Berardi, Davide
(2022)
Security enhancements and flaws of emerging communication technologies, [Dissertation thesis], Alma Mater Studiorum Università di Bologna.
Dottorato di ricerca in
Computer science and engineering, 34 Ciclo. DOI 10.48676/unibo/amsdottorato/10355.
Documenti full-text disponibili:
Abstract
The multi-faced evolution of network technologies ranges from big data centers to specialized network infrastructures and protocols for mission-critical operations. For instance, technologies such
as Software Defined Networking (SDN) revolutionized the world of static configuration of the network - i.e., by removing the distributed and proprietary configuration of the switched networks -
centralizing the control plane. While this disruptive approach is interesting from different points of
view, it can introduce new unforeseen vulnerabilities classes. One topic of particular interest in the
last years is industrial network security, an interest which started to rise in 2016 with the introduction of the Industry 4.0 (I4.0) movement. Networks that were basically isolated by design are now
connected to the internet to collect, archive, and analyze data. While this approach got a lot of momentum due to the predictive maintenance capabilities, these network technologies can be exploited
in various ways from a cybersecurity perspective. Some of these technologies lack security measures
and can introduce new families of vulnerabilities. On the other side, these networks can be used
to enable accurate monitoring, formal verification, or defenses that were not practical before. This
thesis explores these two fields: by introducing monitoring, protections, and detection mechanisms
where the new network technologies make it feasible; and by demonstrating attacks on practical
scenarios related to emerging network infrastructures not protected sufficiently. The goal of this
thesis is to highlight this lack of protection in terms of attacks on and possible defenses enabled
by emerging technologies. We will pursue this goal by analyzing the aforementioned technologies
and by presenting three years of contribution to this field. In conclusion, we will recapitulate the
research questions and give answers to them.
Abstract
The multi-faced evolution of network technologies ranges from big data centers to specialized network infrastructures and protocols for mission-critical operations. For instance, technologies such
as Software Defined Networking (SDN) revolutionized the world of static configuration of the network - i.e., by removing the distributed and proprietary configuration of the switched networks -
centralizing the control plane. While this disruptive approach is interesting from different points of
view, it can introduce new unforeseen vulnerabilities classes. One topic of particular interest in the
last years is industrial network security, an interest which started to rise in 2016 with the introduction of the Industry 4.0 (I4.0) movement. Networks that were basically isolated by design are now
connected to the internet to collect, archive, and analyze data. While this approach got a lot of momentum due to the predictive maintenance capabilities, these network technologies can be exploited
in various ways from a cybersecurity perspective. Some of these technologies lack security measures
and can introduce new families of vulnerabilities. On the other side, these networks can be used
to enable accurate monitoring, formal verification, or defenses that were not practical before. This
thesis explores these two fields: by introducing monitoring, protections, and detection mechanisms
where the new network technologies make it feasible; and by demonstrating attacks on practical
scenarios related to emerging network infrastructures not protected sufficiently. The goal of this
thesis is to highlight this lack of protection in terms of attacks on and possible defenses enabled
by emerging technologies. We will pursue this goal by analyzing the aforementioned technologies
and by presenting three years of contribution to this field. In conclusion, we will recapitulate the
research questions and give answers to them.
Tipologia del documento
Tesi di dottorato
Autore
Berardi, Davide
Supervisore
Co-supervisore
Dottorato di ricerca
Ciclo
34
Coordinatore
Settore disciplinare
Settore concorsuale
Parole chiave
security, network, programmable networks, hacking, cyber attacks, industrial IoT
URN:NBN
DOI
10.48676/unibo/amsdottorato/10355
Data di discussione
23 Giugno 2022
URI
Altri metadati
Tipologia del documento
Tesi di dottorato
Autore
Berardi, Davide
Supervisore
Co-supervisore
Dottorato di ricerca
Ciclo
34
Coordinatore
Settore disciplinare
Settore concorsuale
Parole chiave
security, network, programmable networks, hacking, cyber attacks, industrial IoT
URN:NBN
DOI
10.48676/unibo/amsdottorato/10355
Data di discussione
23 Giugno 2022
URI
Statistica sui download
Gestione del documento: