期刊论文详细信息
Cybersecurity
Precision time protocol attack strategies and their resistance to existing security extensions
Michael Schukat1  Waleed Alghamdi1 
[1]School of Computer Science, National University of Ireland, Galway, Ireland
关键词: APT;    Cyber-attacks;    IEEE 1588;    PTP;    Security;    Time synchronization protocols;   
DOI  :  10.1186/s42400-021-00080-y
来源: Springer
PDF
【 摘 要 】
The IEEE 1588 precision time protocol (PTP) is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond levels. Nevertheless, PTP and its underlying network infrastructure are vulnerable to cyber-attacks, which can stealthily reduce the time synchronization accuracy to unacceptable and even damage-causing levels for individual clocks or an entire network, leading to financial loss or even physical destruction. Existing security protocol extensions only partially address this problem. This paper provides a comprehensive analysis of strategies for advanced persistent threats to PTP infrastructure, possible attacker locations, and the impact on clock and network synchronization in the presence of security protocol extensions, infrastructure redundancy, and protocol redundancy. It distinguishes between attack strategies and attacker types as described in RFC7384, but further distinguishes between the spoofing and time source attack, the simple internal attack, and the advanced internal attack. Some experiments were conducted to demonstrate the impact of PTP attacks. Our analysis shows that a sophisticated attacker has a range of methodologies to compromise a PTP network. Moreover, all PTP infrastructure components can host an attacker, making the comprehensive protection of a PTP network against a malware infiltration, as for example exercised by Stuxnet, a very tedious task.
【 授权许可】

CC BY   

【 预 览 】
附件列表
Files Size Format View
RO202107022567017ZK.pdf 2592KB PDF download
  文献评价指标  
  下载次数:4次 浏览次数:10次