The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems



Similar documents
Cyber Security Modeling and Assessment of SCADA System Architectures

Innovative Defense Strategies for Securing SCADA & Control Systems

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Models for Cyber Security Analysis

Cyber-Physical System Security of the Power Grid

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

Goals. Understanding security testing

ABB s approach concerning IS Security for Automation Systems

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

13 Ways Through A Firewall What you don t know will hurt you

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

Network Cyber Security. Presented by: Motty Anavi RFL Electronics

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

Document ID. Cyber security for substation automation products and systems

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Commissioners Irving A. Williamson, Chairman Daniel R. Pearson Shara L. Aranoff Dean A. Pinkert David S. Johanson Meredith M.

Security Issues with Integrated Smart Buildings

Update On Smart Grid Cyber Security

Cyber Security Metrics Dashboards & Analytics

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

13 Ways Through A Firewall

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Payment Card Industry (PCI) Data Security Standard

Penetration Testing. Presented by

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

A Biologically Inspired Approach to Network Vulnerability Identification

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

How To Secure Your System From Cyber Attacks

Understanding SCADA System Security Vulnerabilities

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

N-Dimension Solutions Cyber Security for Utilities

Data Security Concerns for the Electric Grid

Smart Substation Security

Cyber Security. Smart Grid

SCADA/ICS Security in an.

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Security Policy JUNE 1, SalesNOW. Security Policy v v

8 Steps for Network Security Protection

Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Cyber security. Protecting critical infrastructure in a changing world

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

8 Steps For Network Security Protection

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

SANS Top 20 Critical Controls for Effective Cyber Defense

External Supplier Control Requirements

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA/Business Network Separation: Securing an Integrated SCADA System

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Cyber Security for SCADA/ICS Networks

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet

IT Security and OT Security. Understanding the Challenges

CYBERTRON NETWORK SOLUTIONS

DeltaV System Cyber-Security

ISACA rudens konference

Agenda , Palo Alto Networks. Confidential and Proprietary.

Detailed Description about course module wise:

Defending Against Data Beaches: Internal Controls for Cybersecurity

The Importance of Cybersecurity Monitoring for Utilities

Security Testing in Critical Systems

SCADA SYSTEMS AND SECURITY WHITEPAPER

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

APT Advanced Persistent Threat Time to rethink?

SCADA Security Measures

Process Control Networks Secure Architecture Design

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Cyber Exercises, Small and Large

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Transcription:

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm

Agenda Dept. for Industrial Information and Control Systems, KTH Cyber Security Modeling Language (CySeMoL) Areas for collaboration / exchange

Industrial Information and Control Systems Research Focus is on developing theories, methods and prototypes in order to contribute to the development of cost-effective and resilient industrial ITsystems In particular for electric power utilities - the department has ever since its start in 1989 had a close cooperation with the power industry. Research groups Size Power System Mamagment with related Information Exchange Information and Control Systems Architecture Cyber Security Technology Management approximately 30 people out of which 5 faculty

Cyber Security @ Industrial Information and Control Systems Research areas Security analysis of enterprise-level information systems architectures (user/customerside system architectures) In particular for power utilites (i.e. SCADA and substation automation systems, and smart grid architectures) Information Security Managment (security governance and organization) Methodolodigal approach Information systems architecture modelling Attack/defense graphs Probabilistic analyses People 3 faculty, 3 PhD students (1 industry),1 post doc (upstarting) +1, 1 programmer Projects/financing EU FP7: VIKING finished (security of traditional SCADA) EU FP7: SEGRID (smart power grid cyber security) EU ERA-NET: SALVAGE (smart low-voltage power grid cyber security) Swedish Centre for Smart Grids and Energy Storage Swedish National Grid/ Swedish Defence Research Agency European Institute of Innvation and Technology / InnoEnergy (comersialization)

Agenda Dept. for Industrial Information and Control Systems, KTH Cyber Security Modeling Language (CySeMoL) Areas for collaboration / exchange

Cyber security managment is difficult! Is my control system secure enough Interconnected Complex architecture and data flow Many vendors (incl. off-the-shelf components) CISO(etc.) Which parameters decides cyber security

CLARiiON CLARiiON CLARiiON Any vulnerabilities And where are they Office LAN Workstation for operators Advanced Workstations DMZ LAN Firewall SCADA LAN Firewall Historic Webserver A SCADA Server (Online/Standby) B Communication Equipment (Front-End) Application Servers Modem ICCP Communication Networks Firewall And how do vulnerabilities relate Other System Vendors Control Centers Firewall Automation Systems for Substations RTU / PLC RTU / PLC RTU / PLC INTERNET WAN Geographically distributed process

In practice, cyber security management and design has limited resources Should I spend my budget on: a training program for my staff, logging functionality, or network scanning

Cyber Security Modeling Language (CySeMoL) in summary An IT Auto-CAD Tool - User draws maps of IT architecture components/assets and their connections (current or future). - Tool provides a heat map of how secure or vulnerable different parts of an IT architecture are towards cyber attacks - The tool simulates hacker attacks and assesses risks in architecture components/assets through combining user input on system properties with built-in security expertise.

CySeMoL screen shot

CySeMoL screen shot attack success Green low probability Yellow medium probability Red high probability

CySeMoL screen shot attack success in detail (same system model but each attack step visualized individually)

The underlying magic: Attack / defense graphs Anti-malware Network intrusion detection system Access as root to operating system Execute arbitrary code Exploit Establish connection Vulnerability exist

Bayesian networks Exploit T T T T F F F F Attack and defense graphs Anti-malware T T F F T T F F Network intrusion detection T F T F T F T F Anti-malware Network intrusion detection system Access as root to operating system Execute code (TRUE) 0.21 0.32 0.41 0.7 0 0 0 0 Execute arbitrary code Exploit Establish connection Vulnerability exist

Bayesian networks Exploit T T T T F F F F Attack and defense graphs Anti-malware T T F F T T F F Network intrusion detection T F T F T F T F Access as root Execute code (TRUE) 0.21 0.32 0.41 0.7 0 0 0 0 Anti-malware Network intrusion detection system T T T Execute arbitrary code Exploit T T Establish connection Vulnerability exist

Attacks and defenses relation to assets Network Interface Network zone Anti-malware Operating System Access as root Execute arbitrary code Network intrusion detection system Application Service Exploit Vulnerability exist Establish connection

Studies/topics covered by CySeMoL Attacks/malicious activities: Zero-day discovery Memory corruption exploitation Web application exploitation (XSS, RFI, SQLi, Command injection) Social engineering Code injection using removable media Password guessing (online/offline) Denial of service Man-in-the-middle Discovery of unknown entry-points Includes 59 attack steps

Studies/topics covered by CySeMoL Defenses Network intrusion detection systems Both detection and prevention-based Host intrusion detection systems Web application firewalls Anti-malware Firewalls Security training Encryption Software development best practice methods Network management (e.g., scanning, USB policy, etc) Includes 58 defense types

Studies/topics covered by CySeMoL Assets IT services Software components Operating systems Communication networks Users User accounts Data flow Protocols 23 asset types, 51 system relations types

Agenda Dept. for Industrial Information and Control Systems, KTH Cyber Security Modeling Language (CySeMoL) Areas for collaboration / exchange

Areas for collaboration / exchange Attack graphs, attack graphs, attack graphs Refine attacks Expand attacks in novel areas Specialize for smart grids Automatic modeling / data collection Automatic design In an academic setting or in a start-up company

Thank you for listening Contact me! mathias.ekstedt@ics.kth.se More info www.ics.kth.se/cysemol