PLC FORENSICS BASED ON CONTROL PROGRAM LOGIC CHANGEDETECTION WORKS
|
|
|
- Willis Farmer
- 9 years ago
- Views:
Transcription
1 PLC Forensics Based on Control Program Logic Change JDFSL V10N4 PLC FORENSICS BASED ON CONTROL PROGRAM LOGIC CHANGEDETECTION WORKS Ken Yau and Kam-Pui Chow University of Hong Kong, Hong Kong, China ABSTRACT Supervisory Control and Data Acquisition (SCADA) system is an industrial control automated system. It is built with multiple Programmable Logic Controllers (PLCs). PLC is a special form of microprocessor-based controller with proprietary operating system. Due to the unique architecture of PLC, traditional digital forensic tools are difficult to be applied. In this paper, we propose a program called Control Program Logic Change Detector (CPLCD), which works with a set of Detection Rules (DRs) to detect and record undesired incidents on interfering normal operations of PLC. In order to prove the feasibility of our solution, we set up two experiments for detecting two common PLC attacks. Moreover, we illustrate how CPLCD and network analyzer Wireshark could work together for performing digital forensic investigation on PLC. Keywords: PLC Forensics, SCADA Security, Ladder Logic Programming INTRODUCTION Digital forensics plays an important role for incident investigations on digital devices, for example, personal computer, smart-phone, digital camera, and flash drive. Standard guidelines and procedures are provided to implement the digital forensic processes: identification, collection, analysis and reporting [11]. According to the collected evidence, investigators can re-construct the incident and present to a court if crime is involved. In addition, the evidence can be used to trace what causes the incidents in order to avoid the same incident happening again in the future [2]. A programmable logic controller (PLC) is a special form of microprocessor-based controller. It uses a programmable memory to store instructions and to implement functions such as logic, sequencing, timing, counting and arithmetic in order to control machines and processes [1]. Lighting Control system is one example of PLC applications. It is used to turn lights on automatically when the area becomes occupied and off when it becomes unoccupied. A simple automation control system can be monitored and controlled by a single PLC. However, a complex and larger automation control system called Supervisory Control and Data Acquisition (SCADA) system, needs to be built with multiple PLCs. SCADA system is an automation system widely used to monitor and control industrial processes such as electric power generation, public transportation, chemical plants, water management and so on. If any undesired incidents occur on the SCADA systems, substantial risk to the health and safety of human lives, serious damage to the environment, as well as serious financial 2015 ADFSL Page 59
2 JDFSL V10N4 PLC Forensics Based on Control Program Logic Change issues such as production losses, negative impact to a nation s economy, and compromise of proprietary information [2]. SCADA systems are always built with proprietary technologies and communication protocols. For example, PLC manufacturers provide its proprietary operating systems to their products. Due to the uniqueness of SCADA system, there are several challenges when performing digital forensic processes on these systems. Those challenges will be discussed in Section 4. In this paper, we propose a solution to detect and record abnormal operations of PLC based on the control program logic change in PLC. The abnormal operations are stored in the format of a log file which could help SCADA forensic investigation. SECURITY ISSUES OF PLC An automation control system can be setup by connecting a PLC with Input and Output devices. Input devices might be switches, temperature sensors, flow sensors, etc. Output devices might be motors, solenoid valves, etc. Besides hardware installation, the PLC has to be programmed in order to monitor the inputs and control the outputs based on a set of control rules. Each PLC manufacturer has its own software for programming their PLCs. For example, PLCs of Siemens Simatic S7 series are programmed, configured, and managed using software STEP 7. Nowadays, many PLCs have evolved to utilize common networking standard such as Ethernet (IEEE 802.3) and Wi-Fi (IEEE ) for communication among the connected devices [3]. Therefore, cyber-attacks on SCADA systems become one of the important security issues after the systems have been exposed to the Internet. ATTACKS ON PLCS There are various kinds of attacks on PLCs. One of the famous attacks is STUXNET, a malware to infect Simatic programming device (i.e., PC