Practical Implementation of APTs on PTP Time Synchronisation Networks

Waleed Alghamdi, M. Schukat
{"title":"Practical Implementation of APTs on PTP Time Synchronisation Networks","authors":"Waleed Alghamdi, M. Schukat","doi":"10.1109/ISSC49989.2020.9180157","DOIUrl":null,"url":null,"abstract":"The Precision Time Protocol is essential for many time-sensitive and time-aware applications. However, it was never designed for security, and despite various approaches to harden this protocol against manipulation, it is still prone to cyber-attacks. Here Advanced Persistent Threats (APT) are of particular concern, as they may stealthily and over extended periods of time manipulate computer clocks that rely on the accurate functioning of this protocol. Simulating such attacks is difficult, as it requires firmware manipulation of network and PTP infrastructure components. Therefore, this paper proposes and demonstrates a programmable Man-in-the-Middle (pMitM) and a programmable injector (pInj) device that allow the implementation of a variety of attacks, enabling security researchers to quantify the impact of APTs on time synchronisation.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 31st Irish Signals and Systems Conference (ISSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSC49989.2020.9180157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The Precision Time Protocol is essential for many time-sensitive and time-aware applications. However, it was never designed for security, and despite various approaches to harden this protocol against manipulation, it is still prone to cyber-attacks. Here Advanced Persistent Threats (APT) are of particular concern, as they may stealthily and over extended periods of time manipulate computer clocks that rely on the accurate functioning of this protocol. Simulating such attacks is difficult, as it requires firmware manipulation of network and PTP infrastructure components. Therefore, this paper proposes and demonstrates a programmable Man-in-the-Middle (pMitM) and a programmable injector (pInj) device that allow the implementation of a variety of attacks, enabling security researchers to quantify the impact of APTs on time synchronisation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
点到点时间同步网络上apt的实际实现
精确时间协议对于许多时间敏感和时间敏感的应用程序是必不可少的。然而,它从来都不是为了安全而设计的,尽管有各种方法来强化该协议以防止操纵,但它仍然容易受到网络攻击。在这里,高级持续威胁(APT)是特别值得关注的,因为它们可能会在很长一段时间内偷偷地操纵依赖于该协议准确功能的计算机时钟。模拟这种攻击很困难,因为它需要对网络和PTP基础设施组件进行固件操作。因此,本文提出并演示了可编程中间人(pMitM)和可编程注入器(pInj)设备,它们允许实施各种攻击,使安全研究人员能够量化apt对时间同步的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Effects of Intra-Subject Variation in Gait Analysis on ASD Classification Performance in Machine Learning Models Practical Implementation of APTs on PTP Time Synchronisation Networks Not Everything You Read Is True! Fake News Detection using Machine learning Algorithms Semi-Supervised Learning with Generative Adversarial Networks for Pathological Speech Classification Reduced Complexity Approach for Uplink Rate Trajectory Prediction in Mobile Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1