What is a criminally underrated snack

Protection for ports from attacks from the network

Blueprint for other ports

This includes, among other things, supporting the various security requirements of work processes, protecting them from sabotage and preventing third parties from spying on sensitive data. If, despite all precautionary measures, an attacker manages to break into the digital communications network of a port, the new IT security architecture should at least minimize the effects on other actors. It should then be possible to return the affected network to its normal state in a controlled manner. "When we have developed an understanding of the overall process, we will know what specific protection needs result from it," says Professor Dr. Dieter Hutter from the Cyber-Physical Systems research division at DFKI. A more intensive examination of interfaces, an exclusion of certain file types from the system or a definition of which actor is allowed to work with which information and when, are conceivable.

The end result should be a model that works as a blueprint in other ports as well. "In it we will name security mechanisms that are required to adhere to the security policy that has been developed," said Hutter. For the companies this is a concrete added value, because they are better protected against cyber attacks. This could prevent an attack like the one on the Maersk shipping company in the future.

Press contact:

Prof. Dr. Dieter Hutter, German Research Center for Artificial Intelligence (DFKI), research area Cyber-Physical Systems, phone: +49 (0) 421 - 218 59 83 1, email: [email protected]

Prof. Dr. Thomas Kemmerich, University of Bremen, Computer Architecture Working Group, phone: +49 421 218 63 94 0, email: [email protected]

Dr. Karsten Sohr, Technology Center for Computer Science and Information Technology (TZI) at the University of Bremen, phone: +49 421 218 63 92 2, email: [email protected]


The image material is free to reprint for topic-related reporting and with the quotation of the respective picture credits.

Photo 1: All actors involved in container transport are networked with one another in a complex port communication network. The aim of the Bremen project "SecProPort" is to understand the entire handling process in the port and to make it safer and more robust. © WFB Jens Lehmkühler

Photo 2: "The game is unfair: the attacker only needs a gap, the defender has to find every gap," says Karsten Sohr from the TZI. © pixabay

The press service from the state of Bremen has been reporting monthly on people and stories from the state of Bremen with supraregional relevance published by the WFB Wirtschaftsförderung Bremen GmbH since July 2008. The press service from the state of Bremen works in a similar way to a correspondent's office. The articles are not advertising or PR texts, but authors' pieces written by journalists for journalists.

If you have any questions, just write an email to [email protected]