running Step 7 on Windows). The malware was used to reprogram the PLCs by inserting its own blocks of code, and replacing or infecting existing blocks [6]. According to the paper Exploiting Siemens Simatic S7 PLCs [3], Dillon Beresford mentioned that the network protocols designed for communication among field devices in control systems were intended to be open and reliable, but not secure in past. International Standards Organization Transport Service Access Point (ISO-TSAP RFC 1006) is one of the not secure network protocols. Dillon Beresford demonstrated several attacks on Siemens Simatic S7 PLCs during the presentation at Black Hat 2011 Conference. The attacks were 1) TCP Replay over ISO- TSAP Attack; 2) S7 Authentication Bypass; 3) CPU Stop and Start Attack; 4) Memory Read and Write Logic Attack; 5) Decrypting Siemens Simatic firmware; 6) Getting a Shell on the PLC. The exploits demonstrated by Beresford were using PROFINET and communicating across TCP/IP port 102 (ISO- TSAP). PROFINET is a standard for Industrial Ethernet based on Industrial Ethernet and support the following three protocols [9]: 1. TCP/IP with reaction times in the range of 100 ms 2. RT (real-time) protocol with 10 ms cycle times 3. IRT (Isochronous Real-Time) with cycles times of less than 1 ms Data is transmitted in plain text over TCP/IP port 102 (ISO-TSAP). Therefore, if attackers record the network traffic, they could easily extract data such as user names, Page ADFSL
3 PLC Forensics Based on Control Program Logic Change JDFSL V10N4 passwords, commands, negotiated sessions, logic, etc. Any of these variables could lead a PLC to be compromised. DIGITAL FORENSICS CHALLENGES ON SCADA SYSTEMS Cyber forensics can be challenging when being applied to non-traditional environments like SCADA systems. The systems are not comprised of current information technologies and not designed with technologies to provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environment is designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized [11]. Due to the complexity of SCADA systems, evidence is difficult or impossible to be extracted and collected by using traditional digital forensics for investigation. One of the challenges is that the operations of SCADA systems must be kept running, therefore, investigators cannot shut down the system to perform data acquisition [2]. In such situation, live forensics is the possible way to perform data acquisition. However, performing live forensics on SCADA systems might affect its normal operations. The second challenge is that many SCADA systems use proprietary and legacy software, hardware and communication protocols. Therefore, traditional digital forensic tools might not be able to apply to the systems. Furthermore, SCADA forensics is lack of event logs for investigation Figure 1. LAD Diagram of a Control Program LADDER LOGIC PROGRAMMING PLC is designed to be operated by engineers. The engineers are good at electrical circuit design but might have limited knowledge of computer programming. Meanwhile, different kinds of automation control systems need different kinds of PLC control programs. Therefore, Ladder Logic (LAD) is the most common programming Language for PLC because the programming language looks like a simple wiring diagram for an electrical circuit [1]. A LAD diagram in Figure 1 consists of a set of ladder rungs and each rung has a set of input instructions and output instructions [1]. The ladder diagram has two vertical rails. The left vertical rail supplies power to all the horizontal rungs of the ladder. Each rung on the ladder defines one operation in the control process. A LAD diagram is read from top to bottom and left to right. Each rung must start with an input or inputs and must end with at least one 2015 ADFSL Page 61
4 JDFSL V10N4 PLC Forensics Based on Control Program Logic Change output. The input is used for a control action, such as closing the contact of a switch. The output is used for a device connected to the output of a PLC such as a motor or a valve. In Figure 1, Rung No. 1 can be interpreted as if Input I0.0 (Switch) is ON, then the Output Q0.0 (Motor) is ON. Likewise if I0.0 is OFF, then Q0.0 is OFF. Rung No. 2 is that if either Input I0.1 or I0.2 is ON, then the Output Q0.1 is ON, otherwise Q0.1 is OFF. Rung No. 3 is that if Input I0.3 is ON, the Output Q0.2 will be ON after 3 seconds delay. The time delay is controlled by the Timer1 (TON: Timer on Delay). PROPOSED SOLUTION FOR PLC FORENSICS BASED ON CONTROL PROGRAM LOGIC CHANGE DETECTION In this paper, we propose a solution to detect two most common attacks on PLC. The first attack is Control Program Attack which reprograms the PLCs, like STUXNET. The