SCADA virtual test environment development

Size: px
Start display at page:

Download "SCADA virtual test environment development"

Transcription

1 SCADA virtual test environment development Ciprian Nicolae BOLDEA Abstract Control systems are potential targets of cyber attacks. SCADA networks are usually seen as industrial equipment, not affected by cyber threats. Starting from the design of such a network the focus is on functionality, seldom the security not even being taken into consideration. Since the SCADA networks tends to became more and more integrated with enterprise business networks and relies on Internet for communication links there is an increasing of the vulnerability of systems to cyber security threats. Dealing with those threats and determining vulnerabilities is an important task for the normal functioning of the systems. This paper presents the development of a virtual test environment used to assess the functionality of SCADA network in various conditions and configurations. Keywords: SCADA, control systems, cyber security, virtual test bed, GNS3, Virtual Box, Free SCADA 1. Introduction Computerized control systems perform vital functions in enterprises and in distributed infrastructures including: Energy Distribution, Nuclear Reactors, Dams, Commercial Facilities, Critical Manufacturing, Emergency Services, Waste Dams and Chemical Sectors, Transportation and Postal Systems. They are usually composed of a set of networked devices such as controllers, sensors, actuators, and communication devices. Supervisory Control and Data Acquisition (SCADA) systems are computer-based control systems which are used to monitor and control physical processes distributed over large geographical areas. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines; in the electric power industry, they can monitor and control the current and voltage of electricity through relays and circuit breakers; and in water treatment facilities, they can monitor and adjust water levels, pressure, and chemicals used for purification. Critical infrastructure relies extensively on computerized information technology (IT) systems and electronic data. The security of those systems and information is essential to the security, economy, and public health as it was mentioned in recent United States Government Accountability Office report [1]. Computer-based attacks pose a potentially devastating impact to systems, operations and the critical infrastructures they support. Reported cyber attacks and unintentional incidents involving critical infrastructure systems demonstrate that a serious cyber attack could be devastating. Corporations and Agencies have experienced a wide range of incidents involving data loss or theft, computer intrusions, and privacy breaches, underscoring the need for improved security practices. As shown in the Figure 1 Cyber Incidents Reported to US-CERT in , the number of incidents reported by federal agencies to United States Computer Incident Response Team (US-CERT) has increased dramatically over the past 3 years. Ciprian Nicolae BOLDEA, drd. Universitatea Politehnica Bucureşti Figure 1. Cyber Incidents (US-CERT)

2 ELECTROTEHNICĂ, ELECTRONICĂ, AUTOMATICĂ, 59 (2011), nr Accordingly to the cyber security dedicated site [2] the number of incidend has increased from about five thousand incidents reported in 2006 to almost seventeen thousand incidents in 2008 (about a 200% increase). Considering the above mentioned facts results that it is important to have a platform for experimentation over SCADA systems. It is important that such an environment to offer an alternative for testing in a live or production environment. It should allow transparent, and replicable testing of software and communication protocols for functionality and most important for security. Such a solution will be presented below. It is a solution build on freely available software. 2. SCADA architecture and test environment components used to emulate it SADA network main components are: One or more field data interface devices, usually Remote Terminal Units (RTUs), or Programmable Logical Controllers (PLCs), which interface to field sensing devices and local control switchboxes and valve actuators; A communications system used to transfer data between field data interface devices and control units and the computers in the SCADA central host. The system can be radio, telephone, cable, satellite, etc., or any combination of these; A central host computer server or servers (sometimes called a SCADA Center, master station, or Master Terminal Unit (MTU). In order for the above mentioned components to work it is need that a collection of standard and/or custom software - sometimes called Human Machine Interface (HMI) software or Man Machine Interface (MMI) software to be used to provide the SCADA central host and the operator with terminal application, support for the communications system, monitor and control of the remotely located field data interface devices. SCADA systems have evolved in parallel with the growth and sophistication of modern IT computing technology, from monolithic to distributed and then to networked systems. The current generation of SCADA - Networked SCADA systems - is an open system architecture Open standards eliminate a number of the limitations of previous generations of SCADA systems. The utilization of off-the-shelf systems makes it easier for the user to connect third party peripheral devices to the system and/or the network. Another major improvement in third generation SCADA systems comes from the use of WAN protocols such as the Internet Protocol (IP) for communication between the master station and communications equipment. This allows the portion of the master station that is responsible for communications with the field devices to be separated from the master station proper across a WAN. Vendors are now producing RTUs that can communicate with the master station using an Ethernet connection. [3]. SCADA system is usually liked with enterprise network which at is turn is liked to other networks, usually the Internet. Today s SCADA systems are able to take advantage of the evolution from mainframebased to client/server architectures. These systems use common communications protocols like Ethernet and TCP/IP to transmit data from the field to the master control unit. While all of this evolution towards more open-based standards has made it easier for the industry to integrate various diverse systems together, it has also increased the risks of less technical personnel gaining access and control of these industrial networks. On October 1, 2003 Robert F. Dacey, Director, Information Security Issues at the General Accounting Office (GAO) eluded to this and other issues in his testimony before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House Committee on Government Reform. He said: For several years, security risks have been reported in control systems, upon which many of the nation s critical infrastructures rely to monitor and control sensitive processes and physical functions. In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of risks specific to control systems, including the (1) adoption of standardized technologies with known vulnerabilities, (2) connectivity of control systems to other networks, (3)

