尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
1Korenix Technology www.korenix.com
IEC62443 Cyber Security Series (1) –
Defend Your DHCP Infrastructure
Against Cyber Attacks
Executive Summary
Cyberthreats have become severe concern for industrial automation. The IEC62443
standard, Security for Industrial Automation and Control Systems, defines the security
requirements from component level, system level, to policy and procedures level, as a
guidance for product vendors, system integrators, and asset owners. This document,
addressing DHCP protocol, its vulnerabilities and how to protect a DHCP infrastructure, is
a reference for whom it may concern network security at the system level of IEC62443.
DHCP In Automation Industry and How It Works
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol that
simplifies network configuration, reduces manual operation, and enhances scalability of a
system. It bases on a client-server architecture, where a server maintains a database,
processes clients’ requests, and assigns network configurations to them. It has been
widely used in industrial automation and control systems. Many industrial components,
such as HMIs, SCADAs, PLCs, I/Os, surveillance cameras have come with this feature by
default. While enjoying its benefits, to understand how it works and the risks is required.
TECHNICAL NOTE
JJ Sun, PSM
2Korenix Technology www.korenix.com
The below diagram shows the basic transaction about how an IP address is assigned
between a DHCP server and a client:
This process is often abbreviated as DORA (Discovery, Offer, Request, and Ack). Please
note that DHCP protocol takes advantage of broadcasting, which floods messages to
every device on the LAN. While DISCOVER message is broadcasted to find a DHCP server,
OFFER and REQUEST messages are also broadcasted to make sure all DHCP servers (if
more than one) aware of this transaction. Broadcasting is convenient; however, it opens a
wide interface to cyberattacks.
Cyber Attacks to DHCP Infrastructure
Today DHCP is available on most network devices, such as computers, laptops, switches,
routers, wireless access points and so on. One can simply, by intention or by mistake,
disturb the operation of a DHCP infrastructure. The most common attacks are man-in-
the-middle attack (DHCP spoofing) and deny-of-service attack (DHCP Starvation).
3Korenix Technology www.korenix.com
DHCP spoofing is a cyberattack from a rogue DHCP server which scrambles a normal
transaction. This is how it happens:
As shown in the diagram, the client’s DISCOVER message is broadcasted. Both the
legitimate and the rogue server receive it and start to OFFER, however, according to
DHCP protocol, the client only takes the OFFER which returns first. In this case, the client
accepts the wrong IP address from the rogue server. The system is compromised.
DHCP Starvation, a type of denial-of-service attack, happens when a malicious client
exhausts the server’s IP address pool by requesting more addresses than available. The
server cannot assign IP address anymore and the system is down.
There are DHCP starvation applications for download from internet. One can simply install
the application and issue attacks. Below diagram shows how such kind of application
requests IP addresses by fabricated DISCOVER messages.
4Korenix Technology www.korenix.com
Defense Against DHCP Attacks
DHCP protocol was not designed with comprehensive security considerations. Attacks to
DHCP can be easily done without complicated networking knowledge or IT skills. To
against DHCP attacks by additional cybersecurity mechanism is essential and critical. From
network security perspective, the most effective way is to deploy protection on the front
line, where DHCP messages inject to the network. This is where DHCP Snooping comes
into play.
DHCP Snooping is a network security feature implemented on switches or routers. As
indicated by the name, it snoops DHCP messages when messages come to a port, checks
if they are from trusted sources, validates the payload, forwards correct messages and
discards incorrect ones. It ensures that network configurations can be done correctly. The
detailed behaviors and benefits are:
5Korenix Technology www.korenix.com
 Switch ports are configured into trusted or untrusted.
Trusted ports are the ports toward trusted sources, the legitimate DHCP servers. A
legitimate server can be an administrative workstation, a switch, or a router that
runs DHCP server service. Untrusted ports are the ports toward all the other devices
including legitimate clients, rogue servers, or malicious clients.
DHCP Requests from untrusted ports are forwarded only to the trusted server, not
broadcasted, and only the trusted server can offer network configuration. This
prevents the rogue server from receiving DHCP messages and ensures that all
transactions are handled by the legitimate server as well.
 Validates and drops invalid messages. Messages are invalid for example:
Server messages (OFFER, ACK, NACK…) come from untrusted ports, or client
messages (DISCOVER, REQUEST…) with spurious payload, such as fabricated Mac
addresses. This blocks server messages from untrusted sources and filters attacks
from malicious clients.
6Korenix Technology www.korenix.com
 Builds and maintains a DHCP binding table.
The binding table includes information about the MAC address of a client, the
leased IP address, the lease time and so on. An entry in the binding table is created
when an IP address is leased, is updated upon renewal, and is deleted when the
leased IP address is expired or released.
The binding table is used in validating the packets of the subsequence renewal of
lease. Renewal requests with mismatched information to the binding table are
discarded.
Network switches or routers with DHCP Snooping enabled make two big differences to a
DHCP infrastructure. Firstly, the DHCP messages are picked up, validated and filtered,
instead of being broadcasted to everywhere. Secondly, valid messages are only forwarded
to trusted sources and only the configurations come from trusted sources are given to
clients.
7Korenix Technology www.korenix.com
Conclusion
DHCP protocol is not secure by nature and its vulnerabilities demand immediate
attention. The cybersecurity feature, DHCP Snooping, is a critical for those industrial
automation and control systems rely on DHCP services.
Addressing IEC62443, Korenix has been continuously implementing cutting edge
cybersecurity technologies, including DHCP Snooping, Dynamic ARP Inspection, IP Source
Guard, TACACS+, multi-level authentication and so on, which provide robust and secure
solution as your core of industrial data communication.
Korenix Technology, a Beijer group company within
the Industrial Data Communication business area, is a
global leading manufacturer providing innovative,
market-oriented, value-focused Industrial Wired and
Wireless Networking Solutions
Web: www.korenix.com
Email: sales@korenix.com
Phone: +886 28911 1000
Address: 14F, No.213, Sec. 3, Beixin Rd.,
Xindian Dist., New Taipei City 23143, Taiwan

