CALIFORNIA ELECTRIC SYSTEMS FOR THE 21 ST CENTURY (CES-21) NOVEMBER, - - PowerPoint PPT Presentation

california electric systems for the 21 st century ces 21
SMART_READER_LITE
LIVE PREVIEW

CALIFORNIA ELECTRIC SYSTEMS FOR THE 21 ST CENTURY (CES-21) NOVEMBER, - - PowerPoint PPT Presentation

ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 CALIFORNIA ELECTRIC SYSTEMS FOR THE 21 ST CENTURY (CES-21) NOVEMBER, 12, 2014 DOUG RHOADES CHIEF ENGINEER, CYBERSECURITY, SOUTHERN CALIFORNIA EDISON TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER


slide-1
SLIDE 1

ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG

UNIVERSITY OF ILLINOIS | DARTMOUTH COLLEGE | UC DAVIS | WASHINGTON STATE UNIVERSITY

FUNDING SUPPORTPROVIDED BY DOE-OE AND DHS S&T

1

CALIFORNIA ELECTRIC SYSTEMS FOR THE 21ST CENTURY (CES-21) DOUG RHOADES

CHIEF ENGINEER, CYBERSECURITY, SOUTHERN CALIFORNIA EDISON NOVEMBER, 12, 2014

slide-2
SLIDE 2

CES-21 OVERVIEW

The objective of the CES-21 Program is to address challenges of cyber security and grid integration of the 21st century energy system for California through a Collaborative Research and Development Agreement (CRADA). The CES-21 Program utilizes a team of technical experts from Lawrence Livermore National Laboratory (LLNL) and three large Investor-Owned Utilities (IOUs) within the State of California.

  • Machine to Machine Automated Threat

Response (MMATR) ‐ The research is intended to develop automated response capabilities to protect critical infrastructure against emerging cyber-attacks. ‐ Due to the time criticality of these cyber-attacks, the only way to effectively protect critical infrastructure will be through automated response capabilities. Task 1 of the CRADA

California Energy Systems

for the 21st Century

California Energy Systems for the 21st Century

slide-3
SLIDE 3

3

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 12-13, 2014

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

CYBERSECURITY ECOSYSTEMS

  • Administration Networks

– Many providers – Endpoints and Gateways – Remediation via Filter

Authority Signatures Device/Agent Monitoring

Authority Exploits Device/Agent

  • ICS Systems

– Exploits – Possible Vulnerabilities – Weak on Remediation

slide-4
SLIDE 4

4

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 12-13, 2014

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

INDICATOR & REMEDIATION LANGUAGE (IRL)

  • Complex ICS threats require a much richer descriptive syntax
  • Major focus of MMATR is creation of Indicator and

Remediation Language (IRL) for this purpose

  • Examine datastreams using powerful predicates
  • Discover IOCs
  • Specify remediations

If Packet_typea between Addr1 and Addr2

  • ccurs
  • more

than

  • nce

every 100ms then If Message_fielda varies by more than 10% in

  • successive

packets within 10s then If Power_drawa varies while Message_fielda

  • stays

constant in successive packets then If Message_fielda varies by more than 10%

  • from

the rolling average then If Message_fielda varies from Message_fieldb

  • by

more than 20% then

slide-5
SLIDE 5

5

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 12-13, 2014

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

IRL EXECUTION

Block Packet Acknowledge Packet Reboot Device Reload Device Power Off Device Close Port Null Route Address Alter Packet Throttle Packet Decrease Trust Revoke Certificate Firewall Router UPS PKI Relay Trip Relay IED

  • End result is a system that processes IRL packets

from an authority, searching for the compromise and then executing the appropriate action(s)

  • Requires vendor buy-in to process standard IRL
slide-6
SLIDE 6

6

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 12-13, 2014

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

MMATR INFORMATION FLOW

slide-7
SLIDE 7

7

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 12-13, 2014

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

SUMMARY

  • Public-Private Partnership
  • Lawrence Livermore National Laboratory leadership
  • Investor Owned Electric Utility Partners
  • Open-Source Indicator of Compromise and

Remediation Language (IRL)

  • Recognition of symptoms of a compromise
  • Specification of appropriate response(s)
  • Executable at “the edge”
  • Creation of ecosystem for machine distribution and

execution of ICS cybersecurity threat indicators and responses