SlideShare a Scribd company logo
1Korenix Technology www.korenix.com
IEC62443 Cyber Security Series (2) –
Protect the Fundamental of
IP Networking
Executive Summary
Cyberthreats have become severe concern for industrial automation. The IEC62443
standard, Security for Industrial Automation and Control Systems, defines the security
requirements from component level, system level, to policy and procedures level, as a
guidance for product vendors, system integrators, and asset owners. This document,
addressing ARP protocol and how to protect against cyberattacks, is a reference for
whom it may concern network security at the system level of IEC62443.
Why IP Address and MAC Address?
IP networking has become the dominant technology for industrial data communication.
With proper configuration, network hosts can communicate among one another without
knowing how many network segments or what type of physical medias (copper, fiber, or
wireless…) the data travels through. It is because the TCP/IP model is designed to be
hardware independent and the conversion between IP address and MAC address.
According to the TCP/IP model, the IP address resides in the Internet Layer while the MAC
address belongs to the underlying Link Layer. The two layers have their own functions:
TECHNICAL NOTE
JJ Sun, PSM
2Korenix Technology www.korenix.com
Layer Functions Address
Internet Layer  Defines the internet addressing structure (IP
address)
 Defines the mechanisms for end-to-end
communication and how to route packet
through network segments
IP address
(Logical, configurable)
Link Layer  Defines the hardware addressing of physical
network interfaces (MAC address)
 Defines various types of transmission medias
as network segment, and how data propagates
within a single network segment
MAC address
(Fixed, global unique)
In short, the IP address is logical and configurable for end-to-end communication;
whereas the MAC address is a fixed, physical address for identifying a network interface
for transmission within a network segment.
The diagram above illustrates how IP and MAC addresses work together to finish an end-
to-end communication involving several network segments. An IP packet, from HMI (IPA)
and to PLC (IPD), is transmitted segment-by-segment: first from MACA to MACB1 over
Ethernet, then from MACB2 to MACC1 over fiber, and from MACC2 to MACD over wireless in
the end.
3Korenix Technology www.korenix.com
Address Resolution Protocol (ARP)
Since logical IP communication is carried out by physical MAC addresses, it requires the
Address Resolution Protocol (ARP), to resolve IP address into MAC address.
The ARP protocol is a request-response protocol. It is used by a network host to know the
IP-to-MAC mapping of the other hosts on the same subnet. This is how it works:
Host A (IP 10.0.0.1, on switch port 1) would like to communicate with Host B (IP 10.0.0.2,
on switch port 2). Host A broadcasts an ARP REQUEST to all devices on the subnet, asking
who has the MAC address of IP 10.0.0.2. All devices receive the request, but only Host B
answers by an ARP RESPONSE with its MAC address. Host A gets the answer, resolves the
IP-to-MAC mapping and starts communicating with Host B.
Please note that, all hosts receiving ARP messages automatically cache the IP-to-MAC
binding information in its ARP table; whilst the switch caches the port-to-MAC mapping in
its MAC address table. These knowledges about the network are kept and refreshed for
sending data among hosts within the same subnet.
4Korenix Technology www.korenix.com
ARP may also be as simple as an announcement, called Gratuitous ARP. A host simply
broadcasts its IP and MAC address binding without being requested. This is a way to
refresh or update all other hosts’ ARP table if its binding has changed.
ARP Vulnerabilities
ARP is a fundamental protocol of IP networking, however, it is not protected by any
cybersecurity mechanisms, such as validating the source or the content of the messages.
A malicious user can send ARP response to a request with incorrect information, or simply
does an ARP announcement without being requested. A spoofed ARP message overwrites
hosts’ ARP table and switches’ MAC address table, resulting in changing the packet
destination. This is known as ARP Spoofing or ARP Cache Poisoning.
The below diagram shows a scenario how easy Host C (10.0.0.3, on switch port 3) grabs
the IP packets aiming at Host B. A malicious user from Host C issues a gratuitous ARP,
announcing a fabricated IP-to-MAC binding (B’s IP address and C’s MAC address), which
overwrites the information cached in all hosts’ ARP table and the switch’s MAC address
table. This attack leads subsequent IP packets aiming at Host B be forwarded to Host C.
5Korenix Technology www.korenix.com
Attackers very often use ARP Spoofing to redirect traffic as starting point of other attacks,
such as, inspecting the content (spying), or modifying the content before forwarding to
the actual destination (man-in-the-middle attack), or taking over the role of default
gateway to stop communication (deny-of-service attack).
Various ARP spoofing attack software is available from internet. To launch an attack is no
more difficult than downloading and installation.
Prevent ARP Attacks
There are applications to detect and prevent ARP attacks, however, these applications are
neither integrated in industrial automation devices, nor designed for patching. Therefore,
defending industrial systems against ARP spoofing greatly relies on a mechanism named
Dynamic ARP Inspection (DAI).
Dynamic ARP Inspection is a network security feature on advanced Ethernet switches or
routers. It intercepts ARP messages, validates IP-to-MAC bindings, forwards valid
messages and discards invalid ones. It ensures that only correct binding information can
come into the network, thus prevents ARP attacks.
6Korenix Technology www.korenix.com
The validation is based on a trusted database, which stores correct bindings. The
database can be created and maintained dynamically by DHCP Snooping, manually
configured by administrators, or mixed.
The diagram above shows how Dynamic ARP Inspection works: Host A sends an ARP
request. The switch intercepts and compares the source IP and the source MAC address
of the message to the trusted database. The message is forwarded because the binding is
correct. The ARP spoofing attack from Host C is dropped because the IP-to-MAC binding
does not match.
Conclusion
IP address must be resolved into MAC address before a message can be sent. The Address
Resolution Protocol (ARP), serving for this purpose, is a fundamental of IP networking.
However, it is not secure and the attacks to its vulnerabilities threaten the very basic
operation of modern industrial data communication. The network security feature,
Dynamic ARP Inspection, plays an important role to defend against the ARP attacks.
Addressing IEC62443, Korenix has been continuously implementing cutting edge
cybersecurity technologies, including DHCP Snooping, Dynamic ARP Inspection, IP Source
Guard, TACACS+, multi-level authentication and so on, which provide robust and secure
solution as your core of industrial data communication.
Korenix Technology, a Beijer group company within
the Industrial Data Communication business area, is a
global leading manufacturer providing innovative,
market-oriented, value-focused Industrial Wired and
Wireless Networking Solutions
Web: www.korenix.com
Email: sales@korenix.com
Phone: +886 28911 1000
Address: 14F, No.213, Sec. 3, Beixin Rd.,
Xindian Dist., New Taipei City 23143, Taiwan

