A study of network vulnerability in



Similar documents
CONSTRUCTION AND MANAGEMENT OF A SECURE NETWORK IN SPRING-8

Perspective on secure network for control systems in SPring-8

ACHILLES CERTIFICATION. SIS Module SLS 1508

Packet Sniffing on Layer 2 Switched Local Area Networks

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Detection of illegal gateways in protected networks

Network- vs. Host-based Intrusion Detection

Network Layers. CSC358 - Introduction to Computer Networks

A STUDY OF INTRODUCTION OF THE VIRTUALIZATION TECHNOLOGY INTO OPERATOR CONSOLES

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15

UPPER LAYER SWITCHING

Monitoring high-speed networks using ntop. Luca Deri

Welcome. People Power Partnership PROFIdag 2013 Peter Van Passen System Application Manager HARTING nv 1/22

Additional Information: A link to the conference website is available at:

Load Balance Router R258V

Network Design. Yiannos Mylonas

Packet Sniffer Detection with AntiSniff

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Security Technology White Paper

Based on Computer Networking, 4 th Edition by Kurose and Ross

H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

Chapter 3 Management. Remote Management

Fifty Critical Alerts for Monitoring Windows Servers Best practices

NQA Technology White Paper

Chapter 8 Security Pt 2

ARCHIVING AND MONITORING OF STATUS FOR KSRS

Intel DPDK Boosts Server Appliance Performance White Paper

co Characterizing and Tracing Packet Floods Using Cisco R

Network performance and capacity planning: Techniques for an e-business world

D1.2 Network Load Balancing

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308

DOCUMENT REFERENCE: SQ EN FIXED BROADBAND WHITEBOX SAMKNOWS BRIEFING. August 2015

Communication Controller with IP services for leased lines and wireless links Radio Activity S.r.l.

Ethernet. Ethernet. Network Devices

theguard! Service Management Center (Valid for Version 6.3 and higher)

Network Pop Quiz 5 Brought to you by please visit our site!

MIMOTEC GigaLink AC. User Manual. Version 1.5 (8 January 2014) MIMOTEC, Norway & Sweden

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899

palm Switch Port 10/100 Base-TX Switch with Auto MDI/MDI-X User Guide

Introducing FortiDDoS. Mar, 2013

A Research Study on Packet Sniffing Tool TCPDUMP

Overlapping Data Transfer With Application Execution on Clusters

Chapter 4 Management. Viewing the Activity Log

AlliedWare Plus OS How To Use sflow in a Network

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Design and Implementation of Client Server Network Management System for Ethernet LAN

PCI Express High Speed Networks. Complete Solution for High Speed Networking

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

The ntop Project: Open Source Network Monitoring

User s Manual Network Management Card

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Precision Time Protocol on Linux ~ Introduction to linuxptp

HP Switches Controlling Network Traffic

Cisco Networking Academy CCNP Multilayer Switching

CSE 127: Computer Security. Network Security. Kirill Levchenko

Welcome. People Power Partnership PROFIdag 2013 Peter Van Passen Sales & Business Development Manager HARTING Electric 1/44

Chapter 4 Managing Your Network

JetNet 5428Gv2. Features. Industrial 24FE+4G Gigabit Managed Ethernet Switch INDUSTRIAL ETHERNET RACKMOUNT SWITCH

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.

Safeguards Against Denial of Service Attacks for IP Phones

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

XPrint UNIX System Printer Driver Installation SOLARIS 1.X (SUN OS) / SOLARIS 2.X

Insiders View: Network Security Devices

Autonomous NetFlow Probe

Network Management & Security (CS 330) RMON

Interfacing an HTML Form to the ez80f91 MCU

A Transport Protocol for Multimedia Wireless Sensor Networks

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect

Manual. IP Sensor and Watchdog IPSW2210. I P S W M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry.

Low-rate TCP-targeted Denial of Service Attack Defense

Overview of Computer Networks

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

8 EMBEDDED ETHERNET FUNCTION

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

PMS. Energy management and monitoring software. Installation and operation instructions. BMR trading Horní lán Olomouc Czech Republic

Real Time Performance of a Security Hardened RedHawk Linux System During Denial of Service Attacks

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM.

to-end Packet Loss Estimation for Grid Traffic Monitoring

Open Source in Network Administration: the ntop Project

Introduction to Network Discovery and Identity

BR Load Balancing Router. Manual

EMG Ethernet Modbus Gateway User Manual

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to

Wave Relay System and General Project Details

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Security of IPv6 and DNSSEC for penetration testers

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

Ethernet is Moving out of the Office into Harsh Industrial Environments.

Abstract. Introduction. Section I. What is Denial of Service Attack?

Gigabit Ethernet Design

Transcription:

A study of network vulnerability in embedded devices T. Sugimoto, M. Ishii, T. Masuda, T. Ohata, T. Sakamoto, and R. Tanaka Japan Synchrotron Radiation Research Institute (JASRI/SPring-8) 2nd Control System Cyber-security Workshop, October 11th, 2009, Kobe International Conference Center, Japan

Overview Introduction Problems at SPring-8 control system Investigation of vulnerabilities in embedded devices One example: motor control unit Improvement of reliability Implementation of embedded devices Refinement of network Summary

What is embedded system? Instruments with microcomputer for dedicated applications Implementations of embedded devices are black-boxed; details are not known by us, especially commercially available devices. Network (Ethernet) is used as a field bus of embedded devices. Network-connected embedded devices are very useful, but there are problems.

Problems of embedded devices Many problems of embedded devices had been occurred in SPring-8 control system. Device errors of digital multimeters Session lost of oscilloscopes and multi-channel analyzers Hang-up of moter-control units Accelerator operation failures (such as interruption of injection) are caused by these problems. Commercially available embedded devices are also used in other facilities; Not only SPring-8, but any facilities may be suffer from these problems.

Aim of present study Improve reliability of network-connected embedded devices investigate vulnerabilities in embedded devices motor-control unit (MCU) was concentrated studied. perform improvement implementation of embedded devices refinement of network system

Motor-control unit (MCU) MCU is one of the most important devices in SPring-8 control system. Many MCUs are used in control system; beam slits, RF phase adjuster and attenuators, and wire-grid monitors. MCU is a typical embedded device with limited resources. Real-time operating system (itron) Kernel is running on flash memory Fast Ethernet interface (100BASE-TX) Local control panel pulse-motor control boards Characteristic specification - CPU: SH-4 200MHz - OS: NORTi4 Flash-based system - Ethernet: 10/100BASE-TX - Protocol: TCP/IP, socket interface - Axis: 4-12 Ethernet interface

Problems at SPring-8 control system

Problem in SPring-8 control system Ethernet Embedded devices control message device control Operator Workstation VME CPU 1. Operator sends control message from WS to VME 2. VME controls devices (MCU) MCU drive motor 3. MCU drives pulse motor pulse motor

Problem in SPring-8 control system Ethernet Embedded devices status request Operator Workstation VME CPU 4. VME requests device status at few sec. intervals 5. MCU replies device status If... (i) Unexpected heavy traffic load status reply (ii) Interconnections between VME and MCU are lost MCU pulse motor

Vulnerability studies on embedded devices Vulnerability scans were performed using Nessus* utility. several devices are tested; digital multimeter (DMM), network switch, VME CPU, and motor-control unit (MCU). DMM and MCU, did not pass the test; These two devices are just the causes of SPring-8 operation failures. MCU was hang-up during primitive traffic stress test. We performed detail investigations on MCU. *Tenable Network Security: http://www.nessus.org/nessus/

Vulnerability studies on motor-control unit (MCU) We assumed broadcast traffic affects MCU. Number of nodes have been increased from 300 to 1200 for past 10 years. Broadcast traffic is proportionally increased. Broadcast burst (syslog flooding) have often occurred. We investigated relation between broadcast and MCU hang-up. Instantaneous load capability model of broadcast burst Continuous load capability model of generally flown broadcast By applying simulated load on MCU, traffic capabilities were measured.

Details of vulnerability investigation on MCU

Test bed for vulnerability scan load generator Load generator send dummy traffic to MCU status request dummy load status reply VME CPU Network switch monitor port capture MCU all traffic from and to MCU are captured. Packet monitor

Instantaneous load capability test Burst ping method load generator ping Load generator sends echo-request (~2000 pps) for a few seconds VME CPU Network switch monitor port capture pong MCU MCU sends echo-reply Packet monitor

Instantaneous load capability test using burst ping load generator 30ms 1 2 3 76 77 burst ping MCU 1 2 16 16 packets Only 16 packets are processed in 30 msec period. Exceeded packets are stored in buffer, packets are processed in the next period. If buffer is overflown, packet lost is occurred. 30ms 17 18 32 16 packets MCU cannot process such a low rate packets. (16packet/30msec 533pps)