More Related Content

What's hot

VPN presentation
VPN presentationVPN presentation
VPN presentation
Riazehri
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
Rama Krishna Nakka
 
Vpn
VpnVpn
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Jeff Green
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
Ixia
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
ccna4discovery
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
sonalikasingh15
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
Ilya Mikov
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
Swarup Kumar Mall
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Ram Bharosh Raut
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
jadeja dhanraj
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
Ah Fawad Saiq
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
faisalmalik
 

What's hot (20)

VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 

Similar to Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Features 2019

Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
paripec
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
bartholomeocoombs
 
A1803020108
A1803020108A1803020108
A1803020108
IOSR Journals
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
sodhi3
 
Remote access service
Remote access serviceRemote access service
Remote access service
Apoorw Pandey
 
DHCP server on a cisco router explaining its uses its how to and benefits alo...
DHCP server on a cisco router explaining its uses its how to and benefits alo...DHCP server on a cisco router explaining its uses its how to and benefits alo...
DHCP server on a cisco router explaining its uses its how to and benefits alo...
kamrantaj619
 
Investigation of dhcp packets using wireshark
Investigation of dhcp packets using wiresharkInvestigation of dhcp packets using wireshark
Investigation of dhcp packets using wireshark
jpratt59
 
Ipadd mngt
Ipadd mngtIpadd mngt
Ipadd mngt
James1280
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
 
DHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACERDHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACER
COMSATS Institute of Information Technology
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
igede tirtanata
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
igede tirtanata
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
093049ov5.pptx
093049ov5.pptx093049ov5.pptx
093049ov5.pptx
NguyenNM
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
Gurpreet singh
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
rajisri2
 
Secure network
Secure networkSecure network
Secure network
shelusharma
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014
Đồng Quốc Vương
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 

Similar to Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Features 2019 (20)

Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
A1803020108
A1803020108A1803020108
A1803020108
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
DHCP server on a cisco router explaining its uses its how to and benefits alo...
DHCP server on a cisco router explaining its uses its how to and benefits alo...DHCP server on a cisco router explaining its uses its how to and benefits alo...
DHCP server on a cisco router explaining its uses its how to and benefits alo...
 
