Enhance Security Mechanism for Securing SCADA Wireless Sensor Network
|
|
|
- Herbert Fox
- 10 years ago
- Views:
Transcription
1 Vol.2, No.1 (2014), pp Enhance Security Mechanism for Securing SCADA Wireless Sensor Network Yvette E. Gelogo 1 and Tai-hoon Kim 2 1 Catholic University of Daegu, Korea 2 Sungshin University, Seoul, Korea [email protected], [email protected] Abstract Supervisory Control and Data Acquisition (SCADA) systems are vital components of most nation s critical infrastructures. SCADA systems are primarily control systems. They control pipelines, water and transportation systems, utilities, refineries, chemical plants, and a wide variety of manufacturing operations. Sensor networks are becoming increasingly important in various applications such as monitoring, control and inventory to industries and other critical infrastructures. To realize the full potential, these sensor networks require connectivity to the Internet and everything now is adopting the new protocol which we called IPv6 to support mobility. 6Lowpan sensor network for SCADA system facing security vulnerabilities and to address these vulnerabilities, we proposed a cryptosystem for the Transport Layer Security (TLS) Protocol. Elliptic Curve Cryptography (ECC) provides security with smaller key size that is comparable to security provided by RSA or AES with much higher key size. ECC is proven to work in low power sensor devices like 6Lowpan. Keywords: SCADA, 6lowpan, Elliptic Curve Cryptography (ECC) 1. Introduction SCADA systems are primarily control systems. A typical control system consists of one or more remote terminal units (RTU) connected to a variety of sensors and actuators, and relaying information to a master station [1]. For the most part, the brains of a SCADA system are performed by the Remote Terminal Units (sometimes referred to as the RTU). The Remote Terminal Units consists of a programmable logic converter. The RTU are usually set to specific requirements, however, most RTU allow human intervention, for instance, in a factory setting, the RTU might control the setting of a conveyer belt, and the speed can be changed or overridden at any time by human intervention. In addition, any changes or errors are usually automatically logged for and/or displayed. Most often, a SCADA system will monitor and make slight changes to function optimally; SCADA systems are considered closed loop systems and run with relatively little human intervention [1]. The key value of Sensor devices is monitoring of physical and industrial environments. The data is captured by sensors and communicate to a central controller which analyses the data and takes appropriate actions. In many ways, sensors serve as the basic elements in SCADA system, it sense the state of the process through measurement of process parameters such as temperature, pressure, voltage, ph, position, size, etc. ISSN: IJSACS Copyright c 2014 SERSC
2 Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP). It is designed to succeed the Internet Protocol version 4 (IPv4). The Internet operates by transferring data between hosts in small packets that are independently routed across networks as specified by an international communications protocol known as the Internet Protocol. An IP-enabled sensor network requires the implementation of an IP stack in the sensor nodes and appropriate inter-working between the IP layer and the link layer. IP operation has to be specified for each specific sensor link technology, covering encapsulation and decapsulation including fragmentation and reassembling of IP packets, address resolution, and compression. 6LowPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks. It is the name of the working group in the internet area of IETF. The 6lowpan group aimed at defining header compression mechanisms that allow IPv6 packets to be sent to and received from over IEEE based networks. The 6LoWPAN concept originated from the idea that "the Internet Protocol could and should be applied even to the smallest devices and that low-power devices with limited processing capabilities should be able to participate in the Internet of Things [12]. Likewise, IEEE devices provide sensing communicationability in the wireless domain. 2. Background There are a lot of study conducted how to secure IP-based SCADA system. For packet security, there is a lot of cipher scheme being used to make sure the integrity of the message. The attacks that can possibly launch with unsecured network is the attacker can intercept the packet intended for another SCADA components that is being modified by the attacker and replace it malicious programs that can destroy the intended recipients or host. Though this kind of attack will cause a big damage, there is no concrete security mechanism to combat such attack profoundly. Another is when the attack is being launch through downloaded and installed software which is malware, Trojan viruses and other virus programs that the host is not aware of its existence because also of the high cryptography used that the IDS or NIISD, firewall cannot detect. This will cause a lot of damage before it can be detected. This paper discusses the mechanism to mitigate these attacks which focused on the IPv6 signaling SCADA System SCADA is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. SCADA and other Control Systems have been so important since it control most of our commodities. Conventional SCADA communications has been Point-to- Multipoint serial communications over lease line or private radio systems. With the advent of Internet Protocol (IP), IP Technology has seen increasing use in SCADA communications. The connectivity of can give SCADA more scale which enables it to provide access to realtime data display, alarming, trending, and reporting from remote equipment [3]. 2 Copyright c 2014 SERSC
