SCADA Protocols and Security



Similar documents
Identity & Access Management

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Wireless Communications for SCADA Systems Utilizing Mobile Nodes

An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015

NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER

SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

Monitoring & Control of Small-scale Renewable Energy Sources

PLCs and SCADA Systems

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

Intelligent Device Management with DCS, PLC, and RTU

ISACA rudens konference

IEC 61850: Communication Networks and Systems in Substations

Semaphore T BOX Applications in Data Center Facilities

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications

Understanding SCADA System Security Vulnerabilities

Network Security Infrastructure Testing

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist

THE SCADA REVIEW: SYSTEM COMPONENTS, ARCHITECTURE, PROTOCOLS AND FUTURE SECURITY TRENDS

Securing Distribution Automation

Holistic View of Industrial Control Cyber Security

ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

Innovative Defense Strategies for Securing SCADA & Control Systems

A 360 degree approach to security

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Cyber Security of the Power Grid

What Risk Managers need to know about ICS Cyber Security

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Process Control and Automation using Modbus Protocol

IT Security and OT Security. Understanding the Challenges

SCADA Security Training

Testing Intelligent Device Communications in a Distributed System

Security Testing in Critical Systems

Modicon M580 The next generation controller for PlantStruxure architecture

future data and infrastructure

Introduction To SCADA and Telemetry

National Cyber Security Policy -2013

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

SCADA Security: Challenges and Solutions

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

Cyber Threats in Physical Security Understanding and Mitigating the Risk

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW

The State-of-the-State of Control System Cyber Security

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

Whitepaper Introduction to remote control systems and remote maintenance systems for system monitoring

Symphony Plus Cyber security for the power and water industries

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Keeping the Lights On

AutoLog ControlMan. Remote Monitoring & Controlling Service

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones

A Systems Approach to HVAC Contractor Security

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Web SCADA Employing Application Program Interface as Data Source

Vulnerabilities in SCADA and Critical Infrastructure Systems

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

Remote Management White Paper 27th June, 2012

Complete SCADA solution for Remote Monitoring and Control

This is a preview - click here to buy the full publication

Test di sicurezza in ambienti Smart Grid e SCADA

SECURE AND FUTURE-READY SCADA CONTROL SYSTEMS PREPARE YOUR CRITICAL INFRASTRUCTURE FOR WHAT HAPPENS NEXT

A Real Time, Object Oriented Fieldbus Management System

SNMP a new paradigm for SCADA. By Vishal Prakash and Robert Casey

Industrial Security Solutions

SCADA SYSTEMS AND SECURITY WHITEPAPER

Internet-Accessible Power Monitoring & Control Systems

SCADA System Security, Complexity, and Security Proof

Secure Networks for Process Control

Power Industry Communication Protocol Features and Benefits

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc.

Understanding Programmable Automation Controllers (PACs) in Industrial Automation

Claes Rytoft, ABB, Security in Power Systems. ABB Group October 29, 2009 Slide 1

Universal Adapters for Remote Monitoring

High rate and Switched WiFi. WiFi QoS, Security 2G. WiFi a/b/g. PAN LAN Cellular MAN

Off-the-shelf Packaged Software Systems And Custom Software Analysis By Gamal Balady MASS Group, Inc.

Flexible Plug & Play Smart grid cyber security design and framework. Tim Manandhar

Vehicular On-board Security: EVITA Project

PROCESS AUTOMATION REMOTE I/O SYSTEMS RPI REMOTE PROCESS INTERFACE IN THE SAFE AREA OR IN ZONE 2

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

Generic term for using the Ethernet standard in automation / industrial applications

DIGITAL CONTROL SYSTEM PRODUCT SOLUTIONS

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

straton Universal control and strong connections. embedded field bus controller soft-plc scada logic

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

SMART ASSET MANAGEMENT MAXIMISE VALUE AND RELIABILITY

CG Automation Solutions USA

Cyber security measures in protection and control IEDs

Impact of OPC UA and Information Modeling on Monitoring Solutions. Ron DeSerranno, Founder / CEO rdeserranno@b-scada.com

HMS Industrial Networks

A DNP3 Protocol Primer

Transcription:

WHITE PAPER ON SCADA Protocols and Security Prepared by Mohammed Samiuddin www.itmr.ac.in

Contents INTRODUCTION... 2 SCADA PROTOCOL AND SECURITY... 3 SCADA PROTOCAL... 3 DISTRIBUTED NETWORK PROTOCAL (DNP)... 4 MODBUS / PROFIBUS... 4 CAN PROTOCAL... 4 IEC 61850 PROTOCAL... 5 CURRENT TRENDS... 5 SECURITY ISSUES... 6 CONCLUSION... 7 REFERENCE... 7 1

