#하노버메세

Three Unique Security Vulnerabilities of Industrial Networks

Industrial automation devices control extremely critical and valuable assets, but all too often security is an afterthought in industrial networks. In the past, industrial operators trusted in their isolation, or “air gap,” from the broader network, the relative obscurity of their communications protocols, and the physical security of their facilities to protect the integrity of their networks. Now, in a changing, more connected world, automation network operators are realizing they must confront their unique security vulnerabilities. In a recent report prepared for the US Department of Homeland Security, security consultants InfraCritical found 500,000 exposed SCADA devices just by using a search engine, with 7,200 of those devices found to be controlling critical infrastructure assets such as water, energy, and other utilities. It’s not surprising, then, that security researchers characterize the state of ICS security as “laughable.”

Many industrial operators are not even aware the extent that their systems are exposed on the internet. The critical first step to closing the security gaps, then, is to acknowledge the existence of a vulnerability. But the next step is just as critical: the vulnerabilities must be completely addressed—and automation networks have three major unique vulnerabilities.

It Is Difficult to Secure Industrial Modbus TCP Protocol Packets

Even industrial networks that have moved to modern TCP/IP and Ethernet infrastructure for the transport, internet, and link layer of their communications are often still running industrial application layer protocols. The most popular of these, Modbus TCP, is also extremely vulnerable despite being widely used in industrial communications, with no built-in security systems at all.

This means that a packet that appears to be entirely legitimate when inspected as a TCP/IP packet—such as by checking its source IP address—may in fact contain malicious Modbus TCP communications that would be evident if the system were able to filter packets by Modbus source device ID, function codes, or other Modbus command type. Since industrial devices rarely have much in the way of application layer security, it’s up to the cyber security devices, such as hardware firewalls, to provide this critical missing protection. Unfortunately, conventional firewall solutions rarely include the technology to scan industrial protocols such as Modbus TCP.

Industrial Applications are Time-Critical and Can Not Tolerate Transmission Delay

SCADA and industrial control devices directly manage real-world machinery in a way that is highly time-critical. For example, on an assembly line, all of the different machinery needs to operate in perfect coordination in order for the line to keep moving. Electric substation operations are even more time-sensitive, as a delay in triggering a circuit switch could create a power fluctuation or even a blackout.

The highly time-critical nature of industrial operations means that industrial networks can not tolerate significant latency issues. However, a common assault vector used by malicious attackers is to overwhelm a network with requests, which can affect the network latency even if a firewall is able to block the unauthorized requests. Insufficient bandwidth during critical moments will also expose the network to latency issues if the firewall is struggling to process packets quickly enough to maintain timely communications.

The latency and network demands on industrial security will only grow as industrial networks become more advanced and begin to integrate more systems ,such as video, voice, and data. IP cameras generate a lot of bandwidth, and the network security devices need to have the bandwidth and throughput to support advanced applications without compromising the security of the network or the latency of other industrial operations.

Demanding Physical Environments can Overwhelm Security Devices

Industrial machinery and industrial control devices are deployed in more extreme conditions than most conventional IT network equipment. This presents a potential mismatch in the performance of industrial control devices and the network security devices that are intended to protect them—the network security devices might struggle to hold up in the sort of intense industrial conditions that industrial automation systems must operate in. Harsh environmental hazards such as extreme temperature, EMC, and EMI, can be even more damaging to network equipment than a malicious attacker. If the network security hardware is not able to shrug off these hazards, the network will remain exposed and vulnerable to attackers.

Three Unique Security Vulnerabilities of Industrial Networks
Moxa’s Gigabit-Performance Cyber Security Solution for Automation Networks

Moxa has combined its background in industrial automation with its expertise in networking to create a cyber security solution that was designed with the unique needs and requirements of automation networks in mind. The Moxa EDR-810 is an industrial multi-port secure router that includes security functionality and is specifically optimized to address the security vulnerabilities of industrial networks. In addition to a VPN that encrypts data tunnels for remote access, a NAT to hides local IPs, and a firewall that filters packets, the EDR-810 adds automation-friendly functions such as:

Deep Modbus TCP inspection: PacketGuard™, is the world’s first built-in Modbus TCP packet inspector. With PacketGuard, the EDR-810 will inspect network packets all the way up to the Modbus application level, deeper than the transport-layer scanning that conventional network firewalls can achieve.

moxa_EDR-810
moxa_EDR-810

Low latency gigabit performance: The EDR-810 can aggregate its many ports into a Gigabit uplink, for extremely low latency performance that will not interrupt industrial operations, even when used in extremely bandwidth-hungry applications such as IP video.

Highly integrated multi-port secure router with switch functions: The EDR-810 combines security, routing, and layer 2 switch functionality into a single device, making it a highly convenient and cost-effective solution that connects and protects many devices.