More Related Content

What's hot

Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Đồng Quốc Vương
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Mohammad Adil
 
ip versions.pdf
ip versions.pdfip versions.pdf
ip versions.pdf
RhysDeirdreDahilig
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
Maulik Patel
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
priya Nithya
 
BACnet Networking Guide
BACnet Networking GuideBACnet Networking Guide
BACnet Networking Guide
Rich Johnson
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
Dân Chơi
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
Marcus Maneja
 
Mobile IP
Mobile IPMobile IP
Mobile IP
DanielaSalazar3
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
Sifat Hossain
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
RoHit VashIsht
 
SEL Applicaiton Guide
SEL Applicaiton GuideSEL Applicaiton Guide
SEL Applicaiton Guide
Samantha Sutherland
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Đồng Quốc Vương
 
Mobile IP
Mobile IPMobile IP
Mobile IP
nayakslideshare
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
Varinder Singh Walia
 
Gc2411021106
Gc2411021106Gc2411021106
Gc2411021106
IJERA Editor
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Đồng Quốc Vương
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Uday Bhatia
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Nijo Job
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
Asish Verma
 

What's hot (20)

Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
ip versions.pdf
ip versions.pdfip versions.pdf
ip versions.pdf
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
BACnet Networking Guide
BACnet Networking GuideBACnet Networking Guide
BACnet Networking Guide
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
SEL Applicaiton Guide
SEL Applicaiton GuideSEL Applicaiton Guide
SEL Applicaiton Guide
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Gc2411021106
Gc2411021106Gc2411021106
Gc2411021106
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 

Similar to Protect The Fundamental of IP Networking - Network Security Features 2019

Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
CSCJournals
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centers
redpel dot com
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
Editor IJARCET
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
Editor IJARCET
 
Arp
ArpArp
How to change mac address
How to change mac addressHow to change mac address
How to change mac address
Sneh Raval
 
Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1
arun0501
 
Improved secure address resolution protocol
Improved secure address resolution protocolImproved secure address resolution protocol
Improved secure address resolution protocol
csandit
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
UsamaAliLone3
 
