Challen allenges ges in Av Avoiding ding Process ocess An - - PowerPoint PPT Presentation

challen allenges ges in av avoiding ding process ocess an
SMART_READER_LITE
LIVE PREVIEW

Challen allenges ges in Av Avoiding ding Process ocess An - - PowerPoint PPT Presentation

Challen allenges ges in Av Avoiding ding Process ocess An Anomalies malies in Critical itical In Infrastr frastructure cture 2nd Workshop on Cyber-Physical Systems Se Ad Aditya tya Mathu thur curity and Resilience (CPS-SR)


slide-1
SLIDE 1

Challen allenges ges in Av Avoiding ding Process

  • cess An

Anomalies malies in Critical itical In Infrastr frastructure cture

Ad Aditya tya Mathu thur

CPSS S Work rksh shop

  • p. June 4, 2018

18

Professor and Center Director, iTrust Center for Research in Cyber Security Singapore University of Technology and Design Professor of Computer Science, Purdue University, West Lafayette, IN, USA

2nd Workshop on Cyber-Physical Systems Se curity and Resilience (CPS-SR) Montreal, Canada

April 15, 2019

Aditya Mathur

1

slide-2
SLIDE 2

Question

To what extent, and how, can we avoid anomalies in operational critical infrastructure?

2

slide-3
SLIDE 3

Tour Guide

  • A. Context
  • C. Detection
  • D. Command Validation
  • F. Next Steps
  • B. Anomalies
  • E. Experimental Evaluation

3

slide-4
SLIDE 4
  • A. Context

4

slide-5
SLIDE 5

A Distributed CI

Switch Controller [PLC] S A Controller [PLC] S A Controller [PLC] S A Historian SCADA

Level 2 Level 0 Level 1

Management Systems

Firewall NIDS

Attack point

5

slide-6
SLIDE 6

ICS-CERT Annual Vulnerability Coordination Report 2016

6

slide-7
SLIDE 7

Tools for Invasion

Ransomware Malware Virus

Most potent threat

Social Engineering! The Physical and Virtual insider!

7

slide-8
SLIDE 8

A Recent Successful Attack: 2019 Norsk Hydro

8

slide-9
SLIDE 9

Water Treatment Water Distribution Electric power generation, transmission, distribution, AMI

Critical Infrastructure: Interconnection

9

slide-10
SLIDE 10
  • B. Anomalies

10

slide-11
SLIDE 11

Process anomaly

Valid state sequence: q−k q−k+1 q−k+2 . . . q−1 q0 q1 q2 . . . qi : plant state at time t=i Anomalous state sequence: q−k q−k+1 q−k+2 . . . q−1 q’0 q’1 q’2 . . . Anomalous sequence

Question: How to detect anomaly as close to q’0 as possible?

11

slide-12
SLIDE 12

Anomalies: Cause and Avoidance

Communications failure Component failure Process data manipulated Actuator command manipulated Programming errors Fault tolerant design Thorough testing Secure design Firewalls IDS

12

slide-13
SLIDE 13

Anomaly: Birth and Travel

Switch Controller [PLC] S A Controller [PLC] S A Controller [PLC] S A Historian SCADA Management Systems Physical device affected; process disturbed Intrusion not detected Code upload State manipulation Malicious command Malicious command Controller compromised Controller deceived

13

slide-14
SLIDE 14

The Anomaly Impact Pyramid

None Mild Severe Catastrophic

14

slide-15
SLIDE 15
  • C. Detection

15

slide-16
SLIDE 16

Requirements

Ultra-high detection rate rare for an anomaly to be not detected Ultra-low rate of false alarm: e.g., less than 1-false alarm in 6-months; data collected every second Timely detection Offers “enough” time for an operator to take corrective action and avoid damage

16

slide-17
SLIDE 17

Process Dynamics State Entanglement Design Centric Plant design Data Centric Plant data

if (q(c)==vi) q(S);

Adepu et al. 2016

Machine Learning: Model; Noise

Approaches for Detection

S0 S [0, 600] 3, 0.06, #5 S1 [2461, 2640] 3, 0.51, #45 S3 [601, 2460] 3, 0.44, #39 [0, 2640] 3, 0.05, #4 S2 [0, 2640] 4, 0.95, #82 [0, 2640] 3, 0.07, #5 S5 [0, 2640] 4, 0.93, #66 S9 [0, 2640] 1, 0.12, #10 S4 [0, 2640] 2, 0.88, #72 S10 [0, 2640] 4, 1.0, #10 [0, 2640] 2, 0.07, #5 S7 [0, 2640] 1, 0.93, #67 S6 [0, 2640] 2, 1.0, #66 [0, 2640] 3, 1.0, #77 [0, 2640] 2, 0.03, #2 S8 [0, 2640] 1, 0.97, #64 [0, 2640] 2, 0.08, #5 [0, 2640] 3, 0.92, #59 [0, 2640] 1, 1.0, #10

Qin et al. 2018 Mujeeb et al.2018

Yk=f(Yk-1. z1, z2, … zn )

Heng et al. 2019

x ̇ = f(x,u,η) y = g(x, θ)

Fabio et al. 2013

17

slide-18
SLIDE 18

DAD: Monitor placement

Plant controller Plant controller Plant controller Plant network

Monitor: A coded version of a set of rules that must hold during normal operation.

SCADA SWITCH Historian Tuned Monitors

slide-19
SLIDE 19

Claim

Near perfect anomaly detection is achievable BUT… may not be adequate to protect a plant from severe damage.