second attack is Memory Read and Write Logic Attack which alters values of memory variable of a control program on a running PLC. To detect these attacks, we use a program called Control Program Logic Change Detector (CPLCD) with a set of Detection Rules (DRs). CPLCD is a program developed by using Libnodave. Libnodave is a free library for data exchange between a PC and a Siemens PLC over TCP/IP port 102 (ISO-TSAP) [4]. CPLCD is working on Microsoft Windows environment. It has to work with a set of defined Detection Rules (DRs) for detecting these two PLC attacks. DR is in the form of Boolean expression derived from the LAD control program. Different designs of control programs are converted to different sets of DRs. To define a DR, we have to transform each rung of a Ladder Logic (LAD) diagram into a Boolean Expression according to the way of connection among Inputs, Outputs, memory variables, etc. For example, if Input A connects Input B in series with Output C, then we can formulate a DR as A AND B = C. If Input A connects Input B in parallel, then we can formulate a DR as A OR B = C. The three DRs shown in Table 1 are derived from the three rungs of LAD diagram in Figure 1. If the PLC operations do not follow the instructions of the control program, we assume the PLC might suffer from attacks or PLC failure. Followings are the procedures for detecting the two PLC attacks using CPLCD and DRs. Assume the PLC control program is same as Figure 1. Table 1 Detection Rules Rung No. Detection Rule 1 I0.0 = Q0.0 2 I0.1 OR I0.2 = Q0.1 3 (I0.3 AND Timer1=3) = Q Transform each ladder rung of the LAD Diagram into DRs (see Table 1). 2. Connect CPLCD to PLC via TCP/IP port Run CPLCD to read the memory variables (e.g. I0.0, M0.0, Q0.0, etc.) of control program from the PLC and assign values (TRUE/FALSE/Numbers) of the variables to the DRs. When any one of the values violates the DRs, CPLCD raises alert and logs the event and timestamp in a file for forensic investigation. CPLCD is able to perform real-time PLC attack detection on a running PLC and Page ADFSL
5 PLC Forensics Based on Control Program Logic Change JDFSL V10N4 capture the attack details in a log file for forensic investigation. In order to prove the feasibility of our solution, we set up two experiments for detecting the two attacks. Experiment 1 is for detecting the Control Program Attack and Experiment 2 is for detecting Memory Read and Write Logic Attack. As Siemens is one of the popular PLC manufacturers, we select Siemens Simatic S for our experiments. Experiment 1: Setup and procedures for detecting Control Program Attack To set up this experiment, we used one PLC, one PC and a router. They were connected as diagram shown in Figure 2. The PC was installed with CPLCD for detecting the attack. The procedures for detecting the attack were as follows: Step 1: Designed two control programs. One was the original program in Figure 4 and the other one was altered by an attacker in Figure 5 to create abnormal instructions. The attacker altered the second rung of the original control program from (I0.1 AND M0.1) = Q0.1 to (I0.1 OR M0.1) = Q0.1 Step 2: Defined two Detection Rules (DRs) based on the original control program as follows: DR No. 1: (I0.0 OR M0.0) = Q0.0 DR No. 2: (I0.1 AND M0.1) = Q0.1 Step 3: Loaded the altered control program with initial memory values, M0.1=False and Input I0.1=True into the Siemens Simatic S PLC by Siemens programming software STEP 7 and started running the PLC. Step 4: Started the CPLCD program with the defined DRs to monitor memory variables of the control program in the PLC and check any DR was violated by the values of the variables. Step 5: An alert was raised, checked error log file of CPLCD as shown in Figure 3. Experiment 1: Result According to the error log captured by CPLCD in Figure 3, an alert was raised and logged on 27/6/2015, 11:02:43 PM because the values of I0.1, M0.1 and Q0.1 violated DR No. 2. Under normal operation of DR No. 2, Q0.1=True only if both I0.1 and M0.1=True at the same time, otherwise, Q0.1=False. However, CPLCD detected that I0.1=True, M0.1=False and Q0.1=False which violated DR No. 2. Experiment 2: Setup and procedures for detecting Memory Read and Write Logic Attack This experiment setup was same as Experiment 1 but one more PC was added as shown in Figure 7. The PC installed with Snap7 acting as an Attacker to perform Memory Read and Write Logic Attack. We used Snap7 to alter the PLC s memory data. Snap7 is not a PLC attacking tool, it is an open source, 32/64 bit, multi-platform Ethernet communication suite for interfacing natively with Siemens S7 PLCs [7] ADFSL Page 63