Introduction Automation is the use of various control systems for operating equipment s. Industries focus on automation because it saves labour and requires minimal human intervention. There are various control systems in the industry, including Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), Programmable Logic Controllers (PLC), intelligent field devices, smart meters, and smart equipment diagnostic systems. These systems are common across the industrial infrastructure. They control pipelines, water and transportation systems, utilities, refineries, chemical plants, and a wide variety of manufacturing operations. One of the prominent element which needs attention from a security stand point is SCADA. The development of SCADA system started when the need for IT-security consisted of protecting physical access to the computers of the system. During the last couple of years, the number of connections to SCADA systems and the use of internet-based controls with SCADA have increased rapidly. Process control and SCADA systems are becoming more reliant on standard IT technologies. They have emerged as vital elements of the nations' critical infrastructure. Having understood the essential nature of SCADA, HTC through its research and development initiative has been working on SCADA security over the years. Control systems communicate through communication protocols and enable management of remote systems. They have been functionally adapted to Transmission Control Protocol/Internet Protocol (TCP/IP) and other Information Technology (IT). SCADA systems are now being exposed to a variety of threats and vulnerabilities that were earlier not visible since, performance and availability requirements vastly differ for administrative IT systems and SCADA systems. This white paper outlines SCADA protocols and security status. 2

Scada Protocol and Security Scada Protocol SCADA is classified as the technology which enables user to collect data from one or more distant facilities and/or send limited control instructions to those facilities. SCADA protocols evolved out of the need to send and receive data, and control information locally and over distances in deterministic time. Deterministic in this context refers to the ability to predict the time required for a transaction to take place when all relevant factors are known and understood. Hundreds of SCADA protocols like DNP, MODBUS, CAN, etc., exist today. Some of these protocols are capable of supporting more than just telemetry and control functions. Many RTU-type devices are built around embedded systems, comprising processor modules, analogue and digital inputs and outputs, and communication ports such as EIA-232 and 485 interfaces. SCADA systems are essentially a centralised communication system where the data server polls each remote terminal unit (RTU) to collect data. A remote terminal unit (RTU) that monitors and controls a production well in an oilfield is connected only with a few sensors at the well it resides. The RTU collects sensor data at pre-defined intervals, and only sends data back when being polled by a central data server. Users can accesses data in one of the two ways: directly connecting to the RTU in the field or reading from the data server in the control room. There is no data sharing and forwarding between different RTUs. Usually these RTUs communicate with the data server. Once SCADA data has been collected by the master station, it can be shared with other control centres using IEC 60870-6 and can interface with Energy Management Systems (EMS), Dynamic Monitoring Service (DMS), and Management Information Systems (MIS) applications using common interface model (IEC61970). 3

Scada Protocol and Security Distributed Network Protocol (DNP) Byte oriented protocols such as DNP3 are used for supervisory and control communications in the electrical power grid domain. This was developed to facilitate communications between various types of data acquisition and control equipment. DNP is a layer two protocol that is used for serial or IP communication between control devices. It provides the rules for remotely located computers and master station computers to communicate data and control commands. This protocol is non-proprietary and uses the term outstation to denote remote computers found in the field. The term master is used for the computers in the control centres. It provides multipexing, data fragmentation, error checking, link control, prioritisation, and layer 2 addressing services for user data. MODBUS / Profibus In the late 1970s, Modicon Incorporated developed the MODBUS protocol. MODBUS is positioned in layer 7. The MODBUS protocol defines the methods for a PLC to obtain access to another PLC, for a PLC to respond to other devices, and the means for detecting and reporting errors. Modbus is a request/reply protocol and offers services specified by function codes. Modbus communication interface is built around messages. Profibus (Process Fieldbus) is an open fieldbus serial network standard for use in time-critical control and data acquisition applications. It falls under the European international fieldbus standard, EN 50 170, and defines the functional, electrical, and mechanical characteristics of a serial fieldbus CAN Protocol Controller area network (CAN) protocols (ISO Standard 11898-1) were developed for the automotive industry by Robert Bosch GMBH in the mid1980s for use in serial communications up to 1 Mbps. CAN supports up to 110 nodes on a two-wire, half-duplex network. CAN communications are based on the Ethernet carrier sense multiple access with collision detection (CSMA/CD) method. With CSMA/CD, multiple devices compete to transmit information over a common bus. DeviceNet is an open standard that is used to connect equipment such as motor starters, sensors, valve controls, displays, operator interfaces, and higher level control computers and PLCs. DeviceNet is based on CAN protocols. 4