19

slide-20
SLIDE 20
  • D. Command Validation

20

slide-21
SLIDE 21

Definitions

⍵(t, a): A well-formed command sent to actuator a at time t. ⍵(t, a): Valid iff f(a, ⍵, sk), where sk is plant state when the command is issued. f(a, ⍵, sk): actuator function for ⍵(t, a) ; ensures correct and safe operation of the plant

21

slide-22
SLIDE 22

Sample Actuator Functions

22

slide-23
SLIDE 23

Source of invalid (malicious) commands

Faulty component or network communications Incorrect code Cyber attack Faulty network communications

23

slide-24
SLIDE 24

Origin of a Malicious Command

Direct: Attacker sends a malicious command to an actuator. Indirect: Attacker deceives a PLC through manipulation of state variables. In turn the deceived PLC sends a malicious command.

24

slide-25
SLIDE 25

A Key Requirement for Validation

…a command validator must be able to obtain accurate estimate

  • f the system state and predict continuous state variables.

Given what we know about the origin of a command…

25

slide-26
SLIDE 26

Challenge 1

How to ensure that a command validator can obtain accurate state estimate?

slide-27
SLIDE 27

Challenge 2

Where should a command validator be installed?

slide-28
SLIDE 28

Challenge 3

When a command is found to be malicious, should it be sent to the target actuator?

slide-29
SLIDE 29

Challenge 4

How to avoid the damaging impact of late detection?

slide-30
SLIDE 30

Past work

Mashima et al., 2016 An active command mediation approach for securing remote control interface of substations Stone et al., 2012 Improved modeling and validation of command sequences using a checkable sequence language Maimone et al., 2018 RP-check: An architecture for spaceflight command sequence validation Lin et al., 2016 Runtime semantic security analysis to detect and mitigate control-related attacks in power grids Design centric; partial state estimation Real-time (not simulation) Our approach ALL commands are validated

30

slide-31
SLIDE 31

The Approach

slide-32
SLIDE 32

Architecture for Command Validation

GIC

Level 3 Level 2 Level 1 Level 0

PLC Sensors Actuators

SCADA, HMI, Historian

Remote I/O

Wireless / Wired Networks

Splitter

LIC

from other stages

Orthogonal Defense

validated commands

LIC: Local Intelligent Checker GIC: Global Intelligent Checker

slide-33
SLIDE 33
  • E. Experimental Evaluation

33

slide-34
SLIDE 34

Critical Infrastructure: Water Treatment

34

slide-35
SLIDE 35

Set-up

PLC1 PLC2 RIO1 RIO2 SCADA, HMI, EWS L0 L1 Physical Process MSG MSG Physical Process

  • 1. Attacker
  • 2. Attacker

acker CV S A S A

slide-36
SLIDE 36

Time to make decision

Case 1: No attack before t0 Case 2: Attack before t0, detected before t0 Case 3: Attack before t0,

  • a. detected between t0 and t1,
  • b. detected after t1, and
  • c. Not detected.
slide-37
SLIDE 37

Attacks: Stage 1

Target get Attack ack Detec tecte ted d fi first st by MV101 Open and Close (chatter attack) CV LIT101 Spoof level to low DAD; then after 6-seconds CV stopped the MV101 open command P101 Stop the pump CV LIT101 Cut sensor wire in RIO DAD

slide-38
SLIDE 38

Attacks: Stage 2

Target get Attack ack Detec tecte ted d fi first st by AIT202 Decrease the pH value CV MV201 Close CV P205 (NaOCl) Stop the pump CV P201, P202 Turn ON CV

slide-39
SLIDE 39

Attacks: Stage 3

Target get Attack ack Detec tecte ted d fi first st by P301 Stop outflow from UF CV DPIT301 Activate backwash CV LIT301 Spoof to HH DAD

slide-40
SLIDE 40

Summary 1: Detection and anomalies

CV detected 8 out of 11 attacks. Remaining three attacks:

  • n analog values,
  • detected by DAD, i.e., caused anomalies, but
  • did not lead to the desired impact.
slide-41
SLIDE 41

Summary 2: Timing

No attack detected before t0. Stage 1: Two out of four attacks detected before t1 Stage 2: All four attacks detected before t1 Stage 3: Two out of three detected before t1 Attacks detected between t0 and t1:

slide-42
SLIDE 42

Conclusions

In the experiments conducted, CV worked well in concert with the anomaly detector. Anomalies arising out of continuous state variables are detected by

  • DAD. These may lead to malicious commands (indirect).

. Direct malicious attacks possible only when intelligent checkers are compromised.

slide-43
SLIDE 43
  • F. Next Steps

43

slide-44
SLIDE 44

Full Implementation and Evaluation

Implement CV across the entire plant. Design and launch single and multi-point masking attacks.

44

slide-45
SLIDE 45

CV Inside PLCs?

Should CV, with state prediction, be placed inside PLCs?

45

slide-46
SLIDE 46

Design of Command Validator for Power Grid

Will the approach work on a power grid? Timing is critical

46

slide-47
SLIDE 47

100% anomaly avoidance? Is that a realizable dream?

47

slide-48
SLIDE 48

Thanks…

PhD Students

…to all those who are making it happen!

Gayathri Sugumar Mujeeb Chuadhary Sridhar Adepu Research Staff Collaborators Lin Qin, PhD Student Professor Sicco Verwer

48

Siddhant Shrivastava Jonathan Heng Venkat Reddy Vishrut Mishra Andrew Yoong Gauthama Iyer Nandha Kandasamy Robert Kooij

slide-49
SLIDE 49

Je vous remercie Thank You!