A Cyber-Resilient ICS Through Diversified Redundancy And Intrusion .

1y ago
4 Views
2 Downloads
8.17 MB
62 Pages
Last View : 10d ago
Last Download : 3m ago
Upload by : Amalia Wilborn
Transcription

WWW.MWFTR.COMA Cyber-Resilient ICS through DiversifiedRedundancy and Intrusion Detection- Keynote Speaker Presentation -Charles Kim, Ph.D.ProfessorElectrical Engineering and Computer ScienceHoward UniversityWashington DCUSAckim@howard.edu1

Where is Howard? Founded in 1867Private University10,000 students2

Table of Contents Background – Cyber Vulnerabilities in IndustrialControl Systems (ICS) New Control System Architecture– Diversified Redundancy Incorporation of Intrusion Detection Validation Experimentation Conclusions3

Introduction Enhanced use ofnetworked(intelligent/smart)devices cyber securityvulnerabilities exploitedby hackers. IT side securitytechnique: Not adequatefor the attacks specific tocontrol system networks. Intrinsic weakness of thecommunication protocolsused by (legacy) controlnetworks and devices.4

Cyber Vulnerability in Industrial Control Systems (ICS) Connected Control Systems– No longer stand-alone: “no air-gap”– Connected to corporate networkvia Internet– open connectivity– Resulted in increase in Security vulnerability Unauthorized access and intrusion Malicious code manipulation Exploitation– Cyber security threats on ICS are ever increasing– Legacy systems developed forpre-Internet era are vulnerable to cyber attacks Ukraine (2015) – 1st Successful cyber attack on a powersystem5

Cyber attacks on ICS 2010 – Stuxnet – Nuclear Plant 2011 – Duqu – Malware for ICSattacks (similar to Stuxnet) 2012 – Black Energy – TargetsICS running GE products 2014 – Havex – Remote accessattacks in the energy sector 2015 – Attack on Ukraine PowerSystem 2016 – Attack on Ukraine MilitaryArtillery6

Cyber Vulnerability in ICS Bowman Avenue Dam, Rye Brook, NY. 2013Used the technique to identify an unprotected computer thatcontrolled sluice gates and other functions7

Cyber Vulnerability in ICS Google Search Process “Google Dorking” Point: Any tool can be used to hack8

Cyber Vulnerability in ICS - Stuxnet at Natanz Zero-Day Vulnerability: Weknow only what we know.9

Ukraine Grid Outage – Dec 23, 2015 US DHS assessment: Interview with6 Ukrainian organizations affected bythe blackoutDHS: “the December power outage inUkraine affecting 225,000 customersis the result of a cyber attack” thefirst U. S. government recognizedblackout caused by a malicious hackFirst known successful cyberintrusion to knock a power grid offlineBelieved to be staged by a Russianhacking group known as “Sandworm”10

Ukraine Grid Attack Affected by a lesserattack in October A similar type ofmalware has beenidentified as far back asJuly by an anti-virussoftware company Attackers must haveknown what softwarewas installed – byemails to workers withinfected Word or Excel Lesson: Difficultiesand Uncertainties11

U. S. Grid Outage Risk FERC(U. S. Federal Electric ReliabilityCouncil): “The U.S. could suffer acoast-to-coast blackout if saboteursknocked out just nine of thecountry's 55,000 electrictransmission substations on ascorching summer day”.How to protect US (and your) grid against hackers?12

IoT Vulnerabilities Botnet Attack– Web cams: password vulnerability etc. Victims– Dyn – internet infrastructure company (New Hampshire)– Internet Directory service shut down13

Your AC and Security Camera may be controlled by someone else Susceptibledevices Thermostatsand cameras14

Your refrigerator may be controlled by someone else Smartappliances15

Your kid’s toy may be controlled by someone else Smarttoys16

How hackers gain access Hacker’s 6 Steps - According to National Center ofCybersecurity1. Gain authorities of system manager through socialengineering and spy emails2. Remote entry to network through VPN (virtual privatenetwork), VNC (virtual network computing), and others3. Scan Intranet to know Operating Systems and terminals4. Copy malware files to one of the network computers tospread to other computers in the intranet5. Operate malware and worm software remotely usingGroup Policy or System Center Configuration Manager6. Damage: Deletion of Data, Destroy OS and SoftwareConfiguration, Encrypt Data17

In addition, Software Faults18

Complexity and software-related problems19

Software - Curse of Flexibility Easy change of computer function by easy change of software –flexible, quick and with low costerror introduction, complexity Success and Partial success– S/W: Difficult to build one that works under all conditions Possible to build one that works 90% of the time– Aircraft: Almost impossible to build a plane that flies 90% of the time20

Hidden Bugs in Trusted SoftwareOpenSSL Project: (Secure Sockets Layer) (Transport Layer Security)21