6 JDFSL V10N4 PLC Forensics Based on Control Program Logic Change Figure 2.Setup of Experiment 1 Figure 3. Result of Experiment 1 Figure 4. Original Control Program Figure 5. Altered Control Program The procedures for detecting the attack were as follows: Step 1: Designed a control program (Figure 6) and load the control program into the PLC. Set initial value of Input I0.0, I0.1, I0.2, I0.3 and I0.4 to False so that Output Q0.0 and Q0.1 were False, and then started running the PLC. Step 2: Defined two Detection Rules (DRs) according to the control program as follows: DR No. 1: (I0.0 OR I0.1) = Q0.0 DR No. 2: (I0.2 AND I0.3 AND I0.4) = Q0.1 Step 3: Started the CPLCD program with the defined DRs to monitor memory variables of the PLC control program and check any DR was violated by the values of the variables. Step 4: Used Snap7 to alter the PLC s memory Output Q0.0 and Q0.1 to True from False. Step 5: An alert was raised, checked error log file of CPLCD as shown in Figure 8. Figure 6. Control Program Page ADFSL
7 PLC Forensics Based on Control Program Logic Change JDFSL V10N4 Figure 7. Setup of Experiment 2 Figure 8. Result of Experiment 2 Experiment 2: Result According to the error log captured by CPLCD in Figure 8, DR No. 1 and DR No. 2 were violated on 28/6/2015 9:07:40 AM because of the action in Step 4. DR No. 1 was violated by the value Q0.0=True and DR No. 2 was violated by the value Q0.1=True. DISCUSSION Based on the defined Detection Rules (DRs), Control Program Logic Change Detector (CPLCD) was able to detect the Control Program Attack and Memory Read and Write Logic Attack. However, it is difficult or impossible to define the entire DRs from a complicated LAD diagram which has a lot of rungs and to monitor all the memory variables. To address this issue, we propose to select important rungs for monitoring instead of all the rungs. Different control systems have different important rules. In general, a rung used to stop control system under dangerous condition should be important. CPLCD can detect Memory Read and Write Logic Attack, however, it cannot provide sufficient information for forensic investigation. CPLCD does not capture information about how and who changes the PLC memory which induced the abnormal PLC operations. In order to supplement more information for forensic investigation, we recommend CPLCD to work with network packet analyzer Wireshark. Wireshark supports PROFINET to record and analyze the Ethernet message frames. It can be used to dissect the ISO on TCP-packets for communication to Siemens S7 PLCs after adding Wireshark dissector plugin for S7 communication. S7 Protocol is Function oriented or Command oriented, i.e. each transmission contains a command or a reply. It is the backbone of the Siemens communications, its Ethernet implementation relies on ISO-on-TCP (RFC1006) which is Block oriented by design [8]. Each block is named S7 PDU (Protocol Data Unit). Each command (S7 Telegram) consists of a header, a set of parameters (Params), a parameters data (Pardata) and a data block (Data) as shown in Figure 8. The 2015 ADFSL Page 65
8 JDFSL V10N4 PLC Forensics Based on Control Program Logic Change first two elements are always present, the other two are optional. If a S7 Telegram consists of Header="Write", Params="DB, 10", Pardata="4" and Data="data", it can be interpreted as "Write 'data' into Data Block 10 starting from the offset 4" [8]. S7 Protocol, ISO TCP and TCP/IP follow the well-known encapsulation rule, shown in Figure 8 [8]. According to the S7 Protocols specifications and the well-known encapsulation rule, forensic investigator is able to construct useful information from the TCP/IP data packets for investigation. Following is a case to illustrate how CPLCD and Wireshark work together for forensic investigation on cyber-attack to a PLC. A PLC controls a motor (Q0.0) by two switches (I0.0 and I0.1). The motor is ON only when the two switches are ON, otherwise it is OFF. Therefore, the DR is I0.0 AND I0.1 = Q0.0. Assuming an attacker tries to turn on the motor by altering Output Q0.0 from FALSE to TRUE when both input switches are OFF (FALSE). Before Attack: The switches are OFF and the Motor is OFF. The DR is FALSE AND FALSE = FALSE. After Attack: The switches are OFF but the Motor is ON. The DR FALSE AND FALSE = TRUE is violated. Since the DR is violated after the attack, CPLCD raises an alert and logs the variable names/values and timestamp on a file. A forensic investigator can use the timestamp to filter out the relevant packets from the file captured by Wireshark. Based on the analysis of those network packets, the investigator can trace what and how the S7 commands were executed to attack the PLC. Besides, we might be able to reveal the IP address of the attacker in