National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Application for Statistical Analysis of ICS Communication
Chimenti, Andrea ; Bartík, Vladimír (referee) ; Burgetová, Ivana (advisor)
This work aims to present the design and implementation of an application for statistical analysis of network traffic in ICS (Industrial Control Systems) communication. In the first place, the work presents Industrial Control Systems and some of their most common protocols. The protocol IEC 104 is described in more detail. This is followed by an introduction to the basic methods of descriptive statistics, that can be used to analyze industrial communication. For this purpose, several CSV datasets, that capture fragments of industrial communication, have been used. These datasets are used to show how some of the previously described statistical methods can be used. The work then describes the implementation of an application, which allows to analyze the datasets and obtain various statistics and a visual representation of the data. The main objective of the application is to make it easier for the user to find stable characteristics that can be used for anomaly and attack detection. Finally, the benefits that the application brings are demonstrated on a set of datasets containing different types of attacks.
IDE for SCADA Development at CERN
Mareček, Matěj ; Holík, Lukáš (referee) ; Křivka, Zbyněk (advisor)
Cílem této magisterské práce je navrhnout a implementovat IDE (integrované vývojové prostředí), které zvýší efektivitu a bezpečnost vývoje pro SIMATIC WinCC Open Architecture. Tato práce je založena na výzkumu provedeném týmem z Technické univerzity v Eindhovenu a splňuje požadavky pocházející ze SCD sekce v CERN (Evropské organizace pro jaderný výzkum). Vyvinuté IDE je postaveno na platformě Eclipse, přičemž pro syntaktickou analýzu, linkování a sémantickou analýzu kódu používá Xtext framework. IDE nabízí také podporu pro nově vytvořený programovací jazyk, který umožňuje programátorům jednoduše nadefinovat šablonu pro konfigurační soubory používané WinCC OA. Interpret tohoto nového jazyka je schopen provést syntaktickou analýzu šablony a konfiguračního souboru a rozhodnout, zdali konfigurační soubor odpovídá šabloně. Praktickým výstupem této práce je integrované vývojové prostředí, které podporuje vývoj WinCC OA aplikací v CERN a periodicky provádí analýzu kódu těchto aplikací napsaného v jazyce Control script.
Design of interconnections and program modules for robotic cell control for parts creation
Fursov, Ihor ; Vetiška, Jan (referee) ; Bradáč, František (advisor)
This diploma thesis describes design of interconnections and program modules for robotic cell control for parts creation. Research of this work is focused on industrial comunication protocols. The next part analyzes separate parts of the cell and their ways of connection. Futhermore, control structures of the cell are proposed and after comparison of them SCADA system structure was chosen. Project of connecting separate devices is done in Wonderware Systém Platform. The next step describes procedure of interconection of parts of the cell with each other. Then was designed visualization to operate robotic cell and to illustrate its state. Whole visualization was created using Wonderware InTouch program. In conclusion thesis is reviewed.
Cyber security testing in an environment of operational technology
Kuna, Erik ; Pospíšil, Ondřej (referee) ; Paučo, Daniel (advisor)
The topic of this work is security testing in connection with operational technology networks. The theoretical part covers description of operational technology, analysis of the current state of security in such networks and the methodology for penetration testing in this context. A section is devoted to protocols relating to said networks, comprising their characteristics, comparison of the same and related advantages and disadvantages. The theoretical part aids comprehension of the practical section, which details design and implementation of a suitable environment for testing and performing security in ICS/SCADA. Therein, emphasis is placed on security issues that pertain to the ModBus protocol.
Cyber-environment for systems of ICS/SCADA type
Váňa, Martin ; Blažek, Petr (referee) ; Fujdiak, Radek (advisor)
The thesis explores the problematics of cyber environment for the ICS/SCADA systems. First, shorter section is mainly focused on general introduction into the ICS/SCADA systems and their inner workings. Communication model of a general SCADA system and its foundational elements are explained. It is mainly theoretical passage and it serves as an introduction. It is necessary for understanding the second part which is mainly practical. The appropriate system is chosen as a first thing in the practical part of the thesis for the implementation of the whole project. There are defined criteria on which the system itself is implemented. Following that the system itself is implemented under a framework called openMUC and it is tested with help of the simulators according to the objective of the thesis.