3 Figure 1. Internet SCADA Architecture Like a normal SCADA, it has RTUs/PLCs/IEDs, The SCADA Service Provider or the Master Station. This also includes the user-access to SCADA website. This is for the smaller SCADA operators that can avail the services provided by the SCADA service provider. It can either be a company that uses SCADA exclusively. Another component of the internet SCADA is the Customer Application which allows report generation or billing. Along with the fieldbus, the internet is an extension. This is setup like a private network so that only the master station can have access to the remote assets. The master also has an extension that acts as a web server so that the SCADA users and customers can access the data through the SCADA provider website. AS the system evolves, SCADA systems are coming in line with standard networking technologies. Ethernet and TCP/IP based protocols are replacing the older proprietary standards. Although certain characteristics of frame-based network communication technology (determinism, synchronization, protocol selection, environment suitability) have restricted the adoption of Ethernet in a few specialized applications, the vast majority of markets have accepted Ethernet networks for HMI/SCADA SCADA Vulnerabilities The complexity of modern SCADA systems leaves many vulnerabilities as well as vectors for attack. Attacks can come from many places, including indirectly through the corporate network, virtual private networks (VPN), wireless networks, and dial-up modems. Possible attack vectors on an SCADA system include: Backdoors and holes in network perimeter; Vulnerabilities in common protocols; Database attacks; Communications hijacking and man-in-the-middle attacks. All but the most naive adversary would seek to conceal their identity, before initiating any steps to an attack or even a preliminary set-up or probe for an attack. The method for concealing the identity of the adversary s machine is to set up an intermediary machine(s) which would directly probe or attack the target network. This would entail doing one of the following: 1. set up an anonymous proxy, which is a tool that makes any activity performed difficult to trace; Copyright c 2014 SERSC 3
4 2. set up a botnet17 of intermediary machines; 3. enlist the services of a bot-network operator from the underground market, i.e., rent a bot-net. Two major deterrents to adversaries include system hardening [5] and intrusion detection systems [6]. However it is important to note that consistent system hardening is dependent upon a disciplined security staff who will monitor the uses of every computer/device and disable all components which are not necessary for its correct execution. Intrusion detection systems also require dedicated administration and correct configuration from the security staff Access Path There are many ways a system can be penetrated. We describe two ways; The Laying Bait and Remote Access Laying Bait The easiest and quickest way to obtain unauthorized access into a secured network is to get someone on the inside to perform an action that would result in creating a backdoor [48]. He acted as part of performing a vulnerability assessment for a credit union, wherein they scattered 20 USB drives (containing adversary software) in the employee parking lot. Within a few hours, 15 of the 20 drives had been plugged into machines on the internal network, and thus were running the adversary software. The adversary now had easy entry into the internal network. There are many other ways to do this, e.g. sending forged to many employees which trick them to download something they think they want. Once they click on the link, they have just installed a Trojan horse or backdoor onto their hard drive Remote Access Many vendors of SCADA devices provide systems with dial-up modems that provide remote access so technical field support staff can access the devices remotely. Remote access also provides support staff with administrative level access to a system. Adversaries with war dialers or programs that dial consecutive phone numbers looking for modems, and password cracking software may gain access to systems through these remote access capabilities. Passwords used for remote access are often common to all implementations of a particular vendor s systems and may have not been changed by the end user. These types of connections can leave a system highly vulnerable because people entering systems through vendorinstalled modems are often granted high levels of system access Payload Payload is a term used to describe the action that will be performed once vulnerability has been exploited. The different payloads can be the following: Denial of Service. Since the adversary has already penetrated the SCADA network, DoS implies DoS on an individual machine/device, a group of devices or an entire subnetwork, inside a SCADA network. DoS attacks are considered the easiest type of attack to launch; Addition of software infected with malware which will disrupt the performance of the network and/or the machines on the network; 4 Copyright c 2014 SERSC