3 62 ELECTROTEHNICĂ, ELECTRONICĂ, AUTOMATICĂ, 59 (2011), nr. 4 constraints on the use of existing security technologies and practices, (4) insecure remote connections, and (5) widespread availability of technical information about control systems. [4] For a company to protect its infrastructure, it should undertake the development of a security strategy that includes specific steps to protect any SCADA system. Developing an appropriate SCADA security strategy involves analysis of multiple layers of both the corporate network and SCADA architectures including firewalls, proxy servers, operating systems, application system layers, communications, policies, and procedures. In order to test both SCADA software and network components it is very expensive to create scale replica of real systems. An alternative to scale replica is the use of virtual systems that emulate real ones. Until recently was pretty hard to integrate in the same virtual scenario both network components and servers/workstations. It can be done now by using GNS3 for network components (routers, firewalls) simulation and Virtual Box for software virtualization. GNS3 is a graphical network simulator that allows simulation of complex networks. It was built on Dynamips - an emulator program for Cisco routers. The simulator is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X To allow complete simulations, GNS3 is strongly linked with Qemu - a generic and open source machine emulator and with VirtualBox as it is mentioned on the simulator web page - [5] VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, but it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL). Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows, Linux, Solaris and OpenSolaris, OS/2, and OpenBSD. Confirmation for the above mentioned details on - [6] The SCADA test bed created have been completed with Free SCADA 2 software. This is a program written in C# and.net 3.0. There are two main modules interacting with users: Designer and Run Time. Designer is a tool used for creation of documents: Definition of links with data sources Setting up rules for archiving Declaring alarms and expected user reaction for them Creation of visual schemes and report templates Setting up scheduler of report generation Run Time is a tool used to regular work with the document: Archiving data in real time Alarm generation Data visualization Report generation Sending visual data (schemes) to remote clients by using HTTP protocol for Web access as Silverlight 2.0 application Sending data to remote clients by OPC XMLDA protocol Beside SCADA regular components there is also a set of communication plugins which provide abstract communication layer with other applications. [7] MODBUS was used to link SCADA with Free Modbus Simulator. This is a test program useful for testing. It has TCP/IP support embedded [8]. 3. Test environment The above mentioned software were used to set-up a SCADA test bed which emulates a SCADA server, a Modbus client on a remote SCADA field device and the network in between. The network was created by using GNS3 router objects. GNS3 allows the connections between routers and virtual machines created in Virtual Box.

