CYBER SECURITY. Novel Approaches for Security in Building Automation Systems. J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S.



Similar documents
A Cost-efficient Building Automation Security Testbed for Educational Purposes

Cyber Defense. BACnet Security & Smart Building Botnets. Steffen Wendzel. steffen.wendzel@fkie.fraunhofer.de

Security Issues with Integrated Smart Buildings

Comprehensive Solutions for Data Centers. Rely on Siemens for maximum uptime, reliability, and efficiency.

Solution for the integration of the security systems in the global building automation system

A Model-based Methodology for Developing Secure VoIP Systems

A Systems Approach to HVAC Contractor Security

Cyber Protection for Building Automation and Energy Management Systems

Intrusion Detection for SCADA Systems

Smart Integration of Wireless Temperature Monitoring System with Building Automation System

Tk20 Network Infrastructure

MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May Contents

SURVEY OF INTRUSION DETECTION SYSTEM

European Network for Cyber Security

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Integrating fire alarm systems with building. Fire Alarm Systems with Building Automation and Control Systems INTEGRATING INTRODUCTION

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

The IoT s application to protect your family

Protecting Your Organisation from Targeted Cyber Intrusion

Frankfurt Data Centre Overview

Cisco IPS 4200 Series Sensors

Taxonomy of Intrusion Detection System

How To Manage Security On A Networked Computer System

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

How To Protect A Web Application From Attack From A Trusted Environment

Closing Wireless Loopholes for PCI Compliance and Security

BACnet for Video Surveillance

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Intelligent. Data Sheet

CHAPTER 1 INTRODUCTION

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

ABB s approach concerning IS Security for Automation Systems

Protected, connected and a whole lot more.

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters

ULTIMATE GUIDE TO BUILDING AUTOMATION SYSTEM (BAS)

Intrusion Detection Systems

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

System Specification. Author: CMU Team

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Complete Protection against Evolving DDoS Threats

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

May 26, 2011, Strategic Planner Circle Innovation Management at Siemens Building Technologies Division Lucas Schmid, Head of Strategy

Defence Cyber Protection Partnership Cyber Risks Profile Requirements

Android Application for Accessing KNX Devices via IP Connection

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

NIST Cybersecurity Framework Manufacturing Implementation

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Smart cyber security for smart cities

Concerns of global warming, rising oil prices, energy security,

Wireless Local Area Network Deployment and Security Practices

IDS or IPS? Pocket E-Guide

CTS2134 Introduction to Networking. Module Network Security

Effective Methods to Detect Current Security Threats

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Unisys Security Solutions

SCADA SYSTEMS AND SECURITY WHITEPAPER

New Era in Cyber Security. Technology Development

Who is Watching You? Video Conferencing Security

External Supplier Control Requirements

Cisco Remote Management Services for Security

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Data Security Concerns for the Electric Grid

Data Security Incident Response Plan. [Insert Organization Name]

IT - General Controls Questionnaire

Intro to Firewalls. Summary

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

SANS Top 20 Critical Controls for Effective Cyber Defense

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Covert Operations: Kill Chain Actions using Security Analytics

A Study on Integrated Security Service Control Solution Development about CRETA Security

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Global Partner Management Notice

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

N-Dimension Solutions Cyber Security for Utilities

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

First Line of Defense

Maruleng Local Municipality

Cyber Security and Insider Threat: Research and Challenges

Transcription:

Novel Approaches for Security in Building Automation Systems J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S. Szlósarczyk jaspreet.kaur@fkie.fraunhofer.de CYBER SECURITY

Outline n Building Automation Systems (BAS) n Security threats in BAS n Protocols used in BAS n Our Approach n Traffic normalization n Visualization techniques n Conclusions and Future Work

What are Building Automation Systems? n Centralized control, monitoring and management of services such as HVAC and lighting in buildings n Safety for inhabitants n Facility management n Energy management strategies to reduce operating and energy costs

HVAC Elevator Lighting Video surveillance Heating Fire alarm Temperature control Smoke detector Meter automation of Electricity, Gas & Water Intrusion detector

Are these automated (smart) buildings really secure?