this way. Figure 8. S7 Protocols Source: Snap7 Reference manual [8] CONCLUSION AND FUTURE WORK PLC is one of the important components in SCADA systems but lack of security control and hard to perform digital forensics on it. It is facing many cyber-attacks after exposing SCADA systems to Internet dramatically in recent years. Siemens is aware of the security Figure 3 S7 Protocols issues and provides warning on Simatic S7- Source: Snap7 Reference 1200 manual Manual [8] "If an attacker can physically access your networks, the attacker can possibly read and write data" [12]. Digital Forensics is an essential part of cyber defense and becomes relevant when there is a security breach [10]. However, there are insufficient forensic tools and procedures to perform digital forensics on PLC. To help Page ADFSL
9 PLC Forensics Based on Control Program Logic Change JDFSL V10N4 overcome challenges on PLC protection and forensic investigation, in this paper, we introduced how Control Program Logic Change Detector (CPLCD) and Detection Rules (DRs) can be used to detect Control Program Attack and Memory Read and Write Logic Attack. In addition, we illustrated how CPLCD work with Wireshark dissector for S7 communication to perform forensic investigation on S7 PLCs. In future, we will apply CPLCD to various types and brands of PLCs for testing of performance, accuracy and feasibility. Furthermore, we will expand our testing to a simulated control system application such as elevator, traffic light, robotic arm, etc ADFSL Page 67
10 JDFSL V10N4 PLC Forensics Based on Control Program Logic Change REFERENCES W. Bolton, Programmable Logic Controllers (4th Edition) Irfan Ahmed, Sebastian Obermeier and Martin Naedele, Golen G. Richard III: SCADA System: Challenges for Forensics Investigations, IEEE Computer, Vol. 45 No. 12, December 2012, pp 44 51, USA. Dillon Beresford, Exploiting Siemens Simatic S7 PLCs, Black Hat USA+2011, July 8, 2011 Alex Sentcha, LibNoDave exchange data with Siemens PLC, Last accessed on 31 May 2015 R.M. van der Knijff, Control systems/scada forensics, what's the difference?, Digital Investigation 11 (2014) Nicolas Falliere, Liam O Murchu, and Eric Chien: W32.Stuxnet Dossier, Version 1.4, Symantec Corporation, February 2011 Davide Nardella, Snap7 Last accessed on 13, June 2015 Davide Nardella, Snap7 Reference manual Rev.5, January 1, 2015 PROFINET, Wikipedia IO, Last accessed on 18 June 2015 K. Mandia, C. Prosise and M. Pepe, Incident Response and Computer Forensics, McGraw-Hill/Osborne, Emeryville, California, 2003 Fabro, M: Recommended Practice: Creating Cyber Forensic Plan for Control Systems, Department of Homeland Sec urity (2008), Idaho National Laboratory (INL), August 2008, USA SIEMENS SIMATIC S Easy Book Manual 01/2015 Page ADFSL
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Technical Training Module ( 30 Days)
Annexure - I Technical Training Module ( 30 Days) Section 1 : Programmable Logic Controller (PLC) 1. Introduction to Programmable Logic Controller - A Brief History, Need and advantages of PLC, PLC configuration,
Programming A PLC. Standard Instructions
Programming A PLC STEP 7-Micro/WIN32 is the program software used with the S7-2 PLC to create the PLC operating program. STEP 7 consists of a number of instructions that must be arranged in a logical order
Programming Logic controllers
Programming Logic controllers Programmable Logic Controller (PLC) is a microprocessor based system that uses programmable memory to store instructions and implement functions such as logic, sequencing,
EXPERIMENT 2 TRAFFIC LIGHT CONTROL SYSTEM FOR AN INTERSECTION USING S7-300 PLC
YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 2 TRAFFIC LIGHT CONTROL SYSTEM FOR AN INTERSECTION USING S7-300 PLC Introduction:
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems
2012 45th Hawaii International Conference on System Sciences A Retrofit Network Intrusion Detection System for MODBUS and ASCII Industrial Control Systems Thomas Morris Mississippi State University [email protected]
S7 for Windows S7-300/400
S7 for Windows S7-300/400 A Programming System for the Siemens S7 300 / 400 PLC s IBHsoftec has an efficient and straight-forward programming system for the Simatic S7-300 and ern controller concept can
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Programmable Logic Controllers Definition. Programmable Logic Controllers History
Definition A digitally operated electronic apparatus which uses a programmable memory for the internal storage of instructions for implementing specific functions such as logic, sequencing, timing, counting,
Configuring PROFINET