Investigation of dhcp packets using wireshark
Investigation of dhcp packets using wiresharkInvestigation of dhcp packets using wireshark
Investigation of dhcp packets using wireshark
 
Ipadd mngt
Ipadd mngtIpadd mngt
Ipadd mngt
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
DHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACERDHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACER
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
093049ov5.pptx
093049ov5.pptx093049ov5.pptx
093049ov5.pptx
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
 
Secure network
Secure networkSecure network
Secure network
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 

More from Jiunn-Jer Sun

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
Jiunn-Jer Sun
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Jiunn-Jer Sun
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
Jiunn-Jer Sun
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Jiunn-Jer Sun
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
Jiunn-Jer Sun
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Jiunn-Jer Sun
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
Jiunn-Jer Sun
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Jiunn-Jer Sun
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
Jiunn-Jer Sun
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Jiunn-Jer Sun
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
Jiunn-Jer Sun
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
Jiunn-Jer Sun
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Jiunn-Jer Sun
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Jiunn-Jer Sun
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Jiunn-Jer Sun
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
Jiunn-Jer Sun
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Jiunn-Jer Sun
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Jiunn-Jer Sun
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
Jiunn-Jer Sun
 

More from Jiunn-Jer Sun (20)

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
 

Recently uploaded

TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 

Recently uploaded (20)

TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 

Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Features 2019

  • 1. 1Korenix Technology www.korenix.com IEC62443 Cyber Security Series (1) – Defend Your DHCP Infrastructure Against Cyber Attacks Executive Summary Cyberthreats have become severe concern for industrial automation. The IEC62443 standard, Security for Industrial Automation and Control Systems, defines the security requirements from component level, system level, to policy and procedures level, as a guidance for product vendors, system integrators, and asset owners. This document, addressing DHCP protocol, its vulnerabilities and how to protect a DHCP infrastructure, is a reference for whom it may concern network security at the system level of IEC62443. DHCP In Automation Industry and How It Works The Dynamic Host Configuration Protocol (DHCP) is a network management protocol that simplifies network configuration, reduces manual operation, and enhances scalability of a system. It bases on a client-server architecture, where a server maintains a database, processes clients’ requests, and assigns network configurations to them. It has been widely used in industrial automation and control systems. Many industrial components, such as HMIs, SCADAs, PLCs, I/Os, surveillance cameras have come with this feature by default. While enjoying its benefits, to understand how it works and the risks is required. TECHNICAL NOTE JJ Sun, PSM
  • 2. 2Korenix Technology www.korenix.com The below diagram shows the basic transaction about how an IP address is assigned between a DHCP server and a client: This process is often abbreviated as DORA (Discovery, Offer, Request, and Ack). Please note that DHCP protocol takes advantage of broadcasting, which floods messages to every device on the LAN. While DISCOVER message is broadcasted to find a DHCP server, OFFER and REQUEST messages are also broadcasted to make sure all DHCP servers (if more than one) aware of this transaction. Broadcasting is convenient; however, it opens a wide interface to cyberattacks. Cyber Attacks to DHCP Infrastructure Today DHCP is available on most network devices, such as computers, laptops, switches, routers, wireless access points and so on. One can simply, by intention or by mistake, disturb the operation of a DHCP infrastructure. The most common attacks are man-in- the-middle attack (DHCP spoofing) and deny-of-service attack (DHCP Starvation).
  • 3. 3Korenix Technology www.korenix.com DHCP spoofing is a cyberattack from a rogue DHCP server which scrambles a normal transaction. This is how it happens: As shown in the diagram, the client’s DISCOVER message is broadcasted. Both the legitimate and the rogue server receive it and start to OFFER, however, according to DHCP protocol, the client only takes the OFFER which returns first. In this case, the client accepts the wrong IP address from the rogue server. The system is compromised. DHCP Starvation, a type of denial-of-service attack, happens when a malicious client exhausts the server’s IP address pool by requesting more addresses than available. The server cannot assign IP address anymore and the system is down. There are DHCP starvation applications for download from internet. One can simply install the application and issue attacks. Below diagram shows how such kind of application requests IP addresses by fabricated DISCOVER messages.
  • 4. 4Korenix Technology www.korenix.com Defense Against DHCP Attacks DHCP protocol was not designed with comprehensive security considerations. Attacks to DHCP can be easily done without complicated networking knowledge or IT skills. To against DHCP attacks by additional cybersecurity mechanism is essential and critical. From network security perspective, the most effective way is to deploy protection on the front line, where DHCP messages inject to the network. This is where DHCP Snooping comes into play. DHCP Snooping is a network security feature implemented on switches or routers. As indicated by the name, it snoops DHCP messages when messages come to a port, checks if they are from trusted sources, validates the payload, forwards correct messages and discards incorrect ones. It ensures that network configurations can be done correctly. The detailed behaviors and benefits are:
  • 5. 5Korenix Technology www.korenix.com  Switch ports are configured into trusted or untrusted. Trusted ports are the ports toward trusted sources, the legitimate DHCP servers. A legitimate server can be an administrative workstation, a switch, or a router that runs DHCP server service. Untrusted ports are the ports toward all the other devices including legitimate clients, rogue servers, or malicious clients. DHCP Requests from untrusted ports are forwarded only to the trusted server, not broadcasted, and only the trusted server can offer network configuration. This prevents the rogue server from receiving DHCP messages and ensures that all transactions are handled by the legitimate server as well.  Validates and drops invalid messages. Messages are invalid for example: Server messages (OFFER, ACK, NACK…) come from untrusted ports, or client messages (DISCOVER, REQUEST…) with spurious payload, such as fabricated Mac addresses. This blocks server messages from untrusted sources and filters attacks from malicious clients.
  • 6. 6Korenix Technology www.korenix.com  Builds and maintains a DHCP binding table. The binding table includes information about the MAC address of a client, the leased IP address, the lease time and so on. An entry in the binding table is created when an IP address is leased, is updated upon renewal, and is deleted when the leased IP address is expired or released. The binding table is used in validating the packets of the subsequence renewal of lease. Renewal requests with mismatched information to the binding table are discarded. Network switches or routers with DHCP Snooping enabled make two big differences to a DHCP infrastructure. Firstly, the DHCP messages are picked up, validated and filtered, instead of being broadcasted to everywhere. Secondly, valid messages are only forwarded to trusted sources and only the configurations come from trusted sources are given to clients.
  • 7. 7Korenix Technology www.korenix.com Conclusion DHCP protocol is not secure by nature and its vulnerabilities demand immediate attention. The cybersecurity feature, DHCP Snooping, is a critical for those industrial automation and control systems rely on DHCP services. Addressing IEC62443, Korenix has been continuously implementing cutting edge cybersecurity technologies, including DHCP Snooping, Dynamic ARP Inspection, IP Source Guard, TACACS+, multi-level authentication and so on, which provide robust and secure solution as your core of industrial data communication. Korenix Technology, a Beijer group company within the Industrial Data Communication business area, is a global leading manufacturer providing innovative, market-oriented, value-focused Industrial Wired and Wireless Networking Solutions Web: www.korenix.com Email: sales@korenix.com Phone: +886 28911 1000 Address: 14F, No.213, Sec. 3, Beixin Rd., Xindian Dist., New Taipei City 23143, Taiwan
  翻译: