Cyber-physical Systems Security An Experimental Approach



Similar documents
Rocking the Pocket Book: Hacking Chemical Plants for Competition and Extortion. Marina Krotofil

What is Really Needed to Secure the Internet of Things?

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Project 25 Security Services Overview

Industrial Security Solutions

SCADA/ICS Security in an.

SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Industrial Communication. Securing Industrial Wireless

DeltaV System Cyber-Security

Security Controls Implementation Plan

Protecting Your Organisation from Targeted Cyber Intrusion

Dr. György Kálmán

Security Issues with Integrated Smart Buildings

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

The Importance of Cybersecurity Monitoring for Utilities

ICTN Enterprise Database Security Issues and Solutions

Are you prepared to be next? Invensys Cyber Security

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Security Issues in SCADA Networks

External Supplier Control Requirements

Cyber Security for SCADA/ICS Networks

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Client Server Registration Protocol

Protecting Organizations from Cyber Attack

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Protecting Critical Infrastructure

Beyond the Hype: Advanced Persistent Threats

Application Security in the Software Development Lifecycle

Evolution Of Cyber Threats & Defense Approaches

Advanced & Persistent Threat Analysis - I

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

SURVEY OF INTRUSION DETECTION SYSTEM

OPC & Security Agenda

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

CESG Certification of Cyber Security Training Courses

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Bio-inspired cyber security for your enterprise

Web Security School Final Exam

A 360 degree approach to security

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

How Secure is Your SCADA System?

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

SCADA Security: Challenges and Solutions

External Supplier Control Requirements

Ovation Security Center Data Sheet

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

IQware's Approach to Software and IT security Issues

I N T E L L I G E N C E A S S E S S M E N T

A Systems Engineering Approach to Developing Cyber Security Professionals

INTRUSION PREVENTION AND EXPERT SYSTEMS

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

Building Secure Networks for the Industrial World

Cyber Security of the Smart Grid

Endpoint Threat Detection without the Pain

Understanding SCADA System Security Vulnerabilities

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Security Policy JUNE 1, SalesNOW. Security Policy v v

The Cyber Threat Profiler

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Enterprise Computing Solutions

OCR LEVEL 3 CAMBRIDGE TECHNICAL

RUAG Cyber Security. More security for your data

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

N-Dimension Solutions Cyber Security for Utilities

Penetration Testing - a way for improving our cyber security

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

How To Secure An Rsa Authentication Agent

Intrusion Detection for Mobile Ad Hoc Networks

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Infinity Acute Care System monitoring system

TLP WHITE. Denial of service attacks: what you need to know

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Building A Secure Microsoft Exchange Continuity Appliance

Stephen Coty Director, Threat Research

Penetration Testing. Presented by

SANS Top 20 Critical Controls for Effective Cyber Defense

Cyber Security Risk Mitigation Checklist

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Patching & Malicious Software Prevention CIP-007 R3 & R4

Information Security Basic Concepts

ANDRA ZAHARIA MARCOM MANAGER

Transcription:

Cyber-physical Systems Security An Experimental Approach Dieter Gollmann, Marina Krotofil Security in Distributed Applications, Hamburg University of Technology helped by Pavel Gurikov, Alexander Isakov, Jason Larsen, Alexander Winnicki

Security is a fashion industry

Whoever thinks his problem can be solved using cryptography, doesn t understand his problem and doesn t understand cryptography Roger Needham, Butler Lampson

Security is a strange area; solving a problem in general is often easier than solving its specific instances Fred Schneider

Cyber-physical Systems Cyber-physical systems (CPS) are physical and engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing and communication core. Such systems use computations and communication deeply embedded in and interacting with physical processes to add new capabilities to physical systems. These cyber-physical systems range from miniscule (pace makers) to large-scale (the national power-grid). [National Science Foundation]

CPS in a Nutshell Cyber-physical systems are IT systems embedded in an application in the physical world Consist of sensors, actuators, control units, operator consoles, and communication networks Some of these systems are critical because they are part of an infrastructure critical for society Critical infrastructure protection has been a high profile topic for a decade at least Is this a matter of research or a matter of education?

Science of Cyber-physical Systems A new science of cyber-physical system design will allow us to create new machines with complex dynamics and high reliability; it will allow us to be able to apply the principles of cyber-physical systems to new industries and applications in a reliable and economically efficient way. Progress requires nothing less than the reintegration of physical and information sciences the construction of a new science and technology foundation for CPS that is simultaneously physical and computational. [National Science Foundation]

Securing CPS 1 st Attempt Focus on cyber-threats to the IT core e.g. attacks targeting network traffic e.g. attacks infecting nodes with malware e.g. attacks by unauthorized users View the cyber part of a cyber-physical system as an infrastructure Consider defences that protect this infrastructure Traditional IT security is infrastructure security Securing the networks Securing the operating system

Example SCADA Security Supervisory Control and Data Acquisition Computer controlled systems that monitor and control industrial processes in the physical world Favourite example: electrical grid Large body of literature on SCADA security, looks at intercepting and manipulating traffic infection by malware access by unauthorized users malicious actions by authorized users (insiders) manipulations with catastrophic consequences (terrorist threat, blackmail)

Defences Threats considered are in essence generic IT security threats Impact in the physical world only used to stress the importance of security Defences are generic IT security defences Firewalls, intrusion detection systems, authentication, access control, code signing, cryptographic mechanisms, proper security and risk management, etc. Educating industries introducing IT in their processes about potential IT specific dangers is commendable

Example Single public utility operating electrical grid, water supplies, public transport (familiar setup in Germany) Single network for electrical grid and public transport Terminals for the grid in the public domain! Solution: proper network separation Matter of education

Cryptography Useful for traffic protection Familiar design challenges Crypto for restricted devices, for restricted protocols Key management Can crypto get in the way of safety? Safety-critical alarms are better not encrypted When integrity check fails, message MUST be discarded Will there be time for a resend in safety-critical situations? Matter of education, for traditional communication security experts

What is Missing? Close integration between the cyber part and the physical part characteristic for CPS Meant to differentiate CPS from embedded systems Defences end at the interfaces between the physical world and the IT infrastructure No defence against attacks manipulating inputs before they are passed to the IT infrastructure A secure infrastructure will pass wrong data securely to their destination; this is not good for security

Attacks in the Physical Domain Attacker may manipulate inputs in the physical domain before they are fed to the IT infrastructure Manipulation of sensors Manipulation of the environment around sensors Misleading user input Attack goals: Get the system in a state desired by the attacker Make the system perform actions desired by the attacker Attacks use existing controls to influence system behaviour by manipulating inputs (physical domain) or by corrupting nodes in the system (cyber domain)

Manipulations of a controller have less to do with the confidentiality, integrity, and availability of information and more to do with the performance and output of a physical production process Ralph Langner on Stuxnet

Securing CPS 2 nd Attempt Treat IT core as a control system, not as an infrastructure What is new for the defender? What is new for the attacker?

We would never raise an alarm based on a single sensor reading; we rather combine readings from different types of sensors to assess the situation

Veracity What is new for the defender: don t trust your inputs, even if they are cryptographically protected Veracity: property that a statement about an aspect relevant in a given application truthfully reflects reality Not guaranteed by familiar IT infrastructure security services Authentication verifies the origin but not the veracity of assertions

Veracity Refers to aspects outside the IT infrastructure: the adversary is not an entity launching an attack in the infrastructure but an entity making false assertions Data are already false when fed to the infrastructure

Veracity May be achieved by tamper resistant sensors in tamper resistant environments Expensive, relies strongly on physical security May be achieved by correlating observed and expected (based on physical laws) relationships between variables Will depend on specific characteristics of the system

Example location services Establish location of a node by measuring its distance / position with respect to other nodes GPS: satellite signals (beacons) for establishing position Keyless car entry WLAN: find real coordinates by using received signal strength (RSS) for measuring distance to access points Internet: round-trip time (RTT) for measuring distance to construct synthetic coordinates Can be compromised by providing manipulated inputs Report wrong round-trip times Jamming of beacons Fake beacons

What is new for the attacker: having physical impact An attacker who gets access to the network can do whatever he wants to do Attacker may be able to create and traffic he wants Attacker is able to create any physical effect he wants??