Advance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking BasicsAdvance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking Basics
Payal Dungarwal
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
IJNSA Journal
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
 
D017131318
D017131318D017131318
D017131318
IOSR Journals
 
Address Resolution Protocol (ARP) Spoofing Attack And Proposed Defense
Address Resolution Protocol (ARP)  Spoofing Attack And Proposed DefenseAddress Resolution Protocol (ARP)  Spoofing Attack And Proposed Defense
Address Resolution Protocol (ARP) Spoofing Attack And Proposed Defense
Joe Andelija
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
prachi67
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
rajshreemuthiah
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Mohd. Ahmad Siddiqi
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
Varinder Singh Walia
 

Similar to Protect The Fundamental of IP Networking - Network Security Features 2019 (20)

Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centers
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
 
Arp
ArpArp
Arp
 
How to change mac address
How to change mac addressHow to change mac address
How to change mac address
 
Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1
 
Improved secure address resolution protocol
Improved secure address resolution protocolImproved secure address resolution protocol
Improved secure address resolution protocol
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
Advance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking BasicsAdvance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking Basics
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
D017131318
D017131318D017131318
D017131318
 
Address Resolution Protocol (ARP) Spoofing Attack And Proposed Defense
Address Resolution Protocol (ARP)  Spoofing Attack And Proposed DefenseAddress Resolution Protocol (ARP)  Spoofing Attack And Proposed Defense
Address Resolution Protocol (ARP) Spoofing Attack And Proposed Defense
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 

More from Jiunn-Jer Sun

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
Jiunn-Jer Sun
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Jiunn-Jer Sun
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
Jiunn-Jer Sun
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Jiunn-Jer Sun
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
Jiunn-Jer Sun
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Jiunn-Jer Sun
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
Jiunn-Jer Sun
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Jiunn-Jer Sun
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
Jiunn-Jer Sun
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Jiunn-Jer Sun
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
Jiunn-Jer Sun
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
Jiunn-Jer Sun
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Jiunn-Jer Sun
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Jiunn-Jer Sun
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Jiunn-Jer Sun
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Jiunn-Jer Sun
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Jiunn-Jer Sun
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Jiunn-Jer Sun
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
Jiunn-Jer Sun
 

More from Jiunn-Jer Sun (20)

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Protect The Fundamental of IP Networking - Network Security Features 2019