Scada Protocol and Security IEC 61850 Protocol Utility Communications Architecture (UCA) version 2.0 is a family of communications protocol aimed at meeting the needs of electric utilities. UCA 2.0 is based on the Manufacturing Message Specification (MMS) from ISO Standards ISO 9506-1:2000 and ISO 9506-2:2000. UCA 2.0 is migrated to IEC Standard IEC61850 for substation automation. The IEC 61850 protocol is a new standard devised by working group 10 of the IEC Technical Committee 57 which has significantly alleviated the high complexity, time consuming, and interoperability issues in substation automation. IEC 61850 is a virtual protocol which consists of abstract models of data and services. Communication services in IEC 61850 are abstract and model driven. These services are defined by the Abstract Communication Service Interface (ACSI) and are organised in two groups of communication services. The substation information exchanged between IEDs is referred as Pieces of Information for Communication (PICOM), while the path established for transmission of PICOMs is referred as an association. As IEC 61850 data and services are abstract and cannot themselves provide a concrete interaction between IEDs, they are mapped to concrete communication protocols. These mapping are carried out by the Specific Communication Service Mapping (SCSM). Current Trends Today's SCADA systems are often vertically integrated, largely proprietary systems. Interoperability of systems is often limited. While closed protocols and systems might maximise the short-term benefit of systems providers, they limit the ability of the field to grow and constrain innovation by new players. There is an increasing and important trend towards open SCADA protocols, allowing third party tools to manipulate the data. Automotive manufacturers are exploring in-vehicle automation and betweenvehicle safety systems. Safe sharing between vehicles is necessary in such systems to provide cross-vehicle warnings of breaking and collision prevention. If data is readily available in a standard format, third parties could propose energy optimisations and utilities could better understand power usage and potentials to time-shift load. 5

Scada Protocol and Security Security Issues While the prioritisation in traditional information security is CIA (Confidently, Integrity, and Availability) the prioritisation for SCADA systems is AIC (Availability, Integrity, Confidently). Understanding the network architecture of SCADA systems is critical to effectively evaluate their security status. Industrial automation and control represent the traditional use of SCADA systems, and on the surface seem to represent a clear case where data must be protected to preserve competitive advantage. Some typical attacks that might be mounted against SCADA systems which employ standard hardware and software are: Malicious code such as viruses, Trojan horses and worms Unauthorised modification and manipulation of critical data Unauthorised disclosure of data Details of service Unauthorised access to audit logs and modification of audit logs Some of the possible SCADA attack targets that would be affected are: oil production which includes those controlling port energy, communications, water, bridges, dams, and pipelines. 6

Common protocols for data exchange are essential to make wide access to Conclusion SCADA data possible. Several points in a SCADA system provide opportunities for open access. Different trade-offs arise at each level, from very simple analogue interfaces at the lowest levels to wide area network protocols at higher levels. SCADA systems are exposed to the same cyberspace threats as any business system because, they share the common vulnerabilities with the traditional IT systems. As such, it is beneficial to formulate and enforce security standards to strengthen the cyber security of SCADA networks. With the advent of the terrorist threat to the nations' critical infrastructures, SCADA systems no longer have low-visibility, as anonymous entities work silently to control / tamper industrial and commercial operations. About the Author Mohammed Samiuddin spearheads the branding aspects & managing client relationships of. His passion includes speaking on cyber security threats, data security practices and new technological areas. Reference John Heidemann and Wei Ye Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security Ronald.L Krutz., Securing SCADA systems, Wiley, 2006 About Institute of Technology, Management and Research (), a division of Mamta Trust, is a premier institute that provides world class professional training programs for the corporates and academic sector. 's motto 'yogah karmasu kausalam' means 'Yoga is excellence in action' and is the foundation of its vision to evolve into a "CENTRE OF EMINENCE" to offer cutting edge vocational skills and mold professionals to become business and technical domain experts. 's professional and corporate training programs include several cutting edge to help working professionals acquire domain expertise and meet the current and emerging challenges in the IT world. Our flagship training program on Cyber security has PDCIL is a top of the class cyber security program in the country training top officials in the Police departments, Indian and International Banks, Military, Legal fraternity, Fortune 100 Global companies and Blue Chip India IT companies. also offers research programs on Cyber Security (network security monitoring and access products), in association with Secure IQ, a leading provider of network security software products with headquarters in Fairfax, Virginia, USA and operations and development in Chennai, India. Institute of Technology Management & Research (Division of Mamta Trust) 2/850, Mugaliwakkam Road, Mugaliwakkam, Chennai - 600 125, Tamil Nadu, INDIA. Admin Office: HTC Towers, No.41, GST Road, Guindy, Chennai 600 032, Tamil Nadu, INDIA. Phone: +91 44 4345 3500 / +91 44 4345 3349 Contact for More Information: training@htcitmr.ac.in 7