What do we need to make progress in CPSS? Real(istic) cases for testing our assumptions Tennessee-Eastman process is a standard example in process research, but it is only one example We (security researchers) have looked at a vinyl acetate process monitored by a chemical engineer

Stages of cyber-physical attacks Access Cleanup Discovery Damage Control

Stages of cyber-physical attacks Access Cleanup Discovery Damage Control

Access

Traditional IT hacking 1 ActiveX 0day 1 Clueless user Mix and repeat until done AntiVirus and Patch Management Database Links Backup Systems

Discovery

Process discovery What and how the process is producing How it is controlled How it is built and wired

Stripper is. Stripping column

Understanding points and logic Ladder logic Programmable Logic Controller Piping and instrumentation diagram Pump on the plant

Maximal economic damage? Reaction Refinement Final product

Available controls Process does not operate in a vacuum If we adjust one of the valves what happens to everything else? How much can the process be changed before raising alarms or being shut down?

Control

Process control challenges Process dynamic is highly non-linear (???) UNCERTAINTY! Behavior of the process known to the extent of its model o So on to controllers. They cannot control the process beyond their control model

Control loop ringing Caused by a negative real controller poles

Outcome of the control stage Sensitivity Magnitude of manipulation Recovery time High XMV {1;5;7} XMV{4;7} Medium XMV{2;4;6} XMV{5} Low XMV{3} XMV {1;2;3;6} Reliably useful controls

Damage

Technician vs. engineer Technician Engineer It will eventually drain with the lowest holes loosing pressure last It will be fully drained in 20.4 seconds and the pressure curve looks like this

Process observation Chemical composition Analyzator Analyzator FT TT Analyzator Reactor exit flowrate Reactor exit temperature Analyzator

Technician answer Reactor with cooling tubes

Searching for answer Reactor with cooling tubes

Engineering answer Vinyl Acetate production

Product loss Product per day: 96.000$

Outcome of the damage stage Product per day: 96.000$ Product loss, 24 hours Steady-state attacks Periodic attacks High, 10.000$ XMV {2} XMV{4;6} Medium, 5.000$ - 10.000$ XMV{6;7} XMV{5;7} Low, 2.000$ - 5.000$ - XMV {2} Negligible, 2.000$ XMV {1;3} XMV {1;2}

Clean-up

Socio-technical system Maintenance staff Plant engineers Process engineers Cyber-physical system

Creating forensics footprint Process operators may get concerned after noticing persistent decrease in production and may try to fix the problem If attacks are timed to a particular maintenance work, plant employee will be investigated rather than the process 1. Pick several ways that the temperature can be increased 2. Wait for the next natural recalibration 3. Perform the first attack 4. Wait for the recalibration to be repeated 5. Switch to the next method 6. Go to 4

Creating forensics footprint Four different attacks

Defeating chemical forensics

Defenses

Defense opportunities Better understanding the hurdles the attacker has to overcome Understanding what she needs to do and why Eliminating low hanging fruits Making exploitation harder Wait for the attacker Certain access/user credentials need to be obtained Certain information needs to be gathered Building attack-resilient processes By design (slow vs. fast valves) Hardening (adjusting control cycle and/or parameters)

Conclusions For a CPS security analysis, one has to understand both sides of a cyber-physical system IT infrastructure Nature of the physical behaviors Safety-measures that block certain physical events Challenge for the security specialist Understanding the physical effects of actions in cyber-space Specific to (the class of) systems being analyzed Challenge for the process engineer Learning to think out of the box (salty cookie paradigm) Getting used to answering (apparently) weird security questions