Continuous load capability test SYN flooding method load generator Load generator send SYN packets to MCU continuously VME CPU status request status reply Network switch monitor port capture MCU MCU sends ACK/RST packets Packet monitor

Continuous load capability test using SYN flooding load generator MCU VME CPU Communication packets between VME and MCU are monitored. If SYN flooding is < 100pps, MCU is no problem. SYN flooding < 100 pps

Continuous load capability test using SYN flooding load generator MCU VME CPU Communication packets between VME and MCU are monitored. If SYN flooding is < 100pps, MCU is no problem. > 100 pps SYN flooding no response time-out If rate exceeds 100 pps, status reply from MCU stopped. Then connection is timed out, and operation failure is occurred. Continuous packet > 100pps can not be processed by MCU.

Results of two vulnerability test Instantaneous load capability: 533 pps ( 16 packet/ 30 msec, with 64 byte short ping packet) Overflown packets are dropped. Continuous load capability: 100 pps (TCP SYN packet) No reply from MCU, and connection timed out. With detail analysis, not only listened ports, but also closed ports are affected; All packets having destination MAC address to MCU are harmful. TCP/IP implemetation of MCU cannot endure heavy traffic load

Examination of heavy traffic load in the actual control network We examined traffic flow of control network using sflow technology.** Many broadcasts flow NIS, Syslog, SNMP Trap, NetBIOS over TCP/IP, NTP, etc. We supposed that broadcast makes hang-up problem. Because SYN floods to any closed port are harmful. It is worth investigating correlation between broadcast traffic and hang-up. We analyzed number of hosts in our control network. Because broadcast traffic is proportional to number of hosts in L2 network. ** T. Ohata et al., ICALEPCS2009, TUP003, to be presented.

Analysis of relation between hosts and hang-up problem 1223 hosts on Apr. 2009 Frequency of hang-up problems was increased from 2007. The problem possibly related to broadcasts. 342 hosts on Jan. 2001 Rapidly increased in 2007

Our action to improve reliability of embedded devices in control system

How to improve reliability of embedded devices? We have two approaches. Tune-up of embedded devices MCU must endure more heavy traffic. Other devices may also be tuned up. Refinement of network environment Vulnerable devices should be protected from harmful traffic.

Tune-up of embedded devices We considered vulnerability of MCU to be tuned up. Continuous load capability Threshold (100 pps) may be restricted by access speed of flash memory. By substituting RAM-based system instead of flash-based, performance was clearly improved. (> 100pps, no problem) Instantaneous load capability Threshold (533 pps) may restricted by its OS. The OS (itron) is running under real-time mode. Using Linux on MCU, MCU endure burst ping more than 2000pps; this is a optional plan. We tuned up MCU to overcome continuous load capability. Firmware of MCU was refurbished as RAM-based system. Because broadcast traffic merely exceed 533 pps, but easily exceed 100 pps by syslog flooding from our sflow analysis.

Refinement of network environment We decided to refurbish control network.*** Old SPring-8 control network was /21 single-segment (L2) design. Broadcast domain is too large. New control network is multi-segment (L3) design. Broadcast traffic is dramatically reduced from > 30pps to < 1pps on each segment. Segmentation of SP8-LAN D-zone Synchrotron Storage Ring C-zone Now, no trouble on MCU have been reported after the refurbishment. NewSUBARU Linac A-zone Control Room B-zone (c) RIKEN/JASRI *** T.Sugimoto et al., ICALEPCS2009 WED006, to be presented.

Summary We had many problems on embedded devices. Limited resource (hardware/software) may cause problems. We investigated vulnerabilities of MCU. Important devices for SPring-8 control system Vendor s courteous support can be received. We thank Hitz company s cooperation. Vulnerabilities on implementation was clearly found. Both continuous and instantaneous load are harmful. We took action to improve reliability. Refurbishment of MCU Now, MCU is RAM-based system. Refinement of network environment No trouble has been reported on MCU.

Supplement 1 We also investigated digital multi meter (DMM). The DMM also had hung up with heavy traffic load. Implementation of the DMM is completely black-boxed. From our investigation, we found the DMM is Windows based embedded device. By substituting new firmware received from the DMM vendor, hang-up problem was solved. We suppose that problem is caused by vulnerability on Windows OS.

Supplement 2 Oscilloscope Our investigation is not enough to discuss. From preliminary investigation: CPU is very poor. File transfer rate is ~ 10 kbps. ARP learning delays; it takes > 1 sec. Multi-channel analyzer OS9 based embedded system Too old to be tuned up We gave up investigation on MCA.