Adaptive and Proactive Security Assessment on Energy Delivery Systems
Carlos Rubio-Medrano, Vu Coughlin, Josephine Lamp, Ziming Zhao, Gail-Joon Ahn and Anna Scaglione
Adaptive and Proactive Security Assessment on Energy Delivery - - PowerPoint PPT Presentation
Adaptive and Proactive Security Assessment on Energy Delivery Systems Carlos Rubio-Medrano, Vu Coughlin , Josephine Lamp, Ziming Zhao, Gail-Joon Ahn and Anna Scaglione Outline Activity Current/ OntoEDS ExSol EDSGuard Refresher Future Work
Carlos Rubio-Medrano, Vu Coughlin, Josephine Lamp, Ziming Zhao, Gail-Joon Ahn and Anna Scaglione
Activity Refresher
OntoEDS ExSol EDSGuard
Current/ Future Work
Motivation Goals Approach Status of Prototypes Papers Published Papers in the Making An Ontology- based Repository and Engine Tool for Security Requirements A Risk Analysis Framework for EDS An SDN-based Firewall App for EDS Networks
2
Activity Refresher
OntoEDS ExSol EDSGuard
Current/ Future Work 3
nature of EDS, e.g., monitoring software, meters, etc.
conflicting) documents on security requirements,
implementations, and breakdowns among stakeholders
4
requirements,
implementations,
5
1. We gather the most relevant documents on best practices for EDS 2. Next, we obtain a description of such best practices by leveraging ontologies 3. We then introduce software-based modules for security monitoring and risk analysis 4. Data from EDS infrastructure (5) is collected and forwarded for further processing 6
Ontology Requirements Repository / Engine Security Requirements
+
Domain Knowledge Analysis of Reports from Data Collection Creation of EDS-Related Documentation
EDS-SAT
Data Collection Module Data Processing Module
Pi 1 2 3 4 5 6 7
Data Collection Modules
...
P1 P2 P3 Pn
Data Processing Modules
...
EDS Infrastructure
rigorous analysis of security requirements,
monitors the security
development of
justifiable and repeatable security metrics
7
Activity Refresher
OntoEDS ExSol EDSGuard
Current/ Future Work 8
Ontology Requirements Repository / Engine
EDS-SAT
Data Collection Modules
...
P1 P2 P3 Pn
Data Processing Modules
...
EDS Infrastructure
9
common vulnerabilities and exposures (CVEs) *,
missing and conflicting information among diverse knowledge sources,
and viewpoints, e. g., relevant information for operators vs vendors
10
Develop supporting foundation structure of ontology Repeat for each paragraph within each document Identify and collect key documents For each document, extract key entities from sentences or paragraphs Categorize each entity within the hierarchy structure of the ontology Identify relationships for the defined entity Model the relationships based on predefined characteristics/definitions
2 1 3 4 5 6 “A technique to prevent integrity violations of data is the use of firewalls, such as application-level firewalls that employ application filtering” Entities: Firewall, Integrity, Application Filtering
Cyber Proc Lang NIST 800-82 NERC CIP IEC 61850
“A technique to prevent integrity violations of data is the use of firewalls, such as application-level firewalls that employ application filtering” Relationships: prevent, employ
Protects Implements Security Req Attack Threat System Doc Agent Security Firewall
Net Sec Technique Security Technique
Integrity Firewall
App Filtering NISTIR 7628 IEEE C37 IEC 62351
source documents and includes 600 entities with over 1,700 relationships,
Language for Energy Delivery Systems developed by the Energy Sector Control Systems Working Group (ESCSWG),
Corporation Critical Infrastructure Protection (NERC CIP) standards,
11
Domain Scenario Goal Viewpoint
achieve to enter into a state of security:
techniques/features,
12
Firewall
Firewall Rules Requirements
Implements
Traffic Termination in DMZ No Internet Access for Control Devices Restricted Traffic from Control to Business Net Permissions Granted On Case by Case IP Address and TCP/UDP Port Specific Permit Rules Traffic Restriction to Specific IP Address Outbound Packet Allowance Specification Protocol Translation for Control and Business Nets Base Rule Set Deny All Permit None
describing a system that include agent behavior and environmental context:
between the system and its environment,
system operation,
a broad picture of ontology elements and their relationships
13
Firewall
Remote Access Application Filtering
Firewall Management Specification
Basic Config
Network Filtering Monitoring Rules
Implements Firewall Rules Firewall Backup
Minimal Access Points between ICS and Corporate Network
Access Contains Includes Implements
Logically Separated Control Network Periodic Testing of Firewall Policies
Includes Includes Uses Implements Contains
domain taxonomy relative to a specific topic,
exploration,
helps identifying inter- dependencies and missing requirements,
specific responsibilities of an agent,
acquisition,
14
Firewall
Network Security Techniques
Rule Configs Network Filtering Application - Layer Host - Based Deep-packet Inspection
Firewall
Acquirer
Supplier Procured By Provided By Exceptions Specified By
Use a series of goal projections to elucidate threats, attack types, security countermeasures and requirements surrounding an asset,
concepts in risk analysis methodologies (to be shown later),
15
Firewall
Filtering Rules Network Access
Network Traffic Monitoring Firewall Management Specification Man-in-the- Middle Lack of Compliance with Protocols
Unauthorized Modification
Application Filtering
Privilege Escalation
Improper Firewall Configuration Network Filtering Monitoring Rules
Contains Confidentiality DMZ
Minimal Access Points between ICS and Corporate Network
Unauthorized Access Implemented On Connected To Protects
Logically Separated Control Network Periodic Testing of Firewall Policies
Includes Includes Uses Implements Contains Contains Mediates Targets Counteracts
Security Requirements Threats Attacks
Activity Refresher
OntoEDS ExSol EDSGuard
Current/ Future Work 16
Ontology Requirements Repository / Engine
EDS-SAT
Data Collection Modules
...