Security Threats in BAS n Current security threats according to Kastner et al.: Network Attacks: q Attack on the network medium to access the exchanged data q Manipulation, fabrication or interruption of the transmitted data Device Attacks: q On Software Level: code injection, exploiting algorithms q On Physical Level: component replacement n Emerging security threats according to Wendzel et al.: Smart botnets and data leakage: q Hidden exfiltration of sensor data (e.g. monitoring of inhabitants or employees)

Protocols used in BAS n KNX, a protocol for Home and Building Controls n LonTalk, a protocol created by Echelon Corporation for networking devices n BACnet, a network communications protocol for building automation and control systems

Our approach towards BAS security n Focus on BACnet protocol n BACnet is used by more than 800 BAS device vendors worldwide n Vulnerable to attacks due to spotty implementation of security features n Our approach towards securing BACnet includes: q traffic normalization q visualization techniques for BACnet data

Traffic Normalization Internet Intranet Normalizer Figure. A general scheme of traffic normalization

Traffic Normalization for BACnet Our traffic normalizer is an extension for Snort (a network intrusion detection system), n integrated into routers that interconnect BACnet network segments in order to monitor the traffic exchanged between the devices n drops or modifies the packets containing malicious or non-compliant content n uses normalization rules as a basis, which enforces the known protocol specification Examples: Drop the packet when protocol version is not 0x01. Modify the packet by setting DLEN=0 and DADR=0 if the message is a remote broadcast.

Testbed to evaluate Traffic Normalizer Figure. Virtual testbed for BACnet traffic

Importance of Visualization Techniques for BAS data Problem: n BAS operators face the challenge of spotting significant events in a large ocean of simultaneously occurring events n Monitoring of such unusual events can become demanding for BAS operators Solution: n Tailored visualization techniques could be helpful while performing BAS anomaly detection or announcing alarms in such situations

Evaluation of Visualization techniques Usability experiment: n Conducted with five full-time building operators from University of Applied Sciences in Augsburg n Operators were asked to fill out a questionnaire regarding: q type of BAS they use q duration of their working experience with BAS Comparison of different methods: n Temporal mosaic chart: three out of five operators were able to correctly identify a particular sensor as the source of a problem n Entropy-enriched Gantt chart: five out of five operators were able to correctly identify a particular sensor as the source of a problem n Log file analysis: none of the five participants could determine the error correctly

Area of interest (AOI) timing details Gantt average Mosaic average time to first fixation 6.01 sec 12.06 sec first fixation duration 0.19 sec 0.13 sec total fixation duration 3.61 sec 10.16 sec visit count 7 11 Table. Overview of the AOI timing details

Results Figure. Comparison of absolute duration heat maps generated for one of the operators. (left: temporal mosaic chart, right: entropy-enriched Gantt chart).

Conclusions and Future Work n Traffic normalizers can be effective in handling different types of network attacks in BAS n Effective visualization of unusual events is necessary in BAS data n Gantt charts are a better choice for BAS event visualization compared to Temporal mosaic charts and Log files n Plan: n Visualize network data in addition to application data n Improve detection and visualization of traffic anomalies n Expand the results to other BAS protocols

Thank you for your attention! Our Expertise: n Secure Building Automation Systems n Data Leakage Protection n Network Steganography/ Network Covert Channels Jaspreet Kaur Researcher Cyber Security Fraunhofer FKIE, Bonn jaspreet.kaur@fkie.fraunhofer.de This work was partially supported by the German Federal Ministry of Education and Research (BMBF) through project BARNI, project number 16KIS0148.

References 1. Granzer, W., Praus, F., Kastner, W. : Security in building automation systems, in IEEE Transactions on Industrial Electronics, IEEE, 2010. 2. Wendzel, S., Zwanger, V., Meier, M., Szlósarczyk, S. : Envisioning Smart Building Botnets, in Proc. GI Sicherheit 2014, LNI 228, pp. 319-329, GI, Vienna, March 2014.