METHOD AND INTRUSION DETECTION UNIT FOR VERIFYING MESSAGE BEHAVIOR
20210243202 · 2021-08-05
Inventors
Cpc classification
G05B19/05
PHYSICS
G06N5/01
PHYSICS
G05B2219/2642
PHYSICS
International classification
G05B19/05
PHYSICS
Abstract
A method is provided for verifying a message behavior of a control unit for an automation system having a plurality of components, the control unit communicating with the components and the components communicating with each other via a communication network, with the steps being carried out on at least one component: receiving at least one message via the communication network, wherein the at least one message is provided by the controller analyzing the at least one received message according to a characteristic message description, and providing a verification message comprising a verification of the message behavior of the control unit as acceptable if the analyzed message matches the characteristic message description.
Claims
1. A method for verifying a message behavior of a control unit for an automation system having a plurality of components, the control unit communicating with the components and the components communicating with one another via a communication network, the method comprising the steps which are carried out on at least one component: receiving at least one message via the communication network, in particular from the control unit; analyzing the at least one received message according to a characteristic message description; and providing a verification message comprising a verification of the message behavior as acceptable if the analyzed message matches the characteristic message description.
2. The method according to claim 1, wherein the verification message is provided to the control unit and/or to a further component in the communication network and/or to a further system.
3. The method according to claim 1, wherein the provision of the verification message is done via an acyclic channel.
4. The method according to claim 1, wherein providing the verification message comprises providing a control signal to the control unit and/or to a further component and/or a further system.
5. The method according to claim 4, wherein the control signal comprises restricting or switching off a functionality of the component and/or the control unit and/or the further system.
6. The method according to claim 1, wherein providing the verification message is carried out if a plurality of the components of the communication network verify the message behavior of the control unit as not permissible.
7. The method according to claim 1, wherein the characteristic message description comprises an error-free and/or trustworthy message behavior between the control unit and the component.
8. The method according to claim 1, further comprising: providing at least one response message by said at least one component to said control unit as a result of said at least one received message.
9. The method according to claim 1, wherein the characteristic message description comprises a time period which comprises the time between receipt of the message and providing of the at least one response message on the component and/or a conversion of a command contained in the message on the component.
10. The method according to claim 1, wherein the characteristic message description is learned in a model.
11. The method according to claim 10, wherein the model is learned via a graphical decision tree and/or a neural network.
12. The method according to claim 10, wherein the learning of the model is performed on the component and/or the control unit and/or a further system.
13. The method according to claim 10, wherein the model is stored in the component.
14. The method according to claim 10, wherein the model is trained on the message behavior of the component in which the model is stored and/or wherein the model is trained on the message behavior of a component placed adjacent to the component storing the model.
15. The method according to claim 1, wherein the method for verifying is provisionally executed for an adjacent component and its messages
16. An intrusion detection unit in a component of an automation system, wherein the components of the automation system communicate with one another and with a control unit via a communication network, and wherein the intrusion detection unit is designed to verify a message behavior of the control unit locally, the intrusion detection unit comprising: a receiving unit adapted to receive at least one message via the communication network for the purpose of controlling the component; an analysis interface to an analysis unit adapted to analyze the at least one received message according to a characteristic message description stored in a component memory; and a verification interface to a verification unit which is adapted to verify the message behavior as permissible if the analysis message corresponds to the characteristic message description.
17. The intrusion detection unit according to claim 16, further comprising: an output unit adapted to output a verification message, the verification message being provided by the verification unit.
18. The intrusion detection unit according to claim 16, further comprising: an input unit adapted to receive a control signal for disabling the verification of the message behavior of the control unit.
19. An automation system comprising: a plurality of components driven by a control unit and communicating therewith via a communication network, wherein all or selected components comprise an intrusion detection unit according to claim 16.
20. A computer program with program code for executing the method according to claim 1, when the computer program is executed on a component.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0052] The disclosure will now be described with reference to the drawings wherein:
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
DESCRIPTION OF EXEMPLARY EMBODIMENTS
[0060] In the following detailed description of the figures, non-restrictive design examples are discussed with their characteristics and further advantages based on the drawing.
[0061]
[0062] In
[0063] Components 30-1 to 30-i can store or access the learned model locally. The learned model can be trained using a graphical decision tree and/or a neural network. The recurring program sequence of the control unit 40 with the deterministic messages can be taught to the components 30-1 to 30-i via the graphical decision tree and/or the neural network. Also, the address range of those components can be learned, which is not relevant for the actual component. The learning of the characteristic message description in a model can be done on the control unit 40, on another system 60, for example an industrial PC or server, which communicate with the communication network 20 and/or on the component 30-1 to 30-i. The application of the trained model and thus the verification of the message behavior is performed on at least one component of the plurality of components 30-1 to 30-i of the automation system 50.
