What happens when you use nmap or a fuzzer on an ICS?



Similar documents
Missing the Obvious: Network Security Monitoring for ICS

You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell

Network Security Monitoring

INTRUSION DETECTION SYSTEMS and Network Security

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

Holistic View of Industrial Control Cyber Security

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Network Security Monitoring

IT Security and OT Security. Understanding the Challenges

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Network Security Monitoring

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Security Onion. Peel Back the Layers of Your Network in Minutes. Doug Burks

SANS Top 20 Critical Controls for Effective Cyber Defense

Critical Security Controls

Using Tofino to control the spread of Stuxnet Malware

RSA Security Analytics

RAVEN, Network Security and Health for the Enterprise

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

Intrusion Detection in AlienVault

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

OPC & Security Agenda

INTRUSION DETECTION SYSTEM

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment

Building a Security Operations Center Lessons Learned. active threat protection

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Firewalls & Intrusion Detection

Chapter 9 Firewalls and Intrusion Prevention Systems

Protecting Critical Infrastructure

FISMA / NIST REVISION 3 COMPLIANCE

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Richard Bejtlich / taosecurity.blogspot.com BSDCan 14 May 04

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Network/Internet Forensic and Intrusion Log Analysis

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Network Security Monitoring: Looking Beyond the Network

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Taxonomy of Intrusion Detection System

New Era in Cyber Security. Technology Development

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Comprehensive Advanced Threat Defense

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

How To Protect A Network From Attack From A Hacker (Hbss)

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

On-Premises DDoS Mitigation for the Enterprise

Architecture Overview

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Network- vs. Host-based Intrusion Detection

IBM. Vulnerability scanning and best practices

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Intrusion Detection System (IDS)

Closing Wireless Loopholes for PCI Compliance and Security

Network Instruments white paper

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

CSCI 4250/6250 Fall 2015 Computer and Networks Security

How To Manage Security On A Networked Computer System

Security Testing in Critical Systems

Concierge SIEM Reporting Overview

Bridging the gap between COTS tool alerting and raw data analysis

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

When prevention FAILS: Extending IR and Digital Forensics to the corporate network. Ismael Valenzuela

Cisco Secure PIX Firewall with Two Routers Configuration Example

Cyber Watch. Written by Peter Buxbaum

NERC CIP Version 5 and the PI System

Intrusion Detection Systems

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Breach Found. Did It Hurt?

Protecting Your Organisation from Targeted Cyber Intrusion

Seven Strategies to Defend ICSs

Malicious Network Traffic Analysis

Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015

USE HONEYPOTS TO KNOW YOUR ENEMIES

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Ovation Security Center Data Sheet

IDS : Intrusion Detection System the Survey of Information Security

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

DHS ICSJWG Fall Conference Maintaining Necessary Information Paths Over Unidirectional Gateways

Verve Security Center

Network/Cyber Security

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

RSA Security Anatomy of an Attack Lessons learned

CMPT 471 Networking II

Description: Course Details:

Cisco Cyber Threat Defense - Visibility and Network Prevention

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Linux Network Security

Transcription:

NSM 101 for ICS

About me Chris Sistrunk, PE Electrical Engineer Sr. ICS Security Consultant Control system security assessments ICS Village (DEF CON & RSA Conference) Entergy (11+ years) SCADA Engineer (10 years) Project Robus (ICS Protocol Fuzzing) 30+ implementation vulnerabilities in DNP3 stacks Substation Security Team BSidesJackson

What happens when you use nmap or a fuzzer on an ICS?

If ICS are so vulnerable, why haven t we seen more attacks? We aren t looking!

Two Key Reasons Intent Visibility

Intent Very little ICS targeted attack data Maroochy Shire to Stuxnet to German Steel Plant Why are targeted attacks different? It s a Who not a What Professional, organized, well-funded If you kick them out, they will return

Visibility

Visibility

Public ICS Vulnerabilities Per Year

If your ICS gets hacked you can t make gadgets water electricity anymore

Now what? More Gov t security regulations ICS security still lagging Breaches are inevitable Attacks aren t stopping Every sector Including ICS What can we do to get ahead of this???

Network Security Monitoring The collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. NSM is a way to find intruders on your network and do something about them before they damage your enterprise. - The Practice of Network Security Monitoring

Network Security Monitoring Invented in 1990, still in use today Cliff Stoll Stalking the Wily Hacker 1988 Todd Herberlein et al. A Network Security Monitor 1990 US Air Force Defense Information Systems Agency Lawrence Livermore National Lab Early 1990s NetRanger RealSecure Snort and many others Late 1990s - early 2000s Formal definition of NSM 2002

Before we start looking We need At least one person (to watch and hunt) The right tools to collect and analyze the data

The NSM Cycle Collection Model for action, based on network-derived data Requires people and process, not just technology Focuses on the adversary, not the vulnerability Analysis Detection

Methods of Monitoring Network tap physical device which relays a copy of packets to an NSM sensor SPAN or mirrored ports switch configuration which sends copies of packets to a separate port where NSM sensor can connect Host NIC configured to watch all network traffic flowing on its segment (usually on NSM sensor) Serial port tap physical device which relays serial traffic to another port, usually requires additional software to interpret data Stratus Engineering Fluke Networks

Types of Data Collected Full content data unfiltered collection of packets Extracted content data streams, files, Web pages, etc. Session data conversation between nodes Transaction data requests and replies between nodes Statistical data description of traffic, such as protocol and volume Metadata aspects of data, e.g. who owns this IP address Alert/log data triggers from IDS tools, tracking user logins, etc.

Difficulties for NSM Encrypted networks Widespread NAT Devices moving between network segments Extreme traffic volume Privacy concerns Issues that most ICS do not face!

Example ICS Enterprise/IT Web Historian or other DB DMZ HMI DCS Historian Plant PLCs, Controllers, RTUs, PACs Control

Anatomy of an Attack While attackers often use malware to gain an initial foothold, they quickly move to other tactics to execute their attacks. Unauthorized Use of Valid Accounts Known & Unknown Malware Command & Control Activity Suspicious Network Traffic Files Accessed by Attackers Valid Programs Used for Evil Purposes Trace Evidence & Partial Files Over all Mandiant attack investigations, only a little more than half of victim computers have malware on them. 20

Attacker Objectives Enterprise/IT Plant DMZ Attacker s goals: Damage equipment Affect or steal process info Cause safety or compliance issue Pivot from vulnerable ICS to enterprise HMI Control Web SCADA Historian or other DB Historian Attacker s options: Gain physical access to an ICS host Gain remote access to an ICS host Compromise a highly-privileged client machine with access to the ICS network PLCs, Controllers, RTUs, PACs

Let s do some NSM!

Let s do some NSM! Inquisitive mind NSM hunting tools NSM collection tools Protection

NSM Collection Enterprise/IT technology collectors Network sensors Logs and/or Agent Logs only Plant DMZ HMI Web SCADA Historian or other DB Historian Firewall Logs Session Data NIDS/HIDS Logs Full packet capture Windows Logs and syslog SNMP (CPU % etc.) Alerts from security agents (AV, whitelisting, etc.) Control PLCs, Controllers, RTUs, PACs

NSM Collection http://3.bp.blogspot.com/-b6pthevj9jg/uj4eeryhhdi/aaaaaaaaafe/i_2dk9emrp4/s1600/deer+tracks.jpg

What are we looking for? Exceptions from baseline (e.g. A talks to B but never C) Top Talkers Unexpected connectivity (to Internet, Business network) Known malicious IPs and domains Logins using default accounts Error messages that could correlate to vulnerabilities Unusual system and firewall log entries Host-based IDS or other security system alerts Unexpected file and firmware updates Antivirus alerts And others.

