Abstract
This master’s thesis investigates which intrusion detection systems (IDS) are capable ofdetecting realistic attack techniques within a given operational technology (OT) environment.
The research was conducted in cooperation with the Austrian Institute of Technology
GmbH, which developed and provided a realistic testbed environment. Several intrusion detection systems (IDS) were integrated into this environment. In collaboration
with Deutsche Telekom Cyber Security Austria GmbH, the proprietary IDS solutions
„CrowdStrike“ and „Dragos“ were integrated. Additionally, the open-source IDS „Suricata“ and „Wazuh“ were utilized.
An attack was developed and executed within the provided OT environment, based
on researched attack scenarios and techniques commonly used in OT environments, as
well as current trends in adversarial behavior. The used attack scenarios and techniques
were considered to be feasible within the given environment. They were also considered
to be executable within a realistic timeframe, and applicable under realistic conditions.
The goal of the attack is to compromise the OT infrastructure and put the industrial
process into an insecure state in various ways.
The IDS detections triggered by the used attack techniques during execution of the
developed attack were documented. A subsequent analysis evaluated the general detectability of these attack techniques based on associated data sources and considering
both signature- and anomaly-based detection approaches. Additionally, it was analyzed
how the attack techniques were actually detected by the IDS. The triggered detections
were evaluated for relevance, with particular attention given to those capable of identifying behavior that is likely to be non-legitimate. These were considered meaningful.
Based on the results of the analysis, a conclusion was drawn. In the conclusion, the
effectiveness of each IDS was evaluated according to the detections considered as meaningful.
The master’s thesis provides an overview of attack scenarios and techniques in OT
environments. It highlights existing approaches to detecting such scenarios and techniques, and examines the challenges involved. The work contributes to the evaluation
of the effectiveness of different IDS in OT environments and supports the selection of
security solutions for the OT area.
| Date of Award | 2025 |
|---|---|
| Original language | German (Austria) |
| Supervisor | Robert Kolmhofer (Supervisor) |
Studyprogram
- Secure Information Systems