How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System



Similar documents
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

SCADA Systems Security

PLCs and SCADA Systems

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Designing a security policy to protect your automation solution

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

Keeping the Lights On

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Holistic View of Industrial Control Cyber Security

Understanding SCADA System Security Vulnerabilities

Wireless Communications for SCADA Systems Utilizing Mobile Nodes

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

Vulnerabilities in SCADA and Critical Infrastructure Systems

Assessment and Remediation of Vulnerabilities

Security Testing in Critical Systems

High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems:

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery

Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection

Cyber Security Initiatives and Issues

ISACA rudens konference

Monitoring & Control of Small-scale Renewable Energy Sources

SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist

SCADA SYSTEMS AND SECURITY WHITEPAPER

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

The Myths and Facts behind Cyber Security Risks for Industrial Control Systems

Using ISA/IEC Standards to Improve Control System Security

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

SCADA Systems Automate Electrical Distribution

Design and Implementation of SCADA System Based Power Distribution for Primary Substation (Control System)

Introduction To SCADA and Telemetry

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

Making the most out of substation IEDs in a secure, NERC compliant manner

SCADA Protocols and Security

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)

Security Aspects of SCADA and Corporate Network Interconnection: An Overview

Innovative Defense Strategies for Securing SCADA & Control Systems

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

Open Enterprise Architectures for a Substation Password Management System

Cyber Security of the Power Grid

Security Issues with Integrated Smart Buildings

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AutoLog ControlMan. Remote Monitoring & Controlling Service

SECURE AND FUTURE-READY SCADA CONTROL SYSTEMS PREPARE YOUR CRITICAL INFRASTRUCTURE FOR WHAT HAPPENS NEXT

Cyber Security of the Smart Grid

Data and Command Encryption for SCADA

SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

INDUSTRIAL CYBERSECURITY FOR POWER SYSTEM AND SCADA NETWORKS

GAO CRITICAL INFRASTRUCTURE PROTECTION. Challenges and Efforts to Secure Control Systems. Report to Congressional Requesters

From SCADA and ICS to the Internet of Things. Andy Swift Infrastructure Team Lead CNS Group

SCADA Security: Challenges and Solutions

RuggedCom Solutions for

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Network Security Infrastructure Testing

Designing secure networks for substation automation and control systems

HMS Industrial Networks. Putting industrial applications on the cloud

Security Issues for the Power Automation Industry in Central/South America. Juan Esteban Hoyos Pareja Timothy X. Brown Mark Dehus

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Practical Considerations for Security

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

IT Security and OT Security. Understanding the Challenges

WHITE PAPER. Securing Process Control Networks

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

HMS Industrial Networks

Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

The SCADA Security Challenge: The Race Is On

Introduction to Cyber Security / Information Security

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones

Cyber Security in a Modern Process Network. Philip Nunn Product Manager - Industrial Networks

Secure Substation Automation for Operations & Maintenance

Vendor System Vulnerability Testing Test Plan

SCADA/Business Network Separation: Securing an Integrated SCADA System

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

This is a preview - click here to buy the full publication

ACE3600 HIGH PERFORMANCE MONITORING & CONTROL REMOTE TERMINAL UNIT

Goals. Understanding security testing

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

INSIDE. Information Security Challenges in the Electric Power Industry

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Secure Networking for Critical Infrastructure. Ilan Barda March 2014

Securing Industrial Control Systems in the Chemical Sector. Roadmap Awareness Initiative Making the Business Case

THE SCADA REVIEW: SYSTEM COMPONENTS, ARCHITECTURE, PROTOCOLS AND FUTURE SECURITY TRENDS

Web SCADA Employing Application Program Interface as Data Source

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Document ID. Cyber security for substation automation products and systems

Network Security Administrator

State of the State of Control System Cyber Security

Securing Distribution Automation

What is Really Needed to Secure the Internet of Things?

Transcription:

Network Security in Power Systems Maja Knezev and Zarko Djekic

Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion

Introduction Generator User Providing electrical energy in the power system at a minimal cost with a due respect to safety and reliability.

Protective control Protective relays are designed to respond to system faults such as short circuits. Transmission relaying must locate and isolate a fault with a sufficient speed to preserve stability, to reduce fault damage and to minimize the impact on the rest of the system.

Load Load Generator Transmission Network Generator Circuit Breaker Load Protective Relay Relays should respond when fault occurs but they should not respond in any other situation

EMS(Energy Management System) CONSISTS OF computers, display devices, software, communication channels and remote terminal units that are connected to RTUs, control actuators in power plants and substations. PURPOSE: to manage the production, purchase, transmission, distribution and sale of electrical energy in the power system. It provides status of huge area to operator who makes decisions and it is capable of making decisions automatically by itself.