4 ELECTROTEHNICĂ, ELECTRONICĂ, AUTOMATICĂ, 59 (2011), nr the connection of simulated network to a real one. An attack over the SCADA network can be simulated using for example a Distributed Denial of Services test script available for download at: This was run on another machine against the 502 port of the Modbus client. Like that can be observed the system behavior under lose connectivity. Figure 2 Emulated SCADA test environment On the SCADA mainframe the Free Scada server application was run. In Figure 3 is a capture from the Graphical User Interface of the mentioned software. There are visible the values read by the server from the Modbus client. Figure 3 SCADA server communications The Modbus client simulator is a software application running on the SCADA client PC and waiting for connections. It is polled for inputs by the server via the TCP/IP network on port 502 (standard TCP Modbus port). On Figure 4 it is a capture of graphical user interface of the Modbus client simulator. Figure 4 Modbus client This is example SCADA emulation. The environment can be adjusted to simulate a close to real situation with tens or even hundreds of devices. Moreover GNS3 allows 4. Comparison with other SCADA test environments There are plenty of simulation tools for SCADA. For example RubySim is a software product used to simulate SCADA systems (both master and slaves). Consipio software develops a software product named psimulator which can be used in a multi PLC/RTU simulation scenario. A special note should be made for Realtime Immersive Network Simulation Environment for Network Security Exercises (RINSE). This is a tool for realistic emulation of large networks as well as network transactions, attacks, and defenses. The product is well described on the paper: Rinse: the real-time immersive network simulation environment for network security exercises [9]. RINSE has unique capabilities which make it suitable for cyber security and gameplaying exercises including large-scale realtime human/machine-in-the-loop network simulation support, multi-resolution network traffic models, and novel routing simulation techniques. RINSE consists of five components: the issfnet network simulator, the Simulator Database Manager, a database, the Data Server, client-side Network Viewers There are some obviously advantage of this virtual testing bed over software simulation tools. First of all it is free. All components involved in creating the test bed are free software. Secondly it supposes the use of the same components as the ones in the field while software simulated SCADA has components implemented in software.

5 64 ELECTROTEHNICĂ, ELECTRONICĂ, AUTOMATICĂ, 59 (2011), nr. 4 Thirdly this solution allows other equipments, not SCADA, to be connected to the network while in software simulated SCADA systems everything else is software simulated. For example to simulate a DDoS attack in RINSE a command in send to the system: DDoS-attack attacker server , while in a virtual environment a DDoS attack can be emulated from real or virtual machines running dedicated software/scripts. There are also disadvantages: dedicated SCADA software testing solutions are more evolved and are build special for this purpose. As result those might obtain more conclusive results. Another disadvantage of emulated test beds is that it might not reflect the SCADA system as well as a scale model can do. 5. Conclusions Control systems tend to use more and more links over Internet. It is an increased number of connections between control system and IT networks. This causes concern over the security of control systems which had traditionally been considered closed systems. Control System Networks today must be assumed to be at risk of electronic compromise. There are tools and techniques that could be used to address this peril and very important is the testing of solutions adopted for SCADA software and communications. In this paper was presented an approach from an IT point of view over control system network solutions testing methodology. REFERENCES [1] GAO, United States Government Accountability Office, Critical Infrastructure Protection-Current Cyber Sector-Specific Planning Approach Needs Reassessment in Report to Congressional Requesters, Washington DC, [2] *** /05/ 29/ cybersecurity-incidents-on-rise/ [browsed at the 12 th of October 2011]. [3] GAO, United States Government Accountability Office, Critical Infrastructure Protection Challenges in Securing Control Systems, Report GAO T, Washington DC, [4] OFFICE OF THE MANAGER, NATIONAL COMMUNICATIONS SYSTEM, Supervisory Control and Data Acquisition (SCADA) Systems, Technical Information Bulletin 04-1, Arlington VA, 2004 [5] ***, [browsed at the 12 th of October 2011]. [6] ***, [browsed at the 12 th of October 2011]. [7] ***, [browsed at the 16 th of October 2011]. [8] ***, [browsed at the 16 th of October 2011]. [9] Liljenstam M, Liu J, Nicol D, Yuan Y, Yan G, Grier C, Rinse: the real-time immersive network simulation environment for network security exercises, in Workshop on Principles of Advanced and Distributed Simulation, 2005.

