons. Such messages should not be accepted by a router from any address, only from a known and trusted list of devices.

Restricting the access for some devices and clear list of IP (Internet Protocol) addresses could prevent unpleased situation when network would be flooded with unnecessary messages those are only "keeping the line busy". Access lists and routing tables are good instruments that should be used when administrating routers and switches by giving or restricting the access for different users, devices or IP addresses. Information from servers could be organized in such a way that only clear defined list of users (those have right to read/write on that location) can access restricted information.

The simplest way of protecting the information that is transported within the network is by giving password to users those have a valid account and have the rights to access the resources stored and served by network infrastructure. Is not enough to have a password to make a network secure, but this is the first step that should be done. It should be recognized that is unpleased for some people those are working in a factory to make up their mind and remember all the time a password to be able to access some devices. It is hard to convince them that this password should contain a minimal number of characters, should be update it from time to time at certain intervals and must not be write it down to that piece of paper that is seating all day log at his desk. This is the inconvenient truth; the agility and persuasive skills of network administrator or technician is demonstrated by convincing the people what is good and what is bad related to networking when you talk about security and confidentiality of data.

3.3 Open point for improvement

Building a self-defending network is the next step of development when we talk about the security of already implemented and operational network. The network should have the ability to identify from where the malicious messages are coming and block those addresses to avoid blocking of own resources and flood of commands.

It is possible to speed up the process of delivering the messages to end entity by implementing some of decision criteria directly in the hardware and skip possible delays inserted by analyses of headers implemented by software.

Users those are not respecting the access rules and are trying to read information that is not address to them or they didn't got the read access for some directories, could be informed about their actions as a first step to make them responsible about their actions and put it on malicious persons lists recognized automatically by the network as ones those are trying to see what they did not received the rights for yet.

If data that is travel trough the network is strictly confidential, these packages of information can be encrypted by using available key for encryption or developing software that is modifying the TCP/IP (Transport Connection Protocol/Internet Protocol) header in such a way that only partners those know the encryption algorithm are able to decode it. Another way could be to modify the data field from the TCP/IP packet by adding additional bits to existing once, just to be able to recognize at the receiver that this packet is coming from trusted destination.

4. CONCLUSION

To have a secure network which feats to requirements of an industrial infrastructure should take in consideration not only the rules those make the network secure, but also to have proper hardware devices, updated software which is running on those devices and people those understand and comply the rules those are ensuring the confidentiality of data and makes availability of network possible by protecting against insecure content.

5. REFERENCES

Bajenescu, T. (2000). Sisteme personale de comunicatii (Communications personal systems), Ed. Teora, Bucuresti.

Davis, P.T. (2002). Securing and Controlling Cisco Routers, CRC Press LLC.

Marghescu, I.; Cotanis, N. & Nicolaescu, S. (1999). Mobile Communications, Ed. Tehnica, Bucuresti.

Tannenbaum, A.S. (1997). Computer Networks, Computer Press Agora, Bucharest.

Tesch, D. & Abelar, G. (2007). Security Threat Mitigation and Response Understanding Cisco Security MARS, Cisco Press, Indianapolis, Indiana 46240 USA.
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有