5 Changes to the software or modifications to the configuration settings (some reverse engineering may be needed); Spoofing system operators and/or devices on the control network. This is the most difficult payload to execute but would provide an adversary with the most capabilities. Depending upon the level of spoofing it may require a LOT of reverse engineering which is a very time consuming and challenging process; Changes to instructions, commands (same difficulty as above). Protocol manipulation, vulnerability exploitation and the man-in-the-middle attacks are among the most popular ways to manipulate insecure protocols, such as those found in control systems; Vulnerability Exploitation. Once an adversary has access to the control network there is much publicly known vulnerability in versions of some typical SCADA protocols. Several vulnerability exploitation methods have been identified, e.g., performing a port scan, accessing a web server on a device with a URL different than what the device was expecting, all of which will result in the device reaching a failure mode [46]. The failure mode may cause the device to immediately crash or may take several queries to result in a crash. Still other failure modes may result in slow performance or cutting off access to other services. Most of these publicly known vulnerabilities have had patches issued by their manufacturers, or have issued new versions which have removed these vulnerabilities. However, as mentioned before, it takes consistent monitoring by system administrators to keep current of all system software updates and patches on all of the devices in the network; Spoofing (Replay attack). In this form of attack, captured data from the control/hmi is modified to instantiate activity when received by the device controller. Captured data reflecting normal operations in the Control Center is played back to the operator as required. This would cause the operator s HMI to appear to be normal and an attack will go unobserved. During this replay attack, the adversary could continue to send commands to the controller and/or field devices in order to cause an undesirable event while the operator remains unaware of the true state of the system Communications hijacking (or man-in-the-middle). In this attack, false messages are sent to the operator, and could take the form of a false negative or a false positive. This may cause the operator to take an action, such as flipping a breaker, when it is not required, or it may cause the operator to think everything is fine and not take an action when an action is required. The adversary could send commands to the operator s console indicating a system change, and when the operator follows normal procedures and attempts to correct the problem, the operator s action could cause an undesirable event. There are numerable variations of the modification and replay of control data which could impact the operations of the system SCADA Communication SCADA systems have traditionally used combinations of radio and direct serial or modem connections to meet communication requirements, although Ethernet and IP over SONET / SDH is also frequently used at large sites such as railways and power stations. The remote management or monitoring function of a SCADA system is often referred to as telemetry. This has also come under threat with some customers wanting SCADA data to travel over their pre-established corporate networks or to share the network with other applications [6]. Copyright c 2014 SERSC 5
6 The legacy of the early low-bandwidth protocols remains, though. SCADA protocols are designed to be very compact and many are designed to send information to the master station only when the master station polls the RTU. Typical legacy SCADA protocols include Modbus RTU, RP-570, Profibus and Conitel [2]. These communication protocols are all SCADA-vendor specific but are widely adopted and used. Standard protocols are IEC or 104, IEC and DNP3. These communication protocols are standardized and recognized by all major SCADA vendors. Many of these protocols now contain extensions to operate over TCP/IP. It is good security engineering practice to avoid connecting SCADA systems to the Internet so the attack surface is reduced [6]. RTUs and other automatic controller devices were being developed before the advent of industry wide standards for interoperability. The result is that developers and their management created a multitude of control protocols. Among the larger vendors, there was also the incentive to create their own protocol to "lock in" their customer base. A list of automation protocols is being compiled here. Communication between the control center and remote