Cyber-Physical Systems Security Alvaro A. Crdenas Department of - - PowerPoint PPT Presentation

cyber physical systems security
SMART_READER_LITE
LIVE PREVIEW

Cyber-Physical Systems Security Alvaro A. Crdenas Department of - - PowerPoint PPT Presentation

Cyber-Physical Systems Security Alvaro A. Crdenas Department of Computer Science University of Texas at Dallas Modernization of our Physical Infrastructures Physical Systems are Being Modernized with New Technologies Smart Smart


slide-1
SLIDE 1

Cyber-Physical Systems Security

Alvaro A. Cárdenas Department of Computer Science University of Texas at Dallas

slide-2
SLIDE 2

Modernization of our Physical Infrastructures

Intelligent Transportation Systems Smart Buildings SCADA Smart Grid

HVAC

Operations Center.

Standards: Wireless HART (IEC), ISA SP 100.11a, IETF 6LoWPAN, ROLL, CoRE, Eman, LWIP, IRTF IoT, W3C EIX, IEEE 802.15.4 (g), 802.15.5, etc. Smart Infrastructures

Physical Systems are Being Modernized with New Technologies

2

slide-3
SLIDE 3

Typical Example: Smart Grid

Bulk Generation

Renewable Non Renewable

Transmission Distribution

Renewable Energy Integration Large Capacity Batteries

Customers

Smart Meter Smart Meter Renewable Energy Energy Management Systems Plug-in Vehicles Smart Appliances Batteries

slide-4
SLIDE 4

First Success Story of Sensor Networks

  • SCADA systems:

– Improve monitoring – Situational awareness

  • Cost-effective

solution

4

slide-5
SLIDE 5

Devices are becoming smarter,

slide-6
SLIDE 6

Cyber-Physical Systems

  • By embedding instrumentation in buildings, vehicles, factories, power grid,

we are creating Cyber-Physical Systems (CPS):

– Smart sensing + actuation – CPS systems are IT systems that interact with the physical world

Physical System Sensors Data Processing State Estimation Control Actuators RTUs

6

slide-7
SLIDE 7

Cyber-physical systems

  • Control
  • Computation
  • Communication
  • Interdisciplinary

Research!

7

slide-8
SLIDE 8

Why is Security Important Now? New Vulnerabilities & Threats

  • Controllers are computers (from Relays to MCUs)

– Can be programmed to do anything!

  • Networked

– Sensors and actuators can be accessed remotely

  • Commodity IT solutions

– Well known generic vulnerabilities are widely available – Some technologies are even insecure by design!

  • New functionalities

– New vulnerabilities (e.g. privacy problems with fine-grained monitoring)

  • More devices (IoT)

– Easier to find a vulnerable device

  • Highly skilled IT global workforce

– Creating exploits (and using them) is now easier than ever!

8

slide-9
SLIDE 9

Vulnerabilities can be Exploited

2011 HVAC 2000 Maroochy Shire sewage control system. 2012 Smart Meters

9

slide-10
SLIDE 10

10

A German steel factory suffered massive damage after hackers managed to access production networks, allowing them to tamper with the controls of a blast furnace, the government said in its annual IT security report. Due to these failures, one of the plant’s blast furnaces could not be shut down in a controlled manner, which resulted in “massive damage to plant,” the BSI said, describing the technical skills of the attacker as “very advanced.”

slide-11
SLIDE 11

Stuxnet

  • First PLC trojan
  • Stolen certificates
  • False commands to centrifuges
  • False commands to supervisory network
  • Uranium enrichment in Natanz plant in Iran

11

Infection Mechanism

slide-12
SLIDE 12
slide-13
SLIDE 13

100 200 300 400 500 600 700

Water level (m)

0.5 1

Real water level Sensor measure

Time (sec)

100 200 300 400 500 600 700

Residuals

0.1 0.2 0.3 0.4 Attack Alarm Alarm

Intrusion Detection for IoT

13

Example 2: IDS for SCADA systems My Research: Intrusion Detection Systems (IDS) in IoT by monitoring the “physics” of cyber-physical systems Example 1: Visual Challenges verify that video feed hasn’t been modified

pzVnU6GVJoJ7YVXQtt8QXYNvmSvIUEqs!