NSM Detection & Hunting Analyst looks at detected anomalies or alerts then escalates to IR! Plant DMZ HMI Control Web SCADA Historian or other DB Historian IDS alerts Anomaly detection Firmware updates, other commands Login with default credentials High CPU or network bandwidth Door alarms when nobody is supposed to be working Devices going off-line or behaving strangely PLCs, Controllers, RTUs, PACs

NSM Detection http://www.buckmasters.com http://www.jimyuskavitchphotography.com/data/photos/56_1wolf_track4.jpg

NSM Analysis Incident responders analyze the detected anomalies to find evil Plant DMZ Application exploitation Web Historian or other DB Third-party connections (ex. ICCP or vendor access) ICS-specific communication protocol attacks (ex. Modbus, DNP3, Profinet, EtherNet/IP) HMI Control SCADA Historian Remote access exploitation Direct network access due to poor physical security PLCs, Controllers, RTUs, PACs USB-delivered malware

NSM Analysis http://www.youtube.com http://alistairpott.com/wp-content/uploads/2008/05/rabbit-owl.jpg

ICS NSM Examples

Session Data Top Talkers FlowBAT characterizes Session Data, showing which nodes have the most traffic Web traffic Web traffic NetBios NTP SiLK and FlowBAT can be easily installed in Security Onion

Pcap Analysis for anomalies NetworkMiner can find potential ARP spoofing (as well as many other indicators)

Pcaps - Abnormal DNS Traffic NetworkMiner sees strange DNS requests originating from within the ICS

IDS alerts - Abnormal DNS Traffic DNS requests shown in the Bro IDS log in ELSA

Pcaps - Malformed Modbus Deep packet inspection of Modbus by Wireshark

IDS Logs Bro IDS DNP3 & Modbus More ICS protocols being developed by UIUC Snort IDS DNP3 & Modbus preprocessors ET SCADA & DigitalBond Quickdraw Snort rules Suricata IDS New DNP3 parser & ET SCADA rules

IDS Logs Bro IDS parses Modbus and DNP3 packets, ELSA consolidates Bro logs Modbus DNP3

IDS GUIs Alerts in Sguil of scanning activity

Syslog Syslog can be configured to send to a NSM sensor or detected in network traffic if sent elsewhere. This is the Bro IDS Log for Syslog from an RTU.

RTUs with Syslog SEL-3530 RTAC GE D20MX Novatech OrionLX Cooper SMP 16 If not require syslog and other logs in the ICS procurement language

NSM Tools for the 7 Data Types Security Onion Linux distribution Easy to install and lots of documentation Full packet capture Tcpdump/Wireshark/NetworkMiner Extracted content Xplico/NetworkMiner Session data Bro/FlowBAT Transaction data Bro Statistical data Capinfos/Wireshark Metadata ELSA (Whois) Alert data Snort, Suricata, Sguil, Snorby Peel Back the Layers of Your Network

Security Onion Tools

NetFlow Tools SiLK & FlowBAT Install on Security Onion with 2 scripts www.flowbat.com

Security Onion Implementation Test in a lab first Select suitable hardware platform More RAM is better Bigger hard drive is better (longer retention) Mirrored/SPAN port on router/switch or a good network tap Select proper placement of SO sensor The Practice of Network Security Monitoring Applied Network Security Monitoring Work with the right stakeholders if placing in production

SO for ICS = Security Ogre

NSM References/Resources The Cuckoo s Egg by Cliff Stoll https://www.youtube.com/watch?v=eckxaq1ftac 1-hour NOVA Special (1990) The Practice of Network Security Monitoring by Richard Bejtlich http://www.nostarch.com/nsm Applied Network Security Monitoring by Chris Sanders & Jason Smith http://www.appliednsm.com/ The NSM Wiki http://nsmwiki.org http://securityonion.net

Takeaways You can implement NSM in ICS today without impacting your operations There are free tools available to help you start looking at your ICS and hunting for evil

People the most important part of NSM! Gigabytes of data and 1000s of IDS alerts are useless without interpretation Analyze data collected to understand what s normal and what s not Identify adversary TTPs and act to disrupt them Remember Adversaries are a Who, not a What

Find Evil chris.sistrunk@mandiant.com @chrissistrunk