sites could be classified into following four categories [21]: Data acquisition: the control center sends poll (request) messages to remote terminal units (RTU) and RTUs dump data to the control center. In particular, this includes status scan and measured value scan. The control center regularly sends a status scan request to remote sites to get field devices status (e.g., OPEN or CLOSED or a fast CLOSED-OPEN-CLOSED sequence) and a measured value scan request to get measured values of field devices. The measured values could be analog values or digitally coded values and are scaled into engineering format by the front-end processor (FEP) at the control center. Control functions: the control center sends control commands to a RTU at remote sites. Control functions are grouped into four subclasses: individual device control (e.g., to turn on/off a remote device), control messages to regulating equipment (e.g., RAISE/LOWER command to adjust the remote valves), sequential control schemes (a series of correlated individual control commands), and automatic control schemes (e.g., closed loop controls). Firmware download: the control center sends firmware downloads to remote sites. In this case, the poll message is large (e.g., larger that 64K bytes) than other cases. Broadcast: the control center may broadcast messages to multiply remote terminal units (RTUs). For example, the control center broadcasts an emergent shutdown message or a setthe-clock-time message. Acquired data is automatically monitored at the control center to ensure that measured and calculated values lie within permissible limits. The measured values monitored with regard to rate-of-change and for continuous trend monitoring. They are also recorded for post-fault analysis. Status indications are monitored at the control center with regard to changes and time tagged by the RTUs. Existing communication links between the control center and remote sites operate at very low speeds (could be on an order of 300bps to 9600bps). 3. IPv6 Sensor Network Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP). The Internet operates by transferring data between hosts in small packets that are independently routed across networks as specified by an international communications protocol known as the Internet Protocol. 6 Copyright c 2014 SERSC
7 There have been recent attempts to integrate Internet services with the WSN through studies concerning the integration of the IEEE protocol and the Internet protocol (IP) [4]. Sensor networks are becoming increasingly important in various applications such as monitoring, control and inventory to industries and other critical infrastructures. Having this to integrate with SCADA system to change the current sensor devices connectivity will give a lot of advantages. To realize the full potential, these sensor networks require connectivity to the Internet. When sensor networks connect to the Internet using IPv6, it delivers further benefits because it can now take advantages of the huge (132-bit) address space of IPv6. For wireless sensor networks, the goal is to design, develop and implement IP6-enabled sensor networks over the wireless environment. The realization of IPv6-enabled sensor networks and their integration in an IPv6-enabled WAN infrastructure puts some requirements on the architecture and its functional blocks. An IP-enabled sensor network requires the implementation of an IP stack in the sensor nodes and appropriate inter-working between the IP layer and the link layer. IP operation has to be specified for each specific sensor link technology, covering encapsulation and decapsulation including fragmentation and reassembling of IP packets, address resolution, and compression. In order to increase the reachable range within the sensor network, IPv6-enabled sensor networks are expected to form a multi-hop network in which IPv6 data packets are forwarded by the intermediate nodes on the route towards the packet's destination. Sensor network nodes need to be configured with several parameters (IP addresses) to make them ready for communication at the network layer. The human machine interfaces (HMI) can be used to configure the sensor networks manually. Figure 2. MODBUS IP (RTU) Received Data from IPv6-enabled Sensor Devices MODBUS/TCP is an open protocol used by most I/O makers for communicating with industrial devices such as remote terminal units (RTUs) in supervisory control and data acquisition (SCADA) systems, and programmable logic controllers (PLCs). MODBUS protocol packets are transmitted inside TCP/IP data packets. It supports IPv6 protocol and other internet protocol like UDP, HTTP, FTP, DHCP, IMAP, IPv4 and other [9]. The direct sending and receiving of the data to and from IPv6 sensor devices is possible because RTU s can communicate directly with the sensor devices. In figure 1, we illustrate the governing protocols that both RTU s (MODBUS IP) and IPv6 sensor networks have which enable them to communicate [10, 11]. Copyright c 2014 SERSC 7