P1 P2 P3 Pn
Data Processing Modules
...
EDS Infrastructure
17
for risk analysis and mitigation,
cohesively combined in a mathematical model,
particular threat will exploit a particular vulnerability of a system*
*Vaughn, Rayford B., Ronda Henning, and Ambareen Siraj. "Information assurance measures and metrics-state of practice and proposed taxonomy." In System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on, pp. 10-pp. IEEE, 2003.
score to understand the risk of a system,
are matched up against one another,
scale from 1 (least) to 5 (greatest),
global and/or local experts,
for threats and attacks as well,
18
Exploit Score Solution Score ExSol
Threat/Attack Metrics:
Req/Solution Metrics:
* Sub-scores calculated using EDS-SAT processing modules
19
Metric Definition Defined By Impendence (Ti) Likelihood/Frequency of threat being exploited or attack being performed. Global / Local Expert Severity (Ts) Impact and damage of threat/attack on the asset. Global / Local Expert Relevance (Tr) How applicable or targeted to the asset the threat/attack is. Local Expert Effectiveness (Re) Perception on the ability of the requirement to deter/counteract an attack/threat. Global / Local Expert Relevance (Rr) Applicability of a requirement to the asset being analyzed. Global / Local Expert Implementation (Ri) Perception on the effectiveness of the implementation
Local Expert
Exploitation Solution
20
Remote Terminal Unit Master Terminal Unit
Impendence (Ti) high
DoS No internet connectivity for control devices
Effectiveness (Re) high
Attack Asset Requirement
Severity (Ts) high, Relevance (Tr) high Relevance (Rr) high, Implementation (Ri) low Severity (Ts) high, Relevance (Tr) medium Relevance (Rr) medium, Implementation (Ri) high
21
↑ Solution ↑ Exploitation OKAY ↑ Solution ↓ Exploitation GOOD ↓ Solution ↑ Exploitation BAD ↓ Solution ↓ Exploitation OKAY ExSol > 0: Good, the greater the better ExSol = 0: Matched ExSol < 0: Bad, the lower the worse
1. Retrieve all Threats (T), Attacks (A), Requirements (R) and Security Techniques (S) related to a given asset using the Risk Projection, 2. Match T, A, R and S that are relevant to each
3. For each TARS-tuple:
1. Calculate the exploitation and solution sub-scores
2. Calculate the ExSol score,
4. Evaluate risk based on the obtained ExSol scores
22
< T1, A1, R1, S2 > = (80 * 100) - (18 * 180) = 4,760 Risk
23
(T/A) Disgruntled Employees (T1) Unnecessary Ports (T2) Network Backdoors/ Holes (A1) Spoofing (A2) Impendence 3 5 4 1 Severity 2 5 5 2 Relevance 3 4 5 2 Sub-score 18 100 180 4 (R/S)
Firewall (S1) Permissions (S2) Network Segregation (S3) Network Segmentation (S4) Network Intrusion Detection (S5)
No Unnecessary Ports (R1)
No Internet for Control Devices (R2) Enable Only Ports Needed (R3) Effectiveness
4 4 4 4 2 5 4 4
Relevance
3 5 3 3 3 4 5 4
Implementation
4 5 3 5 4 4 5 4 Sub-score 48 100 36 60 24 80 100 64
1. < T1, A1, R1, S2 > = (80 * 100) - (18 * 180) = 4,760 2. < T1, A1, R2, S2 > = (100 * 100) - (18 * 180) = 6,760 3. < T1, A1, R1, S5> = (80 * 24) - (18 * 180) = -1320 4. < T1, A1 , R3, S5> = (64 * 24) - (18 * 180) = -1704 5. < T1, A1, R2, S3> = (100 * 36) - (18 * 180) = 360 6. < T1, A1, R1, S4> = (80 * 60) - (18 * 180) = 1,560
24
R1 : No Unnecessary Ports R2 : No Internet for Control Devices R3 : Enable Only Ports Needed S2 : Permissions S3 : Network Segregation S4 : Network Segmentation S5: Network Intrusion Detection T1: Disgruntled Employees A1: Network Backdoors/ Holes
Activity Refresher
OntoEDS ExSol EDSGuard
Current/ Future Work 25
26
Ontology Requirements Repository / Engine
EDS-SAT
Data Collection Modules
...