The EDR-810 is the latest in Moxa’s EDR family of network security devices tailored for industrial operators. Wide operating temperature range, hardened metal housings, and strong EMI/EMS resistance give Moxa’s EDR security devices the resilience to stand up to harsh operating conditions and keep up with robust industrial networks. For all the details about this entire line of advanced network security hardware, visit http://www.moxa.com/product/Industrial_Secure_Routers.htm

[ICNweb www.icnweb.kr]

뉴스레터 구독하기

아이씨엔매거진은 AIoT, IIoT 및 피지컬 AI, 디지털트윈을 통한 제조업 디지털전환 애널리틱스를 제공합니다.
테크리포트: 자율제조, 전력전자, 모빌리티, 로보틱스, 스마트농업

AW2026 expo
ACHEMA 2027
전시회 세미나 선물 준비는 기프트랩스
오윤경 기자
오윤경 기자http://icnweb.co.kr
아이씨엔매거진 온라인 뉴스 에디터입니다. 오토메이션과 클라우드, 모빌리티, 공유경제, 엔지니어 인문학을 공부하고 있습니다. 보도자료는 아래 이메일로 주세요. => news@icnweb.co.kr
fastech EtherCAT
as-interface
GiftLabs

Related Articles

Stay Connected

440FansLike
407FollowersFollow
224FollowersFollow
120FollowersFollow
372FollowersFollow
152SubscribersSubscribe
GiftLabs
spot_img
InterPACK
spot_img
SPS 2026
automotion
Power Electronics Mag

Latest Articles

Related Articles

PENGUIN Solutions
글로벌 표준 설계자 서울 집결… 피지컬 AI 로드맵 공개

글로벌 표준 설계자 서울 집결… 피지컬 AI 로드맵 공개

0
글로벌 표준 설계자들이 오는 5월 서울에 모여 피지컬 AI 시대를 위한 산업용 네트워크 전략을 논의한다. PROFINET 포럼을 통해 자율 공장 구현을 위한 고정밀 제어 및 보안 기술의 미래를 직접 확인할 수 있다.
WindEnergy
InterPACK

Related Articles

fastech EtherCAT
as-interface
ADI, 차세대 ‘A²B 2.0’ 양산… 케이블 경량화로 차량 연비 혁신 이끈다

ADI, 차세대 ‘A²B 2.0’ 양산… 케이블 경량화로 차량 연비 혁신 이끈다

0
ADI의 A²B 2.0은 배선 복잡도를 75% 줄이는 경량화 설계를 통해 차량 연비 경쟁력을 높이는 동시에, 고대역폭 이더넷 통합으로 SDV 시대의 프리미엄 오디오 인프라를 선점하고 있다
콩가텍, 엔트리급 에지 AI 시장 겨냥한 ‘conga-TC300’ 모듈 출시

콩가텍, 엔트리급 에지 AI 시장 겨냥한 ‘conga-TC300’ 모듈 출시

0
콩가텍의 conga-TC300은 엔트리급 저전력 모듈에 하이엔드급 NPU 기술을 통합함으로써, 중소규모 산업 현장에서도 비용 효율적으로 고성능 에지 AI 솔루션을 도입할 수 있는 새로운 시장 표준을 제시했다
벡터코리아, 전기차 충전 보안 잡는 ‘CANoe Test Package EV – Security’ 출시

벡터코리아, 전기차 충전 보안 잡는 ‘CANoe Test Package EV – Security’...

0
벡터의 신규 보안 테스트 솔루션은 전기차 충전 시장의 글로벌 표준인 ISO 15118 보안 검증을 자동화함으로써, 제조사의 사이버 보안 리스크 관리 비용을 절감하고 차별화된 충전 서비스 경쟁력을 확보하게 한다.
ST, 저저항 Smart STripFET F8 MOSFET으로 자동차 전력 혁신 선도

ST, 저저항 Smart STripFET F8 MOSFET으로 자동차 전력 혁신 선도

0
ST의 신규 MOSFET 시리즈는 업계 최저 수준의 저항과 소형화된 패키징 기술을 통해 전기차의 에너지 효율을 개선하고 제조 공정의 신뢰성을 높임으로써 차세대 모빌리티 시장의 기술적 우위를 제공한다.
마우저, 진동 데이터를 클라우드로 직결하는 암페놀 ‘VDS130’ 공급

마우저, 진동 데이터를 클라우드로 직결하는 암페놀 ‘VDS130’ 공급

0
마우저가 공급하는 암페놀 VDS130은 기존 아날로그 진동 센서 자산을 유지하면서도 현장 데이터를 MQTT 클라우드로 즉시 연결해 주어, 산업 현장의 디지털 전환 비용과 시간을 획기적으로 줄여준다
피닉스컨택트, 유지보수·보안성 강화한 실외용 스마트 이더넷 박스 출시

피닉스컨택트, 유지보수·보안성 강화한 실외용 스마트 이더넷 박스 출시

0
피닉스컨택트가 실외에서 사용하는 똑똑한 통신 상자인 스마트 이더넷 박스를 업그레이드했다. 가장 큰 장점은 고장이 났을 때 복잡한 광케이블을 다시 연결할 필요 없이 상자 본체만 갈아 끼울 수 있어 복구 시간이 매우 짧다는 것
- Our Youtube Channel -Engineers Youtube Channel

Latest Articles