Achilles Assurance Platform. Dr. Nate Kube Founder / CTO Wurldtech



Similar documents
ACHILLES CERTIFICATION. SIS Module SLS 1508

Vulnerability Testing of Industrial Network Devices

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Linux Network Security

Secure Networks for Process Control

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

How To Test A Control System With A Network Security Tool Like Nesus

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

The Nexpose Expert System

On Shaky Ground - A Study of Security Vulnerabilities in Control Protocols. Eric J. Byres, Dan Hoffman & Nate Kube

CS5008: Internet Computing

Firewalls and Intrusion Detection

Cyber Security Implications of SIS Integration with Control Networks

co Characterizing and Tracing Packet Floods Using Cisco R

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Firewall Firewall August, 2003

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Cyber Essentials. Test Specification

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February Version 1.

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Additional Information: A link to the conference website is available at:

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Asset Discovery with Symantec Control Compliance Suite

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Firewalls Netasq. Security Management by NETASQ

Firewalls. Chapter 3

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Brocade NetIron Denial of Service Prevention

Security: Attack and Defense

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability)

Barracuda Intrusion Detection and Prevention System

Architecture Overview

Secure Software Programming and Vulnerability Analysis

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

CYBER SECURITY IMPLICATIONS OF SIS INTEGRATION WITH CONTROL NETWORKS

CIT 380: Securing Computer Systems

Strategies to Protect Against Distributed Denial of Service (DD

Classification of Firewalls and Proxies

Denial of Service Attacks

How to build a security assessment program. Dan Boucaut

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA. Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Vulnerability Assessment and Penetration Testing

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Payment Card Industry (PCI) Executive Report. Pukka Software

Goals. Understanding security testing

CMPT 471 Networking II

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Security Technology White Paper

Security of IPv6 and DNSSEC for penetration testers

UPPER LAYER SWITCHING

A S B

A denial of service attack against the Open Floodlight SDN controller

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Information Security. Training

INFORMATION SECURITY TRAINING CATALOG (2015)

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

CS 356 Lecture 16 Denial of Service. Spring 2013

Security vulnerabilities in the Internet and possible solutions

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Protecting Critical Infrastructure

Course Title: Penetration Testing: Security Analysis

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

CTS2134 Introduction to Networking. Module Network Security

Penetration Testing Report Client: Business Solutions June 15 th 2015

ensuring security the way how we do it

DATA CENTER IPS COMPARATIVE ANALYSIS

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Firewall Design Principles

Business Case for a DDoS Consolidated Solution

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Basics of Internet Security

Safeguards Against Denial of Service Attacks for IP Phones

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Stateful Firewalls. Hank and Foo

EVALUATION OF TOOLS FOR CYBER SECURITY

Managing Latency in IPS Networks

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Attack Lab: Attacks on TCP/IP Protocols

Transcription:

Achilles Assurance Platform Dr. Nate Kube Founder / CTO Wurldtech

Presentation Outline Statement of the Problem 3 rd Generation Achilles Assurance Platform Questions and Answers Achilles Certification Program Questions and Answers Demonstration

The Problem Adoption of COTS technologies in control networks has resulted in less isolation from the outside world Ease of connectivity facilitates misuse Merger of technologies has dramatically reduced the robustness and safety of control networks Minimal visibility into the real degree of the affect

What do we know about protocol vulnerabilities? Communication protocols are complex and their specifications may contain areas of ambiguity Incorrect assumptions or carelessness of the implementer are common sources of vulnerabilities Integration of 3rd party protocol stacks commonly have unpredicted consequences Segmentation faults, stack, heap or buffer overflows, etc.,

What are the limitations of today s vulnerability assessment tools? Signature centric assessment tools are based on CERT and BugTraq vulnerability lists which are IT focused Control devices are not the usual Unix or Windows based platforms Minimal abilities to find unknown vulnerabilities Quantifiable coverage is not possible without the employment of formal test methodologies