CHAPTER 9 This chapter describes how to configure the PROFINET feature on the Cisco IE 3000 switch. Understanding PROFINET, page 9-1, page 9-4 Displaying the PROFINET Configuration, page 9-5 Troubleshooting
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06
Wireless Traffic Analysis Kelcey Tietjen DF Written Report 10/03/06 Executive Summary Wireless traffic analysis provides a means for many investigational leads for a forensic examination. It can provide
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
CCNA Exploration: Accessing the WAN Chapter 7 Case Study
Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company
EVALUATING INDUSTRIAL ETHERNET
EVALUATING INDUSTRIAL ETHERNET WHAT IS STANDARD? Written by: Shuo Zhang Networks Marketing Rockwell Automation As industrial automation systems evolve, industrial Ethernet is becoming increasingly popular
Hirschmann Networking Interoperability in a
Automation and Network Solutions Hirschmann Networking Interoperability in a PROFInet Environment Hirschmann Interoperability White Paper Rev. 1.1 Contents Hirschmann Networking Interoperability in a Profinet
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
Programmable Logic Controllers
Programmable Logic Controllers PLC Basics Dr. D. J. Jackson Lecture 2-1 Operating systems and application programs A PLC contains a basic operating system that allows for: Downloading and executing user
Real-time Video Monitoring Increases the Efficiency of SCADA Process Management
Harry Hsiao, Moxa Product Manager ([email protected]) Traditional SCADA (Supervisory Control and Data Acquisition) systems have been an important part of automation control systems for many years, and
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
EXPLORING THE USE OF PLC DEBUGGING TOOLS FOR DIGITAL FORENSIC INVESTIGATIONS ON SCADA SYSTEMS
Exploring the Use of PLC Debugging Tools for Digital Forensic... JDFSL V10N4 EXPLORING THE USE OF PLC DEBUGGING TOOLS FOR DIGITAL FORENSIC INVESTIGATIONS ON SCADA SYSTEMS Tina Wu and Jason R.C. Nurse Cyber
PROFINET IRT: Getting Started with The Siemens CPU 315 PLC
PROFINET IRT: Getting Started with The Siemens CPU 315 PLC AN-674 Application Note This document shows how to demonstrate a working design using the PROFINET isochronous real-time (IRT) device firmware.
DATA COMMUNICATION BETWEEN PROGRAMMABLE LOGIC CONTROLLERS IN THE INDUSTRIAL DISTRIBUTION APPLICATIONS
DATA COMMUNICATION BETWEEN PROGRAMMABLE LOGIC CONTROLLERS IN THE INDUSTRIAL DISTRIBUTION APPLICATIONS Anna BYSTRICANOVA 1, Andrej RYBOVIC 1 1 Department of Mechatronics and Electronics, Faculty of Electrical
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
CYBER SECURITY. Is your Industrial Control System prepared?
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Candle Plant process automation based on ABB 800xA Distributed Control Systems
Candle Plant process automation based on ABB 800xA Distributed Control Systems Yousef Iskandarani and Karina Nohammer Department of Engineering University of Agder Jon Lilletuns vei 9, 4879 Grimstad Norway
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Generic term for using the Ethernet standard in automation / industrial applications
Seite 24 Industrial Ethernet Generic term for using the Ethernet standard in automation / industrial applications Specific Quality of Service requirements Real-time Cycle time (e.g. < 1 ms for motion control
Implementing a Reliable Furnace Monitoring System
Category: Manufacturing Implementing a Reliable Furnace Monitoring System Products Used: RT Series PXI (PXI 1002 And PXI 8156B) LabVIEW Real-Time by V. Arunachalam Sr. Project Engineer Anand Chinnaswamy
Exploiting Siemens Simatic S7 PLCs
Prepared for Black Hat USA+2011 By Dillon Beresford [email protected] July 8, 2011 It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
How to read this guide
How to read this guide The following shows the symbols used in this Quick start guide with descriptions and examples. Symbol Description Example P oint Reference Caution [ ] This symbol explains information
AutoLog ControlMan. Remote Monitoring & Controlling Service
AutoLog 1 AutoLog ControlMan Remote Monitoring & Controlling Service Web browser based HMI / SCADA interface Server is hosted by Internet server hosting company Control units communicate wirelessly via
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Industrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
Analysis of Industrial PROFINET in the Task of Controlling a Dynamic System**
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.65 Maciej Rosó³*, Dawid Knapik*, Dariusz Marchewka*, Krzysztof Ko³ek*, Andrzej Turnau* Analysis of Industrial PROFINET
Keywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
Network Attack Platform
Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