  • 1. 1Korenix Technology www.korenix.com IEC62443 Cyber Security Series (2) – Protect the Fundamental of IP Networking Executive Summary Cyberthreats have become severe concern for industrial automation. The IEC62443 standard, Security for Industrial Automation and Control Systems, defines the security requirements from component level, system level, to policy and procedures level, as a guidance for product vendors, system integrators, and asset owners. This document, addressing ARP protocol and how to protect against cyberattacks, is a reference for whom it may concern network security at the system level of IEC62443. Why IP Address and MAC Address? IP networking has become the dominant technology for industrial data communication. With proper configuration, network hosts can communicate among one another without knowing how many network segments or what type of physical medias (copper, fiber, or wireless…) the data travels through. It is because the TCP/IP model is designed to be hardware independent and the conversion between IP address and MAC address. According to the TCP/IP model, the IP address resides in the Internet Layer while the MAC address belongs to the underlying Link Layer. The two layers have their own functions: TECHNICAL NOTE JJ Sun, PSM
  • 2. 2Korenix Technology www.korenix.com Layer Functions Address Internet Layer  Defines the internet addressing structure (IP address)  Defines the mechanisms for end-to-end communication and how to route packet through network segments IP address (Logical, configurable) Link Layer  Defines the hardware addressing of physical network interfaces (MAC address)  Defines various types of transmission medias as network segment, and how data propagates within a single network segment MAC address (Fixed, global unique) In short, the IP address is logical and configurable for end-to-end communication; whereas the MAC address is a fixed, physical address for identifying a network interface for transmission within a network segment. The diagram above illustrates how IP and MAC addresses work together to finish an end- to-end communication involving several network segments. An IP packet, from HMI (IPA) and to PLC (IPD), is transmitted segment-by-segment: first from MACA to MACB1 over Ethernet, then from MACB2 to MACC1 over fiber, and from MACC2 to MACD over wireless in the end.
  • 3. 3Korenix Technology www.korenix.com Address Resolution Protocol (ARP) Since logical IP communication is carried out by physical MAC addresses, it requires the Address Resolution Protocol (ARP), to resolve IP address into MAC address. The ARP protocol is a request-response protocol. It is used by a network host to know the IP-to-MAC mapping of the other hosts on the same subnet. This is how it works: Host A (IP 10.0.0.1, on switch port 1) would like to communicate with Host B (IP 10.0.0.2, on switch port 2). Host A broadcasts an ARP REQUEST to all devices on the subnet, asking who has the MAC address of IP 10.0.0.2. All devices receive the request, but only Host B answers by an ARP RESPONSE with its MAC address. Host A gets the answer, resolves the IP-to-MAC mapping and starts communicating with Host B. Please note that, all hosts receiving ARP messages automatically cache the IP-to-MAC binding information in its ARP table; whilst the switch caches the port-to-MAC mapping in its MAC address table. These knowledges about the network are kept and refreshed for sending data among hosts within the same subnet.
  • 4. 4Korenix Technology www.korenix.com ARP may also be as simple as an announcement, called Gratuitous ARP. A host simply broadcasts its IP and MAC address binding without being requested. This is a way to refresh or update all other hosts’ ARP table if its binding has changed. ARP Vulnerabilities ARP is a fundamental protocol of IP networking, however, it is not protected by any cybersecurity mechanisms, such as validating the source or the content of the messages. A malicious user can send ARP response to a request with incorrect information, or simply does an ARP announcement without being requested. A spoofed ARP message overwrites hosts’ ARP table and switches’ MAC address table, resulting in changing the packet destination. This is known as ARP Spoofing or ARP Cache Poisoning. The below diagram shows a scenario how easy Host C (10.0.0.3, on switch port 3) grabs the IP packets aiming at Host B. A malicious user from Host C issues a gratuitous ARP, announcing a fabricated IP-to-MAC binding (B’s IP address and C’s MAC address), which overwrites the information cached in all hosts’ ARP table and the switch’s MAC address table. This attack leads subsequent IP packets aiming at Host B be forwarded to Host C.
  • 5. 5Korenix Technology www.korenix.com Attackers very often use ARP Spoofing to redirect traffic as starting point of other attacks, such as, inspecting the content (spying), or modifying the content before forwarding to the actual destination (man-in-the-middle attack), or taking over the role of default gateway to stop communication (deny-of-service attack). Various ARP spoofing attack software is available from internet. To launch an attack is no more difficult than downloading and installation. Prevent ARP Attacks There are applications to detect and prevent ARP attacks, however, these applications are neither integrated in industrial automation devices, nor designed for patching. Therefore, defending industrial systems against ARP spoofing greatly relies on a mechanism named Dynamic ARP Inspection (DAI). Dynamic ARP Inspection is a network security feature on advanced Ethernet switches or routers. It intercepts ARP messages, validates IP-to-MAC bindings, forwards valid messages and discards invalid ones. It ensures that only correct binding information can come into the network, thus prevents ARP attacks.
  • 6. 6Korenix Technology www.korenix.com The validation is based on a trusted database, which stores correct bindings. The database can be created and maintained dynamically by DHCP Snooping, manually configured by administrators, or mixed. The diagram above shows how Dynamic ARP Inspection works: Host A sends an ARP request. The switch intercepts and compares the source IP and the source MAC address of the message to the trusted database. The message is forwarded because the binding is correct. The ARP spoofing attack from Host C is dropped because the IP-to-MAC binding does not match. Conclusion IP address must be resolved into MAC address before a message can be sent. The Address Resolution Protocol (ARP), serving for this purpose, is a fundamental of IP networking. However, it is not secure and the attacks to its vulnerabilities threaten the very basic operation of modern industrial data communication. The network security feature, Dynamic ARP Inspection, plays an important role to defend against the ARP attacks. Addressing IEC62443, Korenix has been continuously implementing cutting edge cybersecurity technologies, including DHCP Snooping, Dynamic ARP Inspection, IP Source Guard, TACACS+, multi-level authentication and so on, which provide robust and secure solution as your core of industrial data communication. Korenix Technology, a Beijer group company within the Industrial Data Communication business area, is a global leading manufacturer providing innovative, market-oriented, value-focused Industrial Wired and Wireless Networking Solutions Web: www.korenix.com Email: sales@korenix.com Phone: +886 28911 1000 Address: 14F, No.213, Sec. 3, Beixin Rd., Xindian Dist., New Taipei City 23143, Taiwan