8 4. 6lowpan Security Analysis 6LoWPAN networks cannot be protected using traditional network security techniques, because the sensor nodes have limited resources and often operate unattended in publicly accessible areas. In fact, some security issues are still to be addressed. Resource scarcity is the main constraint of 6LoWPAN technology and also affects the selection of the most appropriate security countermeasure. To raise security to an acceptable level, appropriate risk management and security planning are needed. Such an approach allows for comparison between different configurations of the system, that is, with or without security countermeasures such that performance cost versus security improvements can be properly considered. In addition, existing IP security technologies have to be simplified to be implemented on 6LoWPAN small devices [13]. Figure 3. General Overview of 6LoWPAN Security Model for SCADA Systems The possible threats in 6lopwan include intrusion, sink-hole and replay attacks. As in traditional networks, routing mechanisms in 6lowpan present another window from which, an attacker mightdisrupt and significantly degrade the 6lowpan overall performance. Attacks against unsecure routing aim mainly to contaminate WPAN networks with false routing information resulting in routing inconsistencies. A malicious node can also snoop packets and then launch replay attacks on the 6lowpan nodes. These attacks can cause harm especially when the attacker is a high-power device, such as laptop. It can also easily drain 6lowpan devices batteries by sending broadcast messages, redirecting routes etc. A possible solution to address security issues in the 6lowpan networks might consist of implementing application level security, SSL, on top of link layer security. In such case, link layer security protects from intrusion and the application level security protects from another user peeking at the data and against impersonation. 8 Copyright c 2014 SERSC
9 IPsec can guarantee integrity and optionally confidentiality of IPv6 packets exchanged between two peers. Basically, IPsec works well on non-low-power devices which are not subject to severe constraints on host software size, processing and transmission capacities. IPsec supports AH for authenticating the IP header and ESP for authenticating and encrypting the payload. The main issues of using IPsec are two-fold: (1) processing power and (2) key management. Since these tiny 6lowpan devices do not process huge number of data or communicate with many different nodes, it is not well understood if complete implementation of SADB, policy-database and dynamic key-management protocol are appropriate for these small battery powered devices. Given existing constraints in 6lowpan environments, IPsec may not be suitable to use in such environments, especially that 6lowpan node may not be able to operate all IPsec algorithms on its own capability either FFD or RFD. Bandwidth is a very scarce resource in 6lowpan environments. The fact that IPsec additionally requires another header (AH or ESP) in every packet makes its use problematic in 6lowpan environments. IPsec requires two communicating peers to share a secret key that is typically established dynamically with the Internet Key Exchange (IKEv2) protocol. Thus, it has an additional packet overhead incurred by IKEv2 packets exchange. 5. Proposed Cryptosystem and Secured Packet Signaling In this paper, we propose Elliptic Curve Cryptography (ECC) keying algorithm for the Transport Layer Security (TLS) Protocol for SCADA wireless sensor 6lowPan. Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem, in particular for mobile environments [9]. As neighbor discovery protocol will be applied to 6lowpan, Secure Neighbor Discovery (SeND) protocol should be considered to provide security in conjunction with 6lowpan NDP. SeND works well over existing IP networks. However, the cryptogenerated address (CGA) used in SeND is based on RSA based and thus, requires larger packet-size and processing time than in the case where Elliptic Curve Cryptography (ECC) keying algorithm is used. Therefore, it could be reasonable to use the SeND protocol if it is extended to support ECC for 6lowpan networks application. Recent works on ECC implementation for low power devices has proven its feasibility for sensor networks. ECC provides security with smaller key size that is comparable to security provided by RSA or AES with much higher key size [8]. In addition to this security mechanism, this study proposes the use of Cryptographically Generated home address and care-of address CGAs to secure Network Discovery Message. The proposed solution is more efficient because of the bootstrapping solution in addition to security solutions were combined. Compare to IPsec/IKE security it is more efficient because authentication mechanism is not tied in mobile s home IP address. 6. Conclusion In this paper we discuss the SCADA wireless sensor as IP based technology. We analyze the current security of IPv6 in 6lowPan. 6lowpan sensor is the new technology that appropriate for SCADA sensors. Security consideration in IPv6 is very important, there security intended for IPv6 signaling and there is security intended for messaging. ECC provides security with smaller key size that is comparable to security provided by RSA or AES with much higher key size. Recent works on ECC implementation for low power devices has proven its feasibility for sensor networks. Copyright c 2014 SERSC 9