The Result Few thorough stack testing tools are available to vendors and asset owners Invalid protocol packets are often neglected in QA cycles Control systems are being deployed with numerous network vulnerabilities Lack of robustness has impacted communications availability and hence plant operations

Test Data Generation Construction of test data comprises a large part of a software project Path-oriented methods, data flow methods, random testing, adaptive testing, and syntax-based testing are a few of the methods employed Valid Data Valid Data

Test Data Generation Essential characteristic of syntax-based testing is that a syntactic description, such as a grammar, is used to define the test domain The syntax is then used to generate elements in the test domain Valid Data Valid Data

Grammars and Formal Languages A grammar is a precise description of a formal language 2 main categories generative: sets of rules for generating strings in the language analytic: sets of rules for recognizing if a string is in the language Example rule: S::=aSb ε derivations: S->aSb->ab S->aSb->aaSbb->aabb The grammar type dictates the allowable complexity of the test domain it encodes

The Chomsky Hierarchy Type 3 (no memory) S::=aS ε Language Class Grammar Automaton Type 2 (stack memory) 3 Regular NFA or DFA S::=aSb ε 2 Context-Free Push-Down Automata Type 1 (Linear bound) S::=abc asbc cb::=bc bb::=bb 1 0 Context-Sensitive Unrestricted (Free) The Chomsky Hierarchy Linear-Bound Automata Turing Machine

Achilles Attribute Grammars Can encode Type 0 - unrestricted (free) languages Achilles Attributes provide Turing Power Achilles Attributes are used to build contextual information Enables production of test sequences - test data and the expected output which solves the test oracle problem Enables quantifiable coverage of the test domain

Achilles Attribute Grammars Code Generator Grammar Executor Config Test Case Generator Variability Test Case Executor Test Cases Results

Achilles Attribute Grammars Modularity is a powerful characteristic of the framework Supports multiple roles plant operator given test cases and an appropriate executor network engineer given the test case generator Easy transition to new protocols procure a description of the protocol produce a new grammar file one grammar file may make use of any other

What is Achilles? Automated, comprehensive network assurance platform Multi-pronged approach: Profiling Tools: Fingerprinting to determine vulnerable services Known Flaw Testing: Check for well-known flaws (CERT list) Resource Starvation Testing: Investigate performance when bombarded with traffic or requests Grammar Testing: Formally created, quantifiable data sets crafted to exercise a protocol s implementation

How is Achilles used? Sample test bench

Field Experience Commonly detected vulnerabilities loosely categorized into one of three classes: Critical: the DUT exhibited an internal fault and power cycled Loss-of-view: the communication between the vendor control software (HMI for example) and the DUT was eliminated Non-critical: the controller exhibited an error in expected functionality but did not experience a reset (e.g. protocol non-conformance)

Field Experience Common triggers of critical vulnerabilities: Derivatives of unicast, broadcast and multicast Ethernet storms Derivatives of multicast and unicast IP storms Variations on TCP handshakes Minor attacks on proprietary application services Attacks on control protocol implementations (MODBUS/TCP, DNP3/IP, etc)

Field Experience Common triggers of loss-of-view vulnerabilities: Low rate Ethernet or IP DoS s ARP floods Unsolicited ARP replies Invalid IP fragments Derivatives of TCP SYN floods Derivatives of unicast, broadcast and multicast IP storms Minor attacks on proprietary application services

What can Achilles do for you? Achilles enables the user to: accurately identify new vulnerabilities in control systems gain acute knowledge of the robustness of deployed network stacks demonstrate compliance to emerging industrial and gov t regulations maintain network stability and increase overall quality assurance prevent security breaches and stay ahead of cyber security threats promote reputation as a leader in security preparedness strengthen system availability ergo increase worker safety

Questions? For more information on the Achilles Assurance Platform please contact: Dr. Nate Kube nkube@wurldtech.com 604 669 6674