How errors were inserted22

Software Failure and Quantification Can software failure be quantified? Fault Density– “Software fault density”: the number of faults per unit of programsize: # of faults per lines of code– Empirical study with previous software projects Finding Implication:– A practical reality is that operational software developed usingcontemporary practices tends to exhibit a fault density of 2.2x10-3faults per line A software program must somehow be inherently faulted !!! ?23

Protective Relay S/W Vulnerability A bug in software used tocontrol the flow of electricityin a utility’s power system:Identified in a Black HatConference Remote control of GEprotection relays – “old GErelays introduced in the1990s” Patches for 5 of 6 modelsaffected by the vulnerabilities24

Present Approaches for ICS Hardening Basis - Cyber Security for IT systems Strategies and tools for––––Anomaly detectionIntrusion detectionNetwork access behavior analysisMitigation Strategy Problems––––May block some known attacks and attack vectorsPost-mortem approach after damages have been doneNo attack-proofExploitable vulnerabilities in ICS are real and, notaddressed timely, cause serious impacts to publicsafety and critical infrastructure25

Existing Control System [simple model] Sensors Actuators Enterprisenetwork26

Existing Control System [simple model] Hacker mayaccess to thecontroller andmanipulate theS/W27

Toward Cyber-Resilient ICS Cyber Insensitive– Operation Basis Hardware Redundancy– Supplementary control part (for “Safe-Mode”)– Unidirectional Communication for Situationalert Working under Compromised Situation– Fail-Safe or Fail-Operate– Resilience “Broken Part” Assumption28

System Regulator Under the “Broken System” Assumption Old Toilet Age Flooded floor every morning After moping, a toilet appearstrouble-free during the day Flooded floor again the nextmorning29

System Regulator Under the “Broken System” Assumption Busy Time – Flushes before water level goes above Night Hours – the effect of Valve Failure is realized30

System Regulator Under the “Broken System” Assumption How to design a toilet under theassumption that the gasket on the valve willeventually wear out?31

Architecture of Diversified Redundant Control System Network connectedPrimary ControllerIsolated SecondaryController – fullduplication or a part for“safe mode”Supervisor forOperation-BasisSupervisionUnidirectional ReportingCyber-Robust for– Common Virus– Man-in-the-middleattack– Stuxnet-like Worm32

Validation in Lab Experimentation Network Server: Internet Connected Laptop with IP 10.232.100.114Supervisor holds an operational data(base) in itSimple code: Read the DIP position and Send out corresponding LED on/off33

Validation in Lab Experimentation – Attack/Response Scenario (1) Engineer/Manager Credentials Stolen(2) Remote Access to the Network Server(3) Access to the Primary Controller Malicious Code Change(4) Supervisor Notices Operation Change(5) Transfer Control to the Secondary Controller34

Validation in Lab Experimentation35

Validation in Lab ExperimentationOpen VPN Attack– Made through Virtual PrivateNetwork (VPN)37

Validation in Lab Experimentation Attack– Hacker connects, usingRemote Desktop Tool ofthe Microsoft Windows, tothe remote Network ServerCertificate of Network Server38

Validation in Lab Experimentation Server Log OnDesktop of Network Server39

Validation in Lab Experimentation Code ChangeUpload the Revised CodeRun to code40

Validation in Lab Experimentation – New ArchitectureSupervisor’s Action:(1) Operation-Action mismatch recognized(2) Control Transfer to Secondary Controller(3) Twitter Message -- Simulation ofUnidirectional Alert41

Validation in Lab Experimentation Supervisor reports the situation to theenterprise system via a unidirectionalnetwork (Tweeting to the Twitter Account inthis lab experiment)42

Validation in Cybersecurity TestbedDETERlab (Cyber DEfenseTechnology ExperimentalResearch Laboratory) 400 computer nodes 10 network interfaces/node 200 active projects 6 power grid projects 2 Control Systems USC, UC Berkeley, and DHS/NSF43

Experimentation in DeterLab1. Inherent Problem: Isolated control devices such assecondary controllers and supervisors are notrepresented in DeterLab model2. Approach– Develop a Network Model inside DETER– Physical System of the Diversified Redundant ICS at HowardUniversity– Develop an interface between DETER and the real physicalSystem: Primary Controllera Node in DETER– In DETER, access/hack the designated Node (which actuallycontrols the primary controller)– Test/Observe how the supervisor detects abnormal activity andtransfer the control to the secondary controller44

Physical System – DETER Physical components in the Diversified Redundant ICS are eachrepresented by a DETER nodeA DETER node needs: OS (Linux), Network Connection45

DeterLab Process: Experiment Creation NetworkSimulation(NS) Syntax46

Interface Development Representation of a physical primary controller by a DETER nodeEFFECT: Hacking the DETER node (nodeA) inside the DeterLab is thesame as hacking the physical primary controller49