Automated cyber security tester for smart devices in industry
Dávidík, Roland ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This diploma thesis explains the principle of SCADA systems and describes the DLMS/COSEM protocol. In the next part, it shortly describes the Modbus protocol and details the pros and cons of the Modbus protocol in comparison with the DLMS/COSEM protocol. In the next part, an open-source automated scanner was created. This scanner detects devices in a laboratory network. As the next step, the automated scanner finds out open ports and active services, which run on these devices, and tries to attack HTTP, SSH, and Telnet services. Next, the program checks, whether the found device is a smart-meter device and if it is compatible with DLMS/COSEM protocol. If yes, it checks, if the service is vulnerable to DOS attack and breaker disconnection. Scanner’s findings are presented in a newly created web application. NMAP, Masscan, and Metasploit open-source programs are used in the automated scanner. The whole automated scanner is optimized for the HW device Raspberry Pi with the operating system Raspbian Buster Lite installed. This work also describes the testing of the scanner on the laboratory environment and the results are evaluated afterwards.
Application for Statistical Analysis of ICS Communication
Chimenti, Andrea ; Bartík, Vladimír (referee) ; Burgetová, Ivana (advisor)
This work aims to present the design and implementation of an application for statistical analysis of network traffic in ICS (Industrial Control Systems) communication. In the first place, the work presents Industrial Control Systems and some of their most common protocols. The protocol IEC 104 is described in more detail. This is followed by an introduction to the basic methods of descriptive statistics, that can be used to analyze industrial communication. For this purpose, several CSV datasets, that capture fragments of industrial communication, have been used. These datasets are used to show how some of the previously described statistical methods can be used. The work then describes the implementation of an application, which allows to analyze the datasets and obtain various statistics and a visual representation of the data. The main objective of the application is to make it easier for the user to find stable characteristics that can be used for anomaly and attack detection. Finally, the benefits that the application brings are demonstrated on a set of datasets containing different types of attacks.
Cyber security testing in an environment of operational technology
Kuna, Erik ; Pospíšil, Ondřej (referee) ; Paučo, Daniel (advisor)
The topic of this work is security testing in connection with operational technology networks. The theoretical part covers description of operational technology, analysis of the current state of security in such networks and the methodology for penetration testing in this context. A section is devoted to protocols relating to said networks, comprising their characteristics, comparison of the same and related advantages and disadvantages. The theoretical part aids comprehension of the practical section, which details design and implementation of a suitable environment for testing and performing security in ICS/SCADA. Therein, emphasis is placed on security issues that pertain to the ModBus protocol.
Automated cyber security tester for smart devices in industry
Dávidík, Roland ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This diploma thesis explains the principle of SCADA systems and describes the DLMS/COSEM protocol. In the next part, it shortly describes the Modbus protocol and details the pros and cons of the Modbus protocol in comparison with the DLMS/COSEM protocol. In the next part, an open-source automated scanner was created. This scanner detects devices in a laboratory network. As the next step, the automated scanner finds out open ports and active services, which run on these devices, and tries to attack HTTP, SSH, and Telnet services. Next, the program checks, whether the found device is a smart-meter device and if it is compatible with DLMS/COSEM protocol. If yes, it checks, if the service is vulnerable to DOS attack and breaker disconnection. Scanner’s findings are presented in a newly created web application. NMAP, Masscan, and Metasploit open-source programs are used in the automated scanner. The whole automated scanner is optimized for the HW device Raspberry Pi with the operating system Raspbian Buster Lite installed. This work also describes the testing of the scanner on the laboratory environment and the results are evaluated afterwards.
Design of interconnections and program modules for robotic cell control for parts creation
Fursov, Ihor ; Vetiška, Jan (referee) ; Bradáč, František (advisor)
This diploma thesis describes design of interconnections and program modules for robotic cell control for parts creation. Research of this work is focused on industrial comunication protocols. The next part analyzes separate parts of the cell and their ways of connection. Futhermore, control structures of the cell are proposed and after comparison of them SCADA system structure was chosen. Project of connecting separate devices is done in Wonderware Systém Platform. The next step describes procedure of interconection of parts of the cell with each other. Then was designed visualization to operate robotic cell and to illustrate its state. Whole visualization was created using Wonderware InTouch program. In conclusion thesis is reviewed.

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.