Pre-print NFV-driven intrusion detection for smart manufacturing Daniel Behnke * , Marcel M¨ uller * , Patrick-Benjamin B¨ ok * , Stefan Schneider , Manuel Peuster , Holger Karl , Alberto Rocha , Miguel Mesquita , and Jos´ e Bonnet * Weidm¨ uller Group: {daniel.behnke, marcel.mueller, patrick-benjamin.boek}@weidmueller.com Paderborn University: stefan.schneider@upb.de, manuel.peuster@upb.de, holger.karl@upb.de Altice Labs: {alberto.rocha, miguel.mesquita, jose.bonnet}@alticelabs.com Abstract—The significant progress in softwarization of hard- ware components with technologies like Network Function Vir- tualization (NFV) enables manifold applications for the industry, especially for smart manufacturing. The gained agility and flexibility leverages data gathering and analysis. In this work, we focus on a very important precondition for networked manufac- turing: cyber security. We provide concepts and a first proof-of- work for an cloud-native NFV-driven Intrusion Detection System using Kubernetes, stating challenges we solved during the process and the used software tools. Focusing on traffic monitoring and filtering to enable certain guidelines to ensure the integrity of the factory network by an automatic reconfiguration of the Network Services. I. I NTRODUCTION The ongoing trend of increasing digitalization in manu- facturing leverages automation, facilitates to gather data and analyze the data to optimize the manufacturing processes. Key enablers in terms of enhanced commnication systems are 5G and Network Function Virtualization (NFV) [1]. With NFV, smart manufacturing scenarios can be softwarized and implemented as flexible network services consisting of inter- connected virtual network functions (VNFs), which can run on commodity servers. In recent years, first research has been started on 5G and especially NFV usage in manufacturing. Existing work focuses on the potential benefits and architecture concepts [2], [3]. Now, testbeds and first experiments are the obvious continua- tion. Besides proofing the usability of NFV-technology for smart manufacturing, common challenges experienced by all com- panies which drives digitalization have to be addressed. An important challenge is cyber security, saving data and data transmissions to avoid loss of data and prevent potential attacks on the manufacturing. The Federal Office for Infor- mation Security in Germany listed in [4] manifold threats like malware or hacking attacks for companies. One solution to detect ongoing attacks and react to them accordingly are Intru- sion Detection Systems (IDS), which have gained significant attention of researchers in recent years. In [5], the authors present a multi-agent approach for hybrid intrusion detection in industrial networks. They create network analysis agents using Zeek 1 on Raspberry Pi which indicates that this approach 1 https://www.zeek.org/ 2 4 3 1 NS2 Cloud Shadow Fig. 1: A softwarized IDS detects a potential threat, NFV technology facilitates to isolate the machine and to re-route the data. is based on additional hardware. In [6], the authors propose an IEC 61499 Service Interface Function Blocks (SIFB) based Network Intrusion Detection and Prevention System (IDPS) solution to protect programmable logic controllers (PLCs), where the security functions are provided through SIFB exe- cuting Snort 2 . Leveraging the experience of Weidm¨ uller Group 3 , a large- scale manufacturer, we previously designed an NFV-based ar- chitecture for smart manufacturing with multiple use cases [7], [8]. This work is done in the framework of the Horizon2020 research project 5GTANGO. The system architecture consist- ing of a verification & validation platform, an SDK, and a service platform for the management and orchestration of all Network Services is introduced in [9]. We demonstrated the scalability of our architecture by emu- lating several interconnected and globally distributed factories that use our developed network services simultaneously [10]. The work has shown how NFV might be used in manufac- turing in general. The focus of this work is on the specific use case of intrusion detection. IT security, and here especially cyber security, is a major concern of companies connecting 2 https://www.snort.org/ 3 https://www.weidmueller.com This work has been accepted for publication in 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). Copyright © 2019 by IEEE. © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, including reprinting/republishing this material for advertising or promotional purposes, collecting new collected works for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.