Adaptation of Failure Detection Mechanisms to Handle Attacks against SCADA Systems
- J. RUBIO-HERNAN and J. GARCIA-ALFARO
Adaptation of Failure Detection Mechanisms to Handle Attacks - - PowerPoint PPT Presentation
Adaptation of Failure Detection Mechanisms to Handle Attacks against SCADA Systems J. RUBIO-HERNAN and J. GARCIA-ALFARO Agenda Introduction State of the Art Physical-layer Failure Detection Mechanisms Conclusion & Future
2
3
–
4
5
Remote Terminals Sensors / Actuators Master Terminals
6
Sensors / Actuators Remote Terminals
Protection of integrity properties purely based on physical assumptions
Avoid cryptography & distribution of keys
Sensors / Actuators Remote Terminals
7
8
Security Incident
Intentional Attack Non-intentional Accident /Failure
Decomposition of a Security Incident in an Industrial System Attack: intentional action by which an entity attempts to evade security
9
Industrial System Active Passive Vulnerability
What is a Failure Detection Mechanism?
What is a Failure / Accident?
What is an Attack?
Actuator/Plant/Sensor Controller
Failure Detection Mechanism Failure Attack 10
Safety [1]: achievement of proper operating conditions, prevention of accidents
Security [2]: establishment & maintenance of protective measures to perform
Physical-layer Security Detection Mechanisms
(i.e., safety) detection mechanisms to handle intentional attacks (e.g., replay and injection attacks) Issues: often not well evaluated in terms of security
11
[1] Guides, S. (2007) IAEA (International Atomic Energy Agency) Safety Glossary Publications [2] Kissel, R. (2013) Glossary of Key Information Security Terms. NIST Interagency/Internal Report (NISTIR)
12
Actuator/Plant/Sensor Actuator/Plant/Sensor
Controller
Stamp
Controller
Stamp
Adversary [a]
[3] Mo and Sinopoli (2009) Secure Control against Replay Attacks. 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911-918. [4] Mo, Kim, Brancik, Dickinson, Lee, Perrig, and Sinopoli (2013) Cyber–Physical Security of a Smart Grid
13
14
15
Actuator/Plant/Sensor Controller Stamp [a] [a'] Adversary
“A process created with a deterministic signal and a non-deterministic signal mutually uncorrelated can be decomposed in two processes: one with the deterministic signal, and another with the non-deterministic signal”. [5] Wold, H. (1954) A Study in the Analysis of Stationary Time Series, Second revised edition, with an Appendix
16
17
18
Actuator/Plant/Sensors
Controller
Stamp Adversary without Knowledge
[a]
Actuator/Plant/Sensors
Controller
Stamp Adversary with Knowledge
[a'] [a]
19
20
Simulation
1st use case (no stamp) 2nd use case (Mo et al.’s Adversary) 3rd use case (Our New Adversary) 21
22
23
24
jose.rubio_hernan@telecom-sudparis.eu
25
Input signal
dk= xk + wk
dk-∆ yk
Output signal Adaptive Algorithm Adaptive filter
26
Input signal
Unknow System (Plant)
dk yk
Output signal Adaptive Algorithm Adaptive filter
27
Eavesdropping and injection of messages
c = u * +∆u
Actuator
Attack detector module Adversary
k k
1 + k
c = uk * +∆uk
Estimator
Attack detector module
Controller
*
c
[1] Mo and Sinopoli (2009) Secure Control against Replay Attacks. 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911-918. [2] Mo, Kim, Brancik, Dickinson, Lee, Perrig, and Sinopoli (2013) Cyber–Physical Security of a Smart Grid Infrastructure. Proceedings of the IEEE, 100(1):195-209, DOI: 10.1109/JPROC.2011.2161428 28