Interface Development Representation of a physical primary controller by nodeA SSH tunneling– We need to go through the portal.– Create a tunnel betweenPrimary Controller & nodeA.– The tunnel will stay openas long as each machine isconnected to each other.– Certain files updated automatically– The update will run every minute.50

Testing the ICS – Hacked Flow Rate53

Diversified Redundant ICS - summary Primary Controller– Connected– Full functionality RedundantController– Isolated– Basic (safe-mode)functionality only Supervisor– Operation-basedcontrol transfer– Unidirectionalconnection Notification sent toEMS Operation-BasedMitigation– maintains normaloperation undercompromisedsituation54

Improvement to Diversified Redundant ICSArchitecture by adding Intrusion DetectionThe Diversified Redundant Architecture hasvulnerabilities Only mitigates against operational anomalies Cannot confirm if a hacker is present(namely, pinging or reconnaissance)Improvement needed: Situational Awareness to detect and confirm thepresence of hacking attemptsApproach: Control Data Bus (Modbus) monitoring andintrusion detection Detection of hacker presence on the control network Detection of known and unknown cyber attacks55

Modbus Data Traffic - Example57

Intrusion Detection An Intrusion Detection System (IDS):– a device or software that monitors a network orsystem for malicious activity.– used as both a reactive and proactive methodto verify if a network has been compromised.Intrusion Detection can be done in two types:– Signature-based– Anomaly-based58

Implementation of Snort Install Snort – Location based on IDSstrategy – “Supervisor” (our case)Create Snort directoriesCreate Snort user and grant privilegesConfigure Snort–––– Design and configure IDS signature rulesDesign and configure IDS anomaly rulesSetup and configure Snort DatabaseConfigure and execute Snort as DaemonScan Snort log and generate email usingPython Supervisor (now RPi) for SnortInstallation59

Designing and Writing Snort Rules Example:alert tcp EXTERNAL NET any - MODBUS NET 502\(content:!" 02 ";offset:7;depth:1; flow:established,to server;\ msg:"MODBUS Function Not Allowed!!!”,sid:1000001;rev:0;priority:5) The above rule allows discrete input operations only on anetwork for monitoring only functions The byte in the 8th position (offset 7) contains the Modbusfunction code. The rule will check the function code of Modbus TCP trafficgoing from the client network to server network for functioncode 2 which is “Read Discrete Input”. If the function code of the traffic is examined and is foundto be other than 2, then an alert message will begenerated.61

ICS with Diversified Redundancy and Intrusion Detection Operation-based resiliencythrough safe-mode redundantand supervisorAdded feature of IntrusionDetection in the supervisorRedundancy maintains thenormal operation fromexternal or insider attacks orsabotagesSnort Rules DetectsAbnormal Traffic in theModbusSnort run in stealth mode andundetected by a potentialattackerAlert message sent to theEMS62

Experimental Testing SetupExperimental Setup63

Experimental Validation – without IDSBlue Light ON(Indication of anEvent)ControlTransferred shold Change Detected – Hacker presence assumed – Notification Email sent64

Experimental Validation – without IDSBlue LightOFF(Indication ofNo-EventControlRemainedIn naissance Only - No Threshold Change – Hacker presence unknown65

Experimental Validation – With IDSBlue Light ON(Indication ofan OperationmaintainedThreshold Change Detected – Snort verifies presence of Hacker and NotificationEmail sent66

Experimental Validation – With IDSBlue LightON(Indicationof an OperationmaintainedNo Threshold Change, Reconnaissance Only - Detected – Snort verifies67presence of Hacker and Notification Email sent

Conclusions ICS networking invites a new challenge of securing the control networkagainst cyber vulnerabilities.Challenges of detecting ALL and NEW and Unknown viruses, worms,and Trojan horsesInherent Software Faults open door to errors, malicious viruses, andexploiters/hackersCyber-Resilient Diversified Redundant ICS Architecture (Primary(connected), Redundant (isolated and “safe-mode”), and Supervisor(unidirectional): Strength and WeaknessIntrusion Detection added with Snort: Diversified RedundantArchitecture with Intrusion Detection (“DRAID”) for resilient ICSSnort rules and python scripts integrated into the supervisor for ModbusTraffic Signature and Anomaly based Intrusion DetectionExperimental Validation of the DRAID for hacker presence detectionand control transfer to redundant controllerDRAID can provide a resilient and secure ICS.68

