학술논문

Using KNX-Based Building Automation and Control Systems for Data Exfiltration
Document Type
Periodical
Source
IEEE Internet of Things Journal IEEE Internet Things J. Internet of Things Journal, IEEE. 10(15):13727-13741 Aug, 2023
Subject
Computing and Processing
Communication, Networking and Broadcast Technologies
Computers
Security
Acoustics
Optical sensors
Control systems
Optical transmitters
Meters
Air gap
building automation and control system (BACS)
BACSs
covert channel
exfiltration
KNX
safety
security
Language
ISSN
2327-4662
2372-2541
Abstract
When it comes to protecting confidential and/or sensitive information, organizations have a plethora of recommendations, standards, policies, and security controls at their disposal, conceived to deal with a wide variety of threats. However, most of them share the same fundamental premise: that weaknesses are inline by nature, as a consequence of infrastructure, social and/or technological gaps that can be detected, controlled, mitigated or constrained. Side channel threats are a different matter, though. Stemming from unconventional intrusion or attack vectors whose existence was inconceivable, unexpected or deemed unfeasible, their successful exploitation may provide attackers with the means to bypass and render most security controls ineffective or even useless. In this article, we address one such case: the use of a KNX-based building automation and control system to exfiltrate data from an air-gapped infrastructure. The introduction of a small device provides connectivity to the existing KNX fieldbus and enables sending data through it or even control other devices, with no interference in the operation of the building automation and control network. We validated the feasibility of this approach by means of an experimental setup, which was used to successfully evaluate two different techniques: 1) inline bus exfiltration and 2) optical transmission, via dimmer control. Finally, some measures for detecting and mitigating this type of attacks are proposed.