ABSTRACT

This section first introduces automation systems in general and then describes why automation systems are traditionally insecure by regarding the history of automation systems. The security mechanisms applied in traditional automation systems are weak if found at all. As long as automation systems have existed as isolated islands, they were reasonably well protected because physical access to the systems was needed to launch an attack. Recently, more and more automation systems are connected via the Internet to centralized control centers and also wireless networks are becoming more common in the automation world. In particular, the integration of wireless components leads to new attack risks due to the exposition of data beyond the visible borders of plants. Standard PC hardware and Ethernet are now used in automation systems. Those widely used technologies

18.1 Automation Systems ............................................................................................................. 431 18.1.1 Introduction to Automation Systems ........................................................................ 432

18.1.1.1 History of the Development of Automation Systems ................................ 433 18.1.1.2 Security Goals in Automation Systems ..................................................... 435

18.1.2 Security Issues in Automation Networks ................................................................. 435 18.1.3 Attack Entry Points ................................................................................................... 436 18.1.4 Known Attacks and Consequences .......................................................................... 437

18.2 Intrusion Detection Systems ................................................................................................. 437 18.2.1 IDS in Automation Systems ..................................................................................... 438

18.2.1.1 IDS Preconditions ...................................................................................... 439 18.2.1.2 Requirements for IDS in Automation Systems ..........................................440