Related Works Dayne Robinson and Charles Kim, "A Cyber-Defensive Industrial Control System withRedundancy and Intrusion Detection," 2017 North American Power Symposium, Sept 17-19,2017, Morgantown WV.Charles Kim and Dayne Robinson, "Modbus Monitoring for Networked Control Systems of CyberDefensive Architecture," 2017 IEEE SysCon, April 24-27, 2017.Charles Kim, "Cyber-Defensive Architecture for Networked Industrial Control Systems,"International Journal of Engineering and Computer Science, Vol. 2, No. 1, pp. 1 - 9, Jan.2017. 32/ijeacs/0201/01Charles Kim, "A Cyber-Resilient Industrial Control System with Diversified Architecture andControl Bus Monitoring," World Congress on Industrial Control System Security (WCISCSS2016), December 12 - 14, 2016. London, UK.Charles Kim and Ravindranath Jaglal, "A cyber-robust connected-control system: Experimentalvalidation," Proc. of the 29th International Conference on Computer Application in Industry andEngineering, pp. 133 - 138, Denver, CO. September 26-28, 2016.Charles Kim, Karen Green, and Andre Duarte Palhares, "Cybersecurity testbed experimentationof a resilient control system for power substations," Proc. of the 29th International Conference onComputer Application in Industry and Engineering, pp. 139 - 144, Denver, CO. September 26-28,2016.Charles Kim, "Safety Challenges for Connected Cars", IEEE Transportation ElectrificationCommunity Newsletter June 2016.Charles Kim, "High-Tech Cars: Safety-Critical Computer Systems," Invited Talk in an IEEEFocused workshop for Exploring Cybersecurity Challenges in Electrified Transportation. Feb 24& 25, 2016. Washington DC.

Intrusion Detection An Intrusion Detection System (IDS): - a device or software that monitors a network or system for malicious activity. - used as both a reactive and proactive method to verify if a network has been compromised. Intrusion Detection can be done in two types: - Signature-based - Anomaly-based. 58

Related Documents:

For specific safety information, read the Safety Message. For specific medical information, refer to the ICS 206. 5. Site Safety Plan Required? Approved Site Safety Plan(s) Located at: 6. Incident Action Plan (the items checked below are included in this Incident Action Plan): ICS 202 ICS 203 ICS 204 ICS 205 ICS 205A ICS 207 ICS 208 ICS 220 Map .

Jan 08, 2015 · Incident Organization Chart (ICS 207) Site Safety Plan (ICS 208) Incident Summary Status (ICS 209) Check-In List (ICS 211) General Message (ICS 213) Resource Request Message (ICS 213RR) Activity Log (ICS 214) Operational Planning Worksheet (ICS 215) Incident Action Plan Safety Analysis (ICS 215a)

Jan 08, 2015 · Incident Organization Chart (ICS 207) Site Safety Plan (ICS 208) Incident Summary Status (ICS 209) Check-In List (ICS 211) General Message (ICS 213) Resource Request Message (ICS 213RR) Activity Log (ICS 214) Operational Planning Worksheet (ICS 215) Incident Action Plan Safety Analysis (ICS 215a)

This unit will review the ICS features and concepts presented in ICS-100 through ICS-300. Unit 2 Fundamentals Review for Command and General Staff Page 2-2 ICS-400: Advanced ICS—Student Manual August 2006 Topic Unit Objectives Visual 2.2 Unit 2: Visual 2.2 Fundamentals Review for Command and General Staff Unit Objectives (1 of 2) Describe types of agency(ies) policies, guidelines, and .

1 MGT-347 ICS Forms February 5, 2019 Franklin County 2 ICS-300 Intermediate ICS February 5 – 7, 2019 Franklin County 3 ICS-300 Intermediate ICS February 6 – 8, 2019 Montgomery Co. 4 OH-230 Intro. to Emergency Management in Ohio February 11 - 14, 2019 Ohio EMA 5 ICS-400 Advanced ICS February 12 - 13, 2019 Wood County

Number Purpose ICS 201 (p.1)** Incident Briefing Map ICS 201 (p.2)** Summary of Current Actions ICS 201 (p.3)** Current Organization ICS 201 (p.4)** Resources Summary ICS 202 Incident Objectives ICS 203 Organization Assignment List ICS 204 Assignment List ICS205 Incident Radio Communications Plan

Fireline Handbook, PMS 410-1, NFES 0065 Documentation Forms: ICS 211, Check-in List, NFES 1335 ICS 213, General Message, NFES 1336 ICS 214, Unit Log, NFES 1337 ICS 218, Support Vehicle Inventory, NFES 1341 ICS 219, Resource Status Card (T-Card), NFES 1342 and holder (optional) ICS 226, Individual Performance Rating, NFES 2074

Unit 3: ICS Features and Principles IS-0100.b – Introduction to the Incident Command System (ICS) October 2013 Student Manual Page 3.3 ICS FEATURES . Visual 3.3 . Key Points The following video will introduce this lesson on ICS features and principles. The lesson covers each of these ICS features in detail. Video Transcript: [Narrator]