Straton and Zenon for Advantech ADAM-5550. Copalp integrates the straton runtime into the ADAM-5550 device from Advantech
Straton and Zenon for Advantech ADAM-5550 Copalp integrates the straton runtime into the ADAM-5550 device from Advantech Project Introduction: Programmable Application Controllers (PAC) are powerful and
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices
Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager [email protected] The popularity of serial-to-ethernet technology has increased steadily since
Semaphore T BOX Applications in Data Center Facilities
Semaphore T BOX Applications in Data Center Facilities Introduction Data centers must reliably provide 24/7/365 operation. For automation and monitoring of the facility, use of a rugged, reliable RTU is
Industrial Communications Training
Standards Certification Education & Training Publishing Conferences & Exhibits Industrial Communications Training Optimizing the flow and value of real-time data Expert-led training with real-world application
High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN
Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION
The goal is to program the PLC and HMI to count with the following behaviors:
PLC and HMI Counting Lab The goal is to program the PLC and HMI to count with the following behaviors: 1. The counting should be started and stopped from buttons on the HMI 2. The direction of the count
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
CPU 317-2 PN/DP: Configuring an ET. 200S as PROFINET IO device SIMATIC. PROFINET CPU 317-2 PN/DP: Configuring an ET 200S as PROFINET IO device
CPU 317-2 PN/DP: Configuring an ET 200S as PROFINET IO device SIMATIC PROFINET CPU 317-2 PN/DP: Configuring an ET 200S as PROFINET IO device Introduction 1 Preparation 2 Learning units 3 Further Information
Research of PROFIBUS PA s integration in PROFINET IO
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research of PROFIBUS PA s integration in PROFINET IO Zhijia Yang 1, a *, Zhongsheng Li 1,2,b, Feng Qiao 2
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
HC900 Hybrid Controller When you need more than just discrete control
HC900 Hybrid Controller When you need more than just discrete control Product Brief: Wireless Communications and HC900 Controllers Background: With the introduction of Honeywell s One Wireless network
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
PLC Based Liquid Filling and Mixing
PLC Based Liquid Filling and Mixing 1 Mihir Panchal, 2 Aashish Panaskar. 3 Prof. Lalit Kumar KJ College of Engineering and Management Research, Pune, India Abstract: The objective of this paper is to design,
TRILOGI 5.3 PLC Ladder Diagram Programmer and Simulator. A tutorial prepared for IE 575 by Dr. T.C. Chang. Use On-Line Help
TRILOGI 5.3 PLC Ladder Diagram Programmer and Simulator A tutorial prepared for IE 575 by Dr. T.C. Chang 1 Use On-Line Help Use on-line help for program editing and TBasic function definitions. 2 Open
Keywords: Process control systems, Modbus protocol, passive network scanning
Chapter 13 PASSIVE SCANNING IN MODBUS NETWORKS Jesus Gonzalez and Mauricio Papa Abstract This paper describes the design and implementation of a passive scanner for Modbus networks. The tool integrates
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Overview and Applications of PROFINET. Andy Verwer Verwer Training & Consultancy Ltd
Overview and Applications of PROFINET Andy Verwer Verwer Training & Consultancy Ltd What exactly is PROFINET? PROFINET is an open Industrial Ethernet standard developed by the PROFIBUS Organisation. PROFINET
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER Understanding what a PAC is starts from the understanding of PLC. A PLC is a Programmable Logic while
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Why Can t We Be Friends?
Why Can t We Be Friends? Monitoring the Server Room by Introducing Modbus to SNMP Stanley Liu Product Manager, Data Acquisition & Control Division Overview IA devices are very useful for monitoring server
Cyber Security nei prodotti di automazione
Cyber Security nei prodotti di automazione Marco Biancardi, ABB SpA, Power System Division 11 dicembre 2013, Roma Why is it an issue? Isolated devices Point to point interfaces Proprietary networks Standard
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
SOFTWARE-IMPLEMENTED SAFETY LOGIC Angela E. Summers, Ph.D., P.E., President, SIS-TECH Solutions, LP
SOFTWARE-IMPLEMENTED SAFETY LOGIC Angela E. Summers, Ph.D., P.E., President, SIS-TECH Solutions, LP Software-Implemented Safety Logic, Loss Prevention Symposium, American Institute of Chemical Engineers,
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