System Control And Data Acquisition SCADA CONSISTS OF one or more computers with appropriate applications software connected by a communications system to a number of RTUs placed at various locations to collect data. Communication protocols differ from substation to substation. PURPOSE: provides three critical functions -Data Acquisition -Supervisory control -Alarm Display and Control -Supports operator control of remote (or local) equipment

RTU(Remote Terminal Unit) RTUs are microprocessor based computers which contain ADC and DAC, digital inputs for status and digital output for control. PCL (Programmable Logic Controller) PCLs have extended I/O and control outputs can be controlled by software residing in PLC as well as via remote commands from a SCADA. The PLC user can make changes in the software without major hardware or software changes. Both have many real time communication links inside and outside the substation or plants

Attacks using power system Attacks upon the power system Attacking two substations simultaneously in order to cause a black out Attacks by the power system Using dangerous nature of power plants for generating attack (chemical, biological agents) Attacks through the power system Using some installations of the power system to attack civil infrastructure. For example by coupling an electromagnetic pulse through the grid computer and telecommunications infrastructure could be damaged

SCADA system attacks On the Ohio Davis-Besse nuclear power plant process computer, a 2003 Slammer worm attack, which disabled a nuclear safety monitoring system over five hours A wireless link to the SCADA system for the Queensland, Australia, Maroochy Shire sewage control system in 2000 was exploited by one Vitek Boden. This attack caused millions of gallons of sewage to be dumped into Maroochy waterways over a four-month period. Security consultant Paul Blomgren and his associates were hired to assess SCADA vulnerabilities at a large southwestern power utility, they were able to penetrate the power station s operational control network and computer systems through wireless connections from laptops in a vehicle parked outside of the plant.

SCADA/EMS vulnerabilities Network Architecture vulnerabilities Physical connection vulnerabilities RTUs and IDEs vulnerabilities Protocol vulnerabilities

Network Architecture vulnerabilities 20 years ago - separated Administrative and Control networks Today networks are tightly coupled Connection between SCADA and other corporate networks are not protected by strong access controls

Physical connections vulnerabilities Internet connection between remote devices and control center in order to avoid more expensive private lines Wireless connections Dial up telephone lines

RTUs and IDEs vulnerabilities Physical security Many RTUs and IDEs have no password protection Many actuators (breakers, pumps) have its own network connection

Protocol vulnerabilities Many plain-text SCADA protocols are developed for private serial networks in 60s and 70s and today they have been adapted to function over TCP/IP (MODBUS, FIELDBUS, DNP3) Standard wireless protocols vulnerabilities (IEEE 802.11b)

Solutions Physical network insulation Separate intranet (SCADA/EMS) network and external network physically X X X Ref. [5]

Firewall Technique Firewalls - between enterprise network and Internet Intrawalls - between enterprise and process control network NISCC, BCIT; Firewall Deployment for SCADA and Process Control Networks, February 2005 Ref. [9]

Physical connections Private lines Dial back modems Private wireless protocols VPN (Virtual private network) -IPsec -PPTP (Point-to to-point Tunneling Protocol)

RTUs and IDEs Assure physical security of all remote sites connected to network Do not allow live network access point at remote, unguarded sites Disable all necessary connections to RTUs, IDEs and actuators Update firmware

RTUs and IDEs Interface between network and devices

Security Policies Password policy Identification and Authentication of Users Secure E-mail E (PGP, PEM) Intrusion detection System Redundancy System Backup and Recovery plan

Conclusion SCADA/EMS networks were initially designed to maximize functionality and reliability, with little attention paid to security SCADA/EMS networks can be very vulnerable and that could result huge consequence to public safety and disruptions in the nation s critical infrastructure. No unique and entire solution every network is different and requires custom solution

References [1]Ronald L. Krutz; Securing SCADA Systems; Wiley Publishing, Inc. 2006 [2]George D. Jelatis, Information Security Primer, EPRI 2000 [3]21 Steps to Improve Cyber Security of SCADA Networks, President's Critical Infrastructure Protection Board, U.S. Dept. of Energy, 2002 [4]A.Creery, E.J.Byres,Industrial Cybersecurity for Power System and SCADA,IEEE Paper No. PCIC-2005-34 [5]M.T.O. Amanullah, A. Kalam,A. Zayegh, Network Security Vulnerabilities in SCADA and EMS, IEEE/PES 2005 [6]Yongli Zhu, Baoyi Wang, Shaomin Zhang; The Analysis and Design of Network and Information Security of Electric Power System, IEEE/PES 2005 [7]Göran N. Ericsson, On Requirements Specifications for a Power System Communications System, IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 20, NO. 2, APRIL 2005 [8]Alan S. Brown, SCADA vs. the Hackers, Mechanical Engineering Dec. 2002 [9]NISCC, BCIT; Firewall Deployment for SCADA and Process Control Networks, February 2005