Verifier!

visual ! challenge!

1! 4!

video feed!

3! 2!

If image captured by camera does not show our challenge we detect an attack Sponsors:

Remote IO

secondary primary

PLC PLC

L0 Network

Sensor 42.42

Sensors RIO Actuators Attacker

Second Place: ACM student research competition GHC 2015 Example 3: IDS for AMI Deployment in two water treatment facilities Best Paper Award IEEE Smart Grid Communications Conference 2014

Substation Meters Collector

slide-14
SLIDE 14

Network Intrusion Detection

slide-15
SLIDE 15

Deep-Packet Inspection for Industrial Control Protocols

15

Scapy parser for Modbus

slide-16
SLIDE 16

Large Variety of Industrial Control Protocols- Few Parsers, Semantic Info, Closed

  • Modbus/TCP
  • EtherNet/IP
  • Profinet

16

  • DNP3
  • EtherCAT
  • S7
  • BACnet
  • WirelessHART
  • ISA 100

L1 Network HMI Switch

HMI

SCADA Historian PLC1a PLC1b

PLC PLC

Process 1

PLC PLC

Process 2

Remote IO PLC PLC

L0 Network RIO Process n

...

Sensor 42.42

Sensors Actuators

...

PLC2a PLC2b PLCna PLCnb

HMI Remote IO

L0 Network RIO

Sensor 42.42

Sensors Actuators

Remote IO

L0 Network RIO

Sensor 42.42

Sensors Actuators

slide-17
SLIDE 17

We Need to Monitor Field Networks

17

HMI Switch

HMI

SCADA PLC1 Raw Water

HMI Sensor 42.42 Sensor 42.42 Sensor 42.42 Sensor 42.42

inFlow PLC2 Pre-treatment PLC3 Ultra Filtration Valve Level Sensor Pump pH Sensor HCl pump Level Sensor

PLC PLC PLC PLC PLC PLC

Pump

Supervisory Control Network Field Comms. Network

Historian

It is easier to deploy monitors in the Supervisory Network:

  • highly structured info (easier to understand)
  • mirror ports

BUT Compromised PLC can send malicious data to the field and report that everything is normal to supervisory network

slide-18
SLIDE 18

Developing Monitors at the Field Level (SWaT Testbed in SUTD)

18

L1 Network HMI Switch

HMI

SCADA Historian PLC1a PLC1b

PLC PLC

Process 1

PLC PLC

Process 2

Remote IO PLC PLC

L0 Network RIO Process n

...

Sensor 42.42

Sensors Actuators

...

PLC2a PLC2b PLCna PLCnb

HMI Remote IO

L0 Network RIO

Sensor 42.42

Sensors Actuators

Remote IO

L0 Network RIO

Sensor 42.42

Sensors Actuators

  • D. Urbina, J. Giraldo, N.

Tippenhauer, and A. Cardenas. Attacking Fieldbus Communications in ICS: Applications to the SWaT

  • Testbed. Proceedings of Singapore

Cyber Security Conference (SG-CRC), 2016.

slide-19
SLIDE 19

We Need to Monitor the Physics of The System

  • Protocol specification/patterns

correct but false info

  • Physical systems follow immutable

laws of nature

  • Fluid dynamics (water systems)
  • r Electrodynamics (power grid)

used to create time-series models

  • These models can be used to check
  • If control commands were

executed correctly

  • Sensor values are consistent with

expected behavior

19

slide-20
SLIDE 20

LDS Model for Raw Water Tank

20

dVi dt = Ai dhi dt = Qi,in − Qi,out hk+1 = hk + Qi,k − Qo,k A

slide-21
SLIDE 21

Implementing the Attack and the Defense

21

Remote IO

secondary primary

PLC PLC

L0 Network

Sensor

42.42

Sensors RIO Actuators Attacker

Detection

PLC

Attacker RIO Sensors Actuators

unom

i

(k) ua

i (k)

ha

i (k)

hi(k)

slide-22
SLIDE 22

Problem: We Can Always Create Attacks That Are Detected

22

slide-23
SLIDE 23

Undetected Attacks to Water Testbed

23