94103
Attack | Attacker Type | |||
---|---|---|---|---|
Internal | External | |||
On-Path | Off-Path | On-Path | Off-Path | |
Delay Attack | + | + | ||
DetNet Flow Modification or Spoofing | + | + | ||
Inter-segment Attack | + | + | + | + |
Replication: Increased Attack Surface | + | + | + | + |
Replication-Related Header Manipulation | + | |||
Path Manipulation | + | + | ||
Path Choice: Increased Attack Surface | + | + | + | + |
Control or Signaling Packet Modification | + | |||
Control or Signaling Packet Injection | + | + | ||
Reconnaissance | + | + | ||
Attacks on Time-Synchronization Mechanisms | + | + | + | + |
PRO A | Util | Bldg | Wireless | Cell | M2M Data | M2M Ctrl | |
---|---|---|---|---|---|---|---|
Criticality | Med | Hi | Low | Med | Med | Med | Med |
Effects | |||||||
Financial | Med | Hi | Med | Med | Low | Med | Med |
Health/Safety | Med | Hi | Hi | Med | Med | Med | Med |
Affects 1 org | Hi | Hi | Med | Hi | Med | Med | Med |
Affects >1 org | Med | Hi | Low | Med | Med | Med | Med |
Recovery | |||||||
Recov Time Obj | Med | Hi | Med | Hi | Hi | Hi | Hi |
Recov Point Obj | Med | Hi | Low | Med | Low | Hi | Hi |
DetNet Dependence | |||||||
Time Dependence | Hi | Hi | Low | Hi | Med | Low | Hi |
Latency/Jitter | Hi | Hi | Med | Med | Low | Low | Hi |
Data Integrity | Hi | Hi | Med | Hi | Low | Hi | Hi |
Src Node Integ | Hi | Hi | Med | Hi | Med | Hi | Hi |
Availability | Hi | Hi | Med | Hi | Low | Hi | Hi |
Attack | Impact | Mitigations |
---|---|---|
Delay Attack |
|
|
Reconnaissance |
|
|
DetNet Flow Modification or Spoofing |
|
|
Inter-segment Attack |
|
|
Replication: Increased Attack Resource |
|
|
Replication-Related Header Manipulation |
|
|
Path Manipulation |
|
|
Path Choice: Increased Attack Surface |
|
|
Control or Signaling Packet Modification |
|
|
Control or Signaling Packet Injection |
|
|
Attacks on Time-Synchronization Mechanisms |
|
|
Attack | |
---|---|
1 | Delay Attack |
2 | DetNet Flow Modification or Spoofing |
3 | Inter-segment Attack |
4 | Replication: Increased Attack Surface |
5 | Replication-Related Header Manipulation |
6 | Path Manipulation |
7 | Path Choice: Increased Attack Surface |
8 | Control or Signaling Packet Modification |
9 | Control or Signaling Packet Injection |
10 | Reconnaissance |
11 | Attacks on Time-Synchronization Mechanisms |
Theme | Attack | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | |
Network Layer - AVB/TSN Eth. | + | + | + | + | + | + | + | + | + | + | + |
Central Administration | + | + | + | + | + | + | |||||
Hot Swap | + | + | + | ||||||||
Data Flow Information Models | |||||||||||
L2 and L3 Integration | |||||||||||
End-to-End Delivery | + | + | + | + | + | + | + | + | + | ||
Proprietary Deterministic Ethernet Networks | + | + | + | + | + | ||||||
Replacement for Proprietary Fieldbuses | + | ||||||||||
Deterministic vs. Best-Effort Traffic | + | + | + | + | + | + | |||||
Deterministic Flows | + | + | + | + | + | + | |||||
Unused Reserved Bandwidth | + | + | + | + | |||||||
Interoperability | |||||||||||
Cost Reductions | |||||||||||
Insufficiently Secure Components | |||||||||||
DetNet Network Size | + | + | + | + | |||||||
Multiple Hops | + | + | + | + | + | ||||||
Level of Service | + | + | + | ||||||||
Bounded Latency | + | + | |||||||||
Low Latency | + | + | + | + | |||||||
Bounded Jitter | + | ||||||||||
Symmetric Path Delays | + | + | |||||||||
Reliability and Availability | + | + | + | + | + | + | + | + | + | + | + |
Redundant Paths | + | + | + | + | |||||||
Security Measures |
01748
7037
Newport, NP10 8FZ
91977
07920
Postfach 330440
94103