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Security in SCADA solutions

Security in SCADA solutions Security in SCADA solutions Green Hills Software Peter Hoogenboom Engineering Manager - EMEA 2011 Green Hills Software D&E Event, 22 Sep 2011, Evoluon Eindhoven (NL) Slide 1 Security in SCADA solutions

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL

PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL PIPELINE SYSTEM AUTOMATION AND CONTROL C. Bruce Warren and Mike S. Yoon BCT Group and Yoon Consulting Keywords: SCADA, RTU, Communications, Data Management, HMI, Alarm, Security, Measurement, Flow Meters,

More information

Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu

Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu 12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo

More information

Network Security Infrastructure Testing

Network Security Infrastructure Testing Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support

More information

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Aye Min Zaw 1, Hla Myo Tun 2 Department of Electronic Engineering, Mandalay Technological

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

Security Aspects of SCADA and Corporate Network Interconnection: An Overview

Security Aspects of SCADA and Corporate Network Interconnection: An Overview Security Aspects of SCADA and Corporate Network Interconnection: An Overview Paulo S. Motta Pires Luiz Affonso H.G. Oliveira Departamento de Engenharia de Computação e Automação Universidade Federal do

More information

Securing Industrial Control Systems in the Chemical Sector. Roadmap Awareness Initiative Making the Business Case

Securing Industrial Control Systems in the Chemical Sector. Roadmap Awareness Initiative Making the Business Case Securing Industrial Control Systems in the Chemical Sector Roadmap Awareness Initiative Making the Business Case Developed by the Chemical Sector Coordinating Council in partnership with The U.S. Department

More information

Internet-Accessible Power Monitoring & Control Systems

Internet-Accessible Power Monitoring & Control Systems Internet-Accessible Power Monitoring & Control Systems By GE Specification Engineers Keith B. Brock, P.E. Robert P. Hansen, PhD, P.E. Introduction Accessing electrical system information from any location

More information

A Systems Approach to HVAC Contractor Security

A Systems Approach to HVAC Contractor Security LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

Securely Connect, Network, Access, and Visualize Your Data

Securely Connect, Network, Access, and Visualize Your Data Securely Connect, Network, Access, and Visualize Your Data 1 Who is Skkynet? Skkynet is the Parent company of; - Cogent Real-Time Systems Established in 1994 Focus on Industrial Automation software Cogent

More information

SCADA Questions and Answers

SCADA Questions and Answers SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...

More information

Wireless Communications for SCADA Systems Utilizing Mobile Nodes

Wireless Communications for SCADA Systems Utilizing Mobile Nodes , pp. 1-8 http://dx.doi.org/10.14257/ijsh.2013.7.5.01 Wireless Communications for SCADA Systems Utilizing Mobile Nodes Minkyu Choi Security Engineering Research Support Center, Daejon, Republic of Korea

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

Down the SCADA (security) Rabbit Hole. Alberto Volpatto Down the SCADA (security) Rabbit Hole Alberto Volpatto Alberto Volpatto Security Engineer & Team Leader @ Secure Network Computer Engineer Application Security Specialist What is SCADA? Supervisory operators,

More information

Cyber Security for SCADA/ICS Networks

Cyber Security for SCADA/ICS Networks Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And

More information

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro psimoes@dei.uc.pt

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

Using the DNP3.0 Protocol via Digi Device Servers and Terminal Servers

Using the DNP3.0 Protocol via Digi Device Servers and Terminal Servers Using the DNP3.0 Protocol via Digi Device Servers and Terminal Servers For years, electric power utilities have relied on Digi internal serial cards (i.e., DigiBoard solutions) to connect UNIX, Linux and

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Introduction To SCADA and Telemetry

Introduction To SCADA and Telemetry Introduction To SCADA and Telemetry Joe Mullaney Senior I&C Engineer MSE Technology Applications, Inc. Tetragenics Division joe.mullaney@mse-ta.com Overview Definitions What is SCADA? What is Telemetry?

