Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective Bachelor Thesis

نویسندگان

  • Sebastian Jeckel
  • Abdelmajid Khelil
چکیده

Modern Supervisory Control and Data Acquisition (SCADA) systems, used to control and monitor critical processes in infrastructures or industry, are increasingly built with off-the-shelf components which can be integrated into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding security and dependability of SCADA systems. These challenges include Internet cyber-attacks, temporary or permanent failures of communication links and network congestion caused by other applications. Peer-to-Peer (P2P) technologies, mainly known for their use in Internet file-sharing applications, allow for the construction of large-scale, virtual networks on top of existing communication infrastructure. P2P networks are scalable, self-organizing and fault-tolerant. Those properties make them interesting for use in modern SCADA systems. There is a large number of existing P2P technologies with different properties, and the same holds for SCADA systems. The main goals of this bachelor thesis are a general analysis of both domains and their compatibility, and the mapping of appropriate P2P technologies to existing SCADA systems for the applications data replication and path rerouting in a network. The common classification of P2P technology in structured and unstructured is further refined w.r.t the needs and capabilities of SCADA systems. The conclusions drawn from the analysis in this work are general guidelines for the conservative implementation of P2P technologies in SCADA systems to avoid any regressions. For rerouting, simple decentralized and unstructured P2P techniques are sufficient, independent of any specific properties of the SCADA system. For data replication in systems of moderate size structured techniques are best suited. Zusammenfassung Moderne Supervisory Control and Data Acquisition (SCADA) Systeme, die zur Steuerung und Überwachung von kritischen Prozessen in Infrastruktur oder Industrie eingesetzt werden, bestehen zunehmend aus seriengefertigen Standardkomponenten und können somit in bereits vorhandene Netzwerke integriert werden. Der dadurch gewonnenen Flexibilität und Kosteneinsparung stehen neue Herausforderungen bezüglich Sicherheit und Zuverlässigkeit der SCADA Systeme gegenüber. Diese Herausforderungen beinhalten Cyber-Angriffe über das Internet, kurzzeitig oder dauerhaft ausgefallene Kommunikationsverbindungen und Netzwerküberlastungen durch andere Anwendungen. Peer-to-Peer (P2P) Technologien, hauptsächlich bekannt durch ihre Anwendung für den Dateienaustausch via Internet, ermöglichen die Konstruktion von groß angelegten, virtuellen Netzwerken auf vorhandener Kommunikationsinfrastruktur. P2P Netzwerke skalieren für eine große Anzahl von Teilnehmern, sind selbstverwaltend und fehlertolerant. Diese Eigenschaften machen sie interessant für den Einsatz in modernen SCADA Systemen. Es existiert eine große Anzahl von unterschiedlichen P2P Technologien mit ebenso unterschiedlichen Eigenschaften; gleiches gilt für SCADA Systeme. Hauptziele dieser Bachelorarbeit sind eine generelle Analyse der beiden Teilgebiete bezüglich ihrer Vereinbarkeit und die Zuordnung von geeigneten P2P Technologien zu heute eingesetzten SCADA Systemen für die Anwendungsbereiche Datenreplikation und Pfadumleitung im Netzwerk. Die gebräuchliche Klassifizierung von P2P Technologien in strukturierte und unstrukturierte wird mit Blick auf Anforderungen und Voraussetzungen in SCADA Systemen weiter verfeinert. Ergebnis der Analyse in dieser Arbeit ist ein genereller Leitfaden für die konservative Implementierung von P2P Technologien für SCADA Systeme um Regressionen zu vermeiden. Für Pfadumleitung eignen sich bereits einfache, dezentralisierte, unstrukturierte P2P Techniken, unabhängig von den spezifischen Eigenschaften des SCADA Systems. Für Datenreplikation in größeren Systemen sollten strukturierte Techniken verwendet werden. Authorship declaration I hereby declare that I am the sole author of this thesis and that only cited sources have been used.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective

Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/dependability. Peer-to-Peer (P2P...

متن کامل

Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays

Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are increasingly composed of standard Internet technologies and use public networks. Hence, while the SCADA functionality has increased, its vulnerability to cyber threats has also risen. These threats often lead to reduced system av...

متن کامل

A K/N Attack-Resilient ICT Shield for SCADA Systems, with State Based Attack Detection

The security of Critical Infrastructures has become a prominent problem with the advent of modern ICT technologies used to improve the performance and the features of Process Control Systems. Several scientific works have showed how Supervisory Control And Data Acquisition Systems (SCADA), i.e. the systems that control industrial installations, are exposed to cyber-attacks. Traditional ICT secu...

متن کامل

Performance Evaluation and Benchmarking of the JXTA Peer-To-Peer Platform

In presenting this thesis in partial fulfillment of the requirements for a Postgraduate degree from the University of Saskatchewan, I agree that the Libraries of this University may make it freely available for inspection. I further agree that permission for copying of this thesis in any manner, in whole or in part, for scholarly purposes may be granted by the professor or professors who superv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010