P1 P2 P3 Pn
Data Processing Modules
...
EDS Infrastructure
EDS firewalls continuously over time,
Management,
that leveraged erroneous firewall configurations, e.g., Ukraine 20151, CrashOverride2
1)
2) Dragos Inc. “CrashOverride: Analyzing the Threat to Electric Grid Operations”, Technical Report, 2017.
Projections,
Rules and Network Topology,
e.g., IEC 62351, NIST 800-82, Cybersecurity Procurement Language Document, etc.
27
Firewall
Firewall Rules Requirements
Implements
Traffic Termination in DMZ No Internet Access for Control Devices Restricted Traffic from Control to Business Net Permissions Granted On Case by Case IP Address and TCP/UDP Port Specific Permit Rules Traffic Restriction to Specific IP Address Outbound Packet Allowance Specification Protocol Translation for Control and Business Nets Base Rule Set Deny All Permit None
28
Src: 10.0.0.1 Dst: 10.0.0.3 TCP/Modbus SYN Port 502
S2 Master PLC 10.0.0.1 Slave PLC 10.0.0.3 S3 S1
EDSGuard
SDN Application
SDN Controller
2 1
Src: 10.0.0.1 Dst: 10.0.0.3 TCP/Modbus SYN Port 502
3 4 5
Master PLC sends packet to Slave PLC Firewall Rules configured for EDSGuard Firewall Rules turned into Table Entries for Switches and distributed Attacker tries to inject crafted packet directed to Slave PLC Crafted Packet dropped at Ingress Switch Firewall Rules continuously enforced over time: reconfigurations, new network flows, etc.
29
transiting directly from the control network to the corporate network,
spaces1:
network,
detected and removed,
1) Discovery and Resolution of Anomalies in Web Access Control Policies. Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni. IEEE Transactions on Dependable and Secure Computing (TDSC), 2013
SControl SCorporate
and resolution strategies available,
not only detects violations, but can proactively solve them as well,
serve as an effective first-response countermeasure tool for handling security incidents,
30
1 2
Matlab simulator +
libmodbus
libmodbus library
libmodbus library
31
32
firewall rules,
switch,
33
34
Src: 10.0.0.1 Dst: 10.0.0.3 TCP/Modbus SYN Port 502
S2 Master PLC 10.0.0.1 Slave PLC 10.0.0.3 S3 S1
EDSGuard
SDN Application
SDN Controller
2 1
Src: 10.0.0.1 Dst: 10.0.0.3 TCP/Modbus SYN Port 502
3 4 5
Master PLC sends packet to Slave PLC Firewall Rules configured for EDSGuard Firewall Rules turned into Table Entries for Switches and distributed Attacker tries to inject crafted packet directed to Slave PLC Create a new flow Firewall Rules continuously enforced over time: reconfigurations, new network flows, etc.
35
36
S2 Master PLC 10.0.0.1 Slave PLC 10.0.0.3 S3 S1
EDSGuard
SDN Application
SDN Controller
2 1
Src: 10.0.0.2 Dst: 10.0.0.3 TCP/Modbu s SYN Port 502
4
Packet dropped at this point New firewall rule is configured to block attacker Firewall Rules turned into Table Entries for Switches and distributed The attacker somehow got into the network
Flow Table 1 10.0.0.1 -> 10.0.0.3 : forward ... Flow Table 2 10.0.0.1 → 10.0.0.3: forward 10.0.0.2 -> 10.0.0.3: drop Flow Table 3 10.0.0.1 -> 10.0.0.3: forward ...
New flow rule installed
3
37 Controller retrieves all flows
Controller cross- checks flows with firewall rules for partial violations
Controller installs a flow in the switch to drop the traffic Before resolution After resolution
38
Activity Refresher
OntoEDS ExSol EDSGuard
Current/ Future Work 39
40
https://globalsecurity.asu.edu/cdf
41