More information

SCADA Cyber Security Testbed Development

SCADA Cyber Security Testbed Development SCADA Cyber Security Testbed Development C. M. Davis, J. E. Tate, H. Okhravi, C. Grier, T. J. Overbye, and D. Nicol School of Electrical and Computer Engineering University of Illinois Urbana-Champaign

More information

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems , pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research

More information

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 3호 2011년 6월 Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones Rosslin John Robles 1) and Tai-hoon Kim 2) Abstract

More information

Monitoring & Control of Small-scale Renewable Energy Sources

Monitoring & Control of Small-scale Renewable Energy Sources Small Scale Renewable Energy Sources and Energy Saving: 6-17 th July 2009 Monitoring & Control of Small-scale Renewable Energy Sources Dr G A Taylor Brunel Institute of Power Systems Brunel University,

More information

CF & IoT Protocol Support

CF & IoT Protocol Support CF & IoT Protocol Support Atul Kshirsagar Senior Engineer, GE Software Dedicated Committer, CF Diego Project May 11, 2015 Imagination at work Agenda Protocol landscape in Industrial application Multi protocol

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR Mobile operators are critical to ensuring the overall efficiency and uptime of the production line and play a critical

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Improving SCADA Control Systems Security with Software Vulnerability Analysis Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial

More information

SECURE AND FUTURE-READY SCADA CONTROL SYSTEMS PREPARE YOUR CRITICAL INFRASTRUCTURE FOR WHAT HAPPENS NEXT

SECURE AND FUTURE-READY SCADA CONTROL SYSTEMS PREPARE YOUR CRITICAL INFRASTRUCTURE FOR WHAT HAPPENS NEXT SECURE AND FUTURE-READY SCADA CONTROL SYSTEMS PREPARE YOUR CRITICAL INFRASTRUCTURE FOR WHAT HAPPENS NEXT SCADA CONTROL SYSTEMS YOUR FIRST LINE OF DEFENSE SCADA systems control most of the vital infrastructure

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

Detection of illegal gateways in protected networks

Detection of illegal gateways in protected networks Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this

More information

Keeping the Lights On

Keeping the Lights On Keeping the Lights On Fundamentals of Industrial Control Risks, Vulnerabilities, Mitigating Controls, and Regulatory Compliance Learning Goals o Understanding definition of industrial controls o Understanding

More information

SCADAvantage Network Topology System software products

SCADAvantage Network Topology System software products Data sheet DS/2101193-EN Rev. AD SCADAvantage Network Topology System software products Basic elements of a SCADAvantage system SCADAvantage has three distinct parts: the, the RTRDB, and the Client. Diagram

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Remote control technologies can enable a system administrator to connect directly to the desktop

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Off-the-shelf Packaged Software Systems And Custom Software Analysis By Gamal Balady MASS Group, Inc.

Off-the-shelf Packaged Software Systems And Custom Software Analysis By Gamal Balady MASS Group, Inc. Off-the-shelf Packaged Software Systems And Custom Software Analysis By Gamal Balady MASS Group, Inc. April 1, 2004 1 Presentation Overview I. Packaged Software Systems vs. Custom Software Systems II.