10 References [1] T. H. Kim, Securing Communication of SCADA Components in Smart Grid Environment, International Journal of Systems Applications, Engineering & Development, vol. 5, no. 2, (2011). [2] R. L. Krutz, Securing SCADA Systems, Wiley Publishing, Inc. [3] M. K. Choi, R. J. Robles, E. S. Cho, B. J. Park, S. S. Kim, G. C. Park and T. H. Kim, A Proposed Architecture for SCADA System with Mobile Sensors, Journal of Korean Institute of Information Technology, vol. 8, no. 5, (2010) May, pp [4] R. J. Robles and T. H. Kim, Architecture for SCADA with Mobile Remote Components, Proceedings of the 12th WSEAS International Conference on Automatic Control, Modelling & Simulation. [5] R. J. Robles, K. T. Seo and T. H. Kim, Communication Security solution for internet SCADA, Korean Institute of Information Technology 2010 IT Convergence Technology - Summer workshops and Conference Proceedings, (2010) May, pp [6] T. Koskiahde, Security protocols, Security in Mobile IPv6, Tampere University of Technology, , vol. 18, no. 4, (2002). [7] S. Park, IPv6 over Low Power WPAN Security Analysis, Internet-Draft, (2011). [8] B. Wilson, RFC 4492, Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security, (2006). [9] MODBUS Messaging on TCP/ IP Implementation GuideV1.0b, [10] MUDynamics, [11] G. Mulligan, The 6LoWPAN architecture, EmNets '07: Proceedings of the 4th workshop on Embedded networked sensors, ACM, (2007). [12] H. J. Kim, Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks, International Journal of Distributed Sensor Networks, Article ID , 10 pages, vol. 2012, (2012). 10 Copyright c 2014 SERSC
Wireless Communications for SCADA Systems Utilizing Mobile Nodes
, pp. 1-8 http://dx.doi.org/10.14257/ijsh.2013.7.5.01 Wireless Communications for SCADA Systems Utilizing Mobile Nodes Minkyu Choi Security Engineering Research Support Center, Daejon, Republic of Korea
Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones
보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 3호 2011년 6월 Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones Rosslin John Robles 1) and Tai-hoon Kim 2) Abstract
A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems
, pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
SCADA Protocols and Security
WHITE PAPER ON SCADA Protocols and Security Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 SCADA PROTOCOL AND SECURITY... 3 SCADA PROTOCAL... 3 DISTRIBUTED NETWORK PROTOCAL (DNP)...
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Secure Substation Automation for Operations & Maintenance
Secure Substation Automation for Operations & Maintenance Byron Flynn GE Energy 1. Abstract Today s Cyber Security requirements have created a need to redesign the Station Automation Architectures to provide
Holistic View of Industrial Control Cyber Security
Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Network Security Infrastructure Testing
Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support
Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems
By: Kevin Finnan and Philippe Willems Introduction New security capabilities at the remote terminal unit (RTU) level are substantially easing implementation of cyber security measures in SCADA systems.
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
SCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA Cyber Attacks and Security Vulnerabilities: Review Jinan Fiaidhi, Yvette E. Gelogo Department of Computer Science, Lakehead University, Hannam University, Korea [email protected], [email protected]
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
WHITE PAPER. Securing Process Control Networks
WHITE PAPER Securing Process Control Networks WHITE PAPER Securing Process Control Networks Page 1 Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), Programmable Logic
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist
Real Time Remote Monitoring over Cellular Networks Wayne Chen Marketing Specialist Introduction For distribution infrastructures located in remote, isolated areas, unmanned monitoring systems have long
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Virtual Private Networks: IPSec vs. SSL
Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
Using the DNP3.0 Protocol via Digi Device Servers and Terminal Servers
Using the DNP3.0 Protocol via Digi Device Servers and Terminal Servers For years, electric power utilities have relied on Digi internal serial cards (i.e., DigiBoard solutions) to connect UNIX, Linux and
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Introduction To SCADA and Telemetry
Introduction To SCADA and Telemetry Joe Mullaney Senior I&C Engineer MSE Technology Applications, Inc. Tetragenics Division [email protected] Overview Definitions What is SCADA? What is Telemetry?
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Vulnerabilities in SCADA and Critical Infrastructure Systems
International Journal of Future Generation Communication and Networking 99 Vulnerabilities in SCADA and Critical Infrastructure Systems Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Cyber Security of the Power Grid
Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