[0064] The message behavior describes the messages which are sent from a control unit 40 via the communication network 40 to the components 30-1 to 30-i. The messages can be damaged and/or manipulated by compromising the control unit, which can also cause the component 30-1 to 30-i to perform an unexpected reaction and/or damage and/or damage the automation system 50 or restrict its function. A trustworthy message behavior, which is verified as permissible by one of the components 30-1 to 30-i, includes messages or commands of the control unit 40, which are stored in a correct sequence of consecutive commands and/or a correct time interval between consecutive commands. In addition, the trusted message behavior may also include the component's response to the received message.
[0065] Since, in principle, components 30-1 to 30-i receive all messages sent via the communication network 20 in an advantageous way, component 30-2, for example, can also learn the message behavior and/or commands for the neighboring component 30-1 and/or the neighboring component 30-3 in a model to be stored locally. The selection of component 30-3 is only exemplary and does not represent a restriction for the disclosure. Rather, the automation system 50 can include further components 30-i, which store a model that has been taught to a message behavior for other components 30-i. Also, the arrangement of the components 30-1 to 30-i shown in
[0066] In the version shown in
[0067] In order to minimize the rate of false alarms, in particular to minimize a malfunction and/or standstill of the automation system due to false alarms, a so-called majority decision of components 30-1 to 30-i can be implemented. The majority decision can include a defined number of components 30-1 to 30-i of the automation system 50. In an execution form, the verification message, comprising a control signal, is provided if 25% of the components 30-i, typically 51% of the components 30-i, particularly typically 75% of the components 30-i of the communication network 20 or the automation system 50 verify the message behavior of the control unit 40 as not permissible. The rate of false messages is minimized the more components 30-i are considered for the verification of the message behavior.
[0068] In a further exemplary embodiment, only preconfigured components can be designed with the intrusion detection unit 10. The selection of the components 30-i depends on the importance for the function of the automation system 50 or on the level. For example, an intrusion detection unit 10 can be provided for a critical component 30-1, 30-2, 30-3, while for another component 30- i the impairment for functions of this component and/or the entire automation system 50 would be negligible. In this way, the functions of the components and/or the automation system can be maintained until a critical level is reached.
[0069]
[0070]
[0071]
[0072] The intrusion detection unit is advantageously implemented as a decentralized system in several components 30-i of the automation system 50. This increases the security and the degree of difficulty to manipulate the system. A compromise is detected, and countermeasures can be initiated and further manipulations and/or malfunctions and/or data theft can be excluded. Due to the decentralized implementation on a plurality of components 30-i in an automation system 50, the effort and/or the degree of difficulty is very high to manipulate all components in such a way, especially to manipulate them simultaneously, so that an attack and/or manipulation by the intrusion detection unit remains unnoticed. In addition, components 30-i, which cannot protect themselves, are protected by the components with an intrusion detection unit. An attempt at manipulation can be detected and repelled accordingly.
[0073]
[0074]
[0075] If the components always see the same bit sequence B, the ordered and/or directed tree is deterministic. In a further execution form, response options in the return channel can be considered. Thus, a more complex tree can be formed. Thus, with a certain probability a corresponding response to a special command is expected, and to a corresponding response a suitable command is expected. It can be differentiated whether the answer to a command does not fit to the expectation. For example, if only a minor violation of the message behavior was detected, this may have been influenced by the direct environment. However, if the expected subsequent command does not match the previously sent response, this corresponds to a high-level violation and would thus be detected as an unexpected new command and thus as a manipulation of normal behavior.
[0076]
[0077] In conclusion, it should be noted that the description of the disclosure and the examples of execution are basically not to be understood as restricting with regard to a certain physical realization of the disclosure. All features explained and shown in connection with individual embodiments of the disclosure may be provided in different combinations in the subject matter of the disclosure in order to realize its advantageous effects at the same time.
[0078] The scope of protection of the present disclosure is given by the claims and is not limited by the features explained in the description or shown to the figures.
LIST OF REFERENCE NUMERALS
[0079] 1 Procedure [0080] 10 Intrusion detection unit [0081] 11 Receiving unit [0082] 12 Analysis interface [0083] 13 Analysis unit [0084] 14 Verification interface [0085] 15 Verification Unit [0086] 16 Output unit [0087] 17 Input unit [0088] 20 Communication network [0089] 30-1, 30-2, 30-3 Component [0090] 30-i Large number of components/components [0091] 40 Control unit [0092] 50 Automation plant [0093] 60 additional system [0094] B Bit sequence [0095] N neural network [0096] N1, N2 Subnets of the neural network [0097] S1 to S4 Process steps [0098] W Probability