More information

Protecting Critical Infrastructure

Protecting Critical Infrastructure Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security

More information

Cyber Security of the Power Grid

Cyber Security of the Power Grid Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

THE SCADA REVIEW: SYSTEM COMPONENTS, ARCHITECTURE, PROTOCOLS AND FUTURE SECURITY TRENDS

THE SCADA REVIEW: SYSTEM COMPONENTS, ARCHITECTURE, PROTOCOLS AND FUTURE SECURITY TRENDS American Journal of Applied Sciences 11 (8): 1418-1425, 2014 ISSN: 1546-9239 2014 A. Shahzad et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1418.1425

More information

Square D Model 6 Motor Control Centers

Square D Model 6 Motor Control Centers Square D Model 6 Motor Control Centers with Ethernet Communications What is industrial Ethernet? Over the past few years the use of Ethernet communications has spread into every corner of the business

More information

Security Issues with Distributed Web Applications

Security Issues with Distributed Web Applications Security Issues with Distributed Web Applications Device Connectivity We are entering the era of Device Connectivity, which is the fourth wave of evolution for Internet-enabled applications. The first

More information

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

CYBER SECURITY. Is your Industrial Control System prepared?

CYBER SECURITY. Is your Industrial Control System prepared? CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there

More information

Your remote sites at your fingertips?

Your remote sites at your fingertips? www.klinkmann.com Your remote sites at your fingertips? Industrial M2M Router & Data gateway The ewon is the first industrial modular M2M router and data gateway designed for OEMs and system integrators.

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

R-Win. Smart Wireless Communication Management System

R-Win. Smart Wireless Communication Management System Smart Wireless Communication Management System General R-Win is a smart communications adapter for management of wireless communications in a SCADA/Distributed Control System. The R-Win system includes

More information

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc.

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc. on Cellular Data Networking for SCADA system networks Presented by Teamwork Solutions, Inc. Wireless (Cellular) Data Networking Internet SCADA Server How Wireless (Cellular) Data Networking Works Dynamic

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Testing Intelligent Device Communications in a Distributed System

Testing Intelligent Device Communications in a Distributed System Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) dgoughnour@trianglemicroworks.com United States Smart Grid systems

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

New Era in Cyber Security. Technology Development

New Era in Cyber Security. Technology Development New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security

More information

Straton and Zenon for Advantech ADAM-5550. Copalp integrates the straton runtime into the ADAM-5550 device from Advantech

Straton and Zenon for Advantech ADAM-5550. Copalp integrates the straton runtime into the ADAM-5550 device from Advantech Straton and Zenon for Advantech ADAM-5550 Copalp integrates the straton runtime into the ADAM-5550 device from Advantech Project Introduction: Programmable Application Controllers (PAC) are powerful and

More information

AutoLog ControlMan. Remote Monitoring & Controlling Service

AutoLog ControlMan. Remote Monitoring & Controlling Service AutoLog 1 AutoLog ControlMan Remote Monitoring & Controlling Service Web browser based HMI / SCADA interface Server is hosted by Internet server hosting company Control units communicate wirelessly via

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder

More information

Getting started. Creating a Web Server support application

Getting started. Creating a Web Server support application Getting started Creating a Web Server support application Document revision Date Edition Comments 08/09/2010 1.0 - Sielco Sistemi srl via Roma, 24 I-22070 Guanzate (CO) http://www.sielcosistemi.com Getting

More information

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Craig Held White Paper April 2012 Abstract The concept of automation (and its corresponding technologies) is a primary

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

OPCNet Broker TM for Industrial Network Security and Connectivity

OPCNet Broker TM for Industrial Network Security and Connectivity OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

BEng (Hons) Telecommunications. Examinations for 2011 2012 / Semester 1

BEng (Hons) Telecommunications. Examinations for 2011 2012 / Semester 1 BEng (Hons) Telecommunications Cohort: BTEL/10A/FT Examinations for 2011 2012 / Semester 1 MODULE: IP Telephony MODULE CODE: TELC3107 Duration: 2 Hours Reading time: 15 Minutes Instructions to Candidates:

More information

Gas Plant SCADA Software Application

Gas Plant SCADA Software Application Gas Plant SCADA Software Application Traian Turc Petru Maior University of Targu Mures traian.turc@engineering.upm.ro Adrian Gligor Petru Maior University of Targu Mures agligor@engineering.upm.ro Abstract

More information

ICAWEB423A Ensure dynamic website security

ICAWEB423A Ensure dynamic website security ICAWEB423A Ensure dynamic website security Release: 1 ICAWEB423A Ensure dynamic website security Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications

More information

Unified network traffic monitoring for physical and VMware environments

Unified network traffic monitoring for physical and VMware environments Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers

More information

CNG IN A BOX: Cloud Based Enterprise Historian w\dash Boarding Solution for CNG Fueling Stations

CNG IN A BOX: Cloud Based Enterprise Historian w\dash Boarding Solution for CNG Fueling Stations CNG IN A BOX: Cloud Based Enterprise Historian w\dash Boarding Solution for CNG Fueling Stations Project: CNG in a BOX: Cloud Based Enterprise Historian w\dash boarding for CNG Fueling Stations. 1. INTRODUCTION

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Plant automation and telecontrol in one system. SIMATIC PCS 7 TeleControl SIMATIC PCS 7. Answers for industry.

Plant automation and telecontrol in one system. SIMATIC PCS 7 TeleControl SIMATIC PCS 7. Answers for industry. Plant automation and telecontrol in one system SIMATIC TeleControl SIMATIC Answers for industry. SIMATIC TeleControl The intelligent solution for installations with local and widely distributed automation

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

Client-Server SCADA Technology

Client-Server SCADA Technology Client-Server SCADA Technology A FULL WEB BROWSER-BASED SUITE BRIDGING THE OPERATION & INFORMATION GAP WITH WEB BROWSER DASHBOARDS FOR: v MANAGEMENT DECISION MAKERS v PRODUCTION/ OPERATIONS v MOBILE WORKFORCES

More information

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005 AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT

More information

Role of Firewall in Network. Security. Syed S. Rizvi. CS 872: Computer Network Security. Fall 2005

Role of Firewall in Network. Security. Syed S. Rizvi. CS 872: Computer Network Security. Fall 2005 Role of Firewall in Network Security By Syed S. Rizvi CS 872: Computer Network Security Fall 2005 Outline o Background o What is a Firewall? o What does a Firewall do? o Implementation of Firewall o Interaction

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

ModBus Server - KNX. Gateway for integration of KNX equipment into Modbus (RTU and TCP) control systems.

ModBus Server - KNX. Gateway for integration of KNX equipment into Modbus (RTU and TCP) control systems. IntesisBox ModBus Server - KNX Gateway for integration of KNX equipment into Modbus (RTU and TCP) control systems. Integrate KNX based lighting control into your SCADA, BMS, PLC "talking" Modbus. Master

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

EVALUATING INDUSTRIAL ETHERNET

EVALUATING INDUSTRIAL ETHERNET EVALUATING INDUSTRIAL ETHERNET WHAT IS STANDARD? Written by: Shuo Zhang Networks Marketing Rockwell Automation As industrial automation systems evolve, industrial Ethernet is becoming increasingly popular

More information

Benefits of a Modern SCADA Protocol DNP3 vs Modbus

Benefits of a Modern SCADA Protocol DNP3 vs Modbus Benefits of a Modern SCADA Protocol DNP3 vs Modbus November 07 Benefits of using modern protocols for SCADA A protocol is simply the rules that govern the data transfer between parts of a control system.

More information

Firewall Security: Policies, Testing and Performance Evaluation

Firewall Security: Policies, Testing and Performance Evaluation Firewall Security: Policies, Testing and Performance Evaluation Michael R. Lyu and Lorrien K. Y. Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK lyu@cse.cuhk.edu.hk,

More information

Substation Automation Systems. Nicholas Honeth (nicholash@ics.kth.se)

Substation Automation Systems. Nicholas Honeth (nicholash@ics.kth.se) Substation Automation Systems Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 5 - Introduction to SAS - Nice creative exercise Lecture 6 - A bit about information modelling - Data

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Secure Remote Control Security Features for Enterprise Remote Access and Control

Secure Remote Control Security Features for Enterprise Remote Access and Control Secure Remote Control Security Features for Enterprise Remote Access and Control Good communication is vital to any company, large or small. Many departments within companies are utilizing different platforms

More information