Achilles Controller Certification Program Dale Peterson Digital Bond

What is Digital Bond doing? Helping to structure the Achilles Certification Define the initial certification levels Determining the content and format of certification information made available to the public Gather feedback from the community Raise Achilles Certification awareness Digital Bond is not involved in testing nor do we see any non-public test results

Achilles Certification You asked for it! Asset owners involved with Achilles wanted to purchase products that were Achilles tested Vendors involved with Achilles wanted recognition that their products had a higher level of security assurance Need it now, delay is unacceptable

Achilles Certification Security Architecture Configuration Policy AAA Much More Protocol Stack

Foundation: Protocol Stack A vulnerable stack can negate all security controls Bypass authentication, authorization Each end user shouldn t need to test the stack Very inefficient use of time and money How would they test the stack? Vendors have difficulty testing their own stacks How does a vendor prove their stack is robust and secure? Achilles Certification lets asset owners focus on aspects of a cyber security program under their control

Achilles Controller Certifications Controller Level 1 Available today Controller Level 1 + Control Protocol Modbus/TCP, DNP3/IP and Vnet/IP available today Future + certifications planned Controller Level 2 Criteria announced on September 2007

Controller Level 1 Controller Level 1 Certification Tests controllers with Ethernet interface Over 30 million individual tests Test layer 2 to 4 protocols Ethernet, ARP, IP, ICMP, TCP and UDP Tests for proper implementation Tests resilience to structured fuzzing of the protocol Subject controller to Nessus and nmap Verify controller will withstand common scans Set of Nessus plugins that will be updated annually

Controller Level 1+ Control protocol support varies by vendor & controller Would not be a level playing field if included in Level 1 + Certifications are protocol attribute grammars Standard Modbus/TCP and DNP3/IP Proprietary Vnet/IP Other standard protocols planned Proprietary protocol grammars can be developed Asset owners should require Level 1 + control protocol(s) they will use

Controller Level 2 All Level 1 test case families plus Storms for layers 2 to 4 Application layer protocols Commonly used management protocols http, ftp, snmp, telnet, ssh Additional common scanning tools We want your suggestions for Level 2

Failed Certification Test? Wurldtech can help Failed Test Software Software utility that allows vendor to rerun the failed test in the lab prior to submitting for retesting Professional Services The team can help pinpoint the root cause Controller + Firewall Certification

Publishing Certifications Achilles Certification & testing value increases for vendor, asset owners and community if published Controller Certification and test results Only passing results will be posted Broad information about test case families Asset owners need to understand the assurance level of Achilles Certification Published on Wurldtech Security website

Achilles Certification Awareness Achilles Certified logo program for vendors Achilles Certified awareness campaign Highlight certified controllers Stress the benefits of a secure stack Advertising and articles in industry publications Participation in industry conferences and user group events

Benefits For Asset Owners Level of security assurance prior to purchase Provable testing coverage of protocols Independent, third party security testing No need to develop in house expertise Almost impossible without a tool like Achilles Requires expertise not needed to install and manage a secure control systems Reduced number of security patches Add Achilles Certified as an RFP requirement

Benefits For Vendors Easy answer to the security question Independent testing and certification Vendor now has documentation Saves time and money in RFP process Eliminates a time delay in procurement cycle Significantly reduce future vulnerabilities Identify and fix implementation bugs prior to release Satisfy a RFP requirement Private, detailed Achilles Controller Certification Test Report can be provided to prospects

How You Can Help Asset Owners Add Achilles Certified to controller RFP s Push vendors to get installed products tested Talk to other asset owners Vendors Submit controllers for Achilles Certification Place Achilles Certified on materials, website Have an Achilles Certified presentation at your next major Users Group event

Questions? For more information on the Achilles Certification Program or to schedule a product for Certification testing contact Dr. Nate Kube nkube@wurldtech.com 604 669 6674 or Mr. Dale Peterson peterson@digitalbond.com 954 303 7560