cyber security research on industrial control systems
play

Cyber Security Research on Industrial Control Systems SM Yiu - PowerPoint PPT Presentation

Cyber Security Research on Industrial Control Systems SM Yiu Department of Computer Science The University of Hong Kong Cyber-security for industry 4.0 conference 23 June, 2017 1 Will the followings only be seen in movies? Movies: Cyber


  1. Cyber Security Research on Industrial Control Systems SM Yiu Department of Computer Science The University of Hong Kong Cyber-security for industry 4.0 conference 23 June, 2017 1

  2. Will the followings only be seen in movies? Movies: Cyber Hacking (2015); Italian Job (2003) 2

  3. IT IS REAL! (Defcon Hacking conference 2014) 3

  4. 2016 (US): 295 reports of ICS attacks (20%  ) Mar: New York dam (control system accessed) April: German nuclear power plant (malware) Light-rail system, …. 4

  5. The purpose of the talk is to raise the awareness of the community on the security issues of ICS. 5

  6. Key components of an ICS (Guide to Industrial Control System (ICS) Security, NIST, 2015) 6

  7. Numerous attack points SCADA – a typical ICS (Guide to Industrial Control System (ICS) Security, NIST, 2015) 7

  8. PLC (programmable logic controller) - A small digital computer used for automation of various electro- mechanical process in industries. - “hard” real -time system: output produced in response to input conditions within limited time. - Specially designed to survive in harsh conditions - Programs can be written in a computer and downloaded to PLC via a communication link (e.g. cable) 8

  9. Is PLC critical? In what systems they are used? 9

  10. Yueng Long Sewage Treatment system 10

  11. Ventilation Control and Monitoring System for Tunnel of subway/railway (pictures from MTR report) 11

  12. How easy to hack in PLC? • PLC are NOT secure:  PLC has no proper protection built in, no authentication nor encryption for the communication protocol.  Able to discover PLC by packet sniffing. 12

  13. Touch panel for floor selection PLC to control the lift

  14. A Touch panel to control the lift

  15. Sensor to detect the current floor

  16. Switch that connects the PLC and Touch Panel

  17. The PLC that controls the Lift system

  18. Attack to the Lift System Q: Some engineers feel that it is not easy to connect to it because it is a “closed” system, do you agree? Hacker Network NO authentication capability Connect to the PLC and control the lift directly 19

  19. Five attacks (4 with demos) 1. DoS attack – 100 MB/s is already enough to disable PLC to receive any valid commands – No advanced hacking knowledge needed. Packet generation program – free from Internet

  20. 2. Command injection attack – We connect to PLC directly and generate random commands to PLC – A little bit more knowledge needed: replay attack!

  21. 3. Control the lift – Take control of the PLC, attacker can order to lift to whatever level. – Understand the commands from touch panel to PLC.

  22. 4. Manipulate the sensor values – Actively modify the sensor values – More knowledge about the sensor variables stored in PLC

  23. 5. Time bomb: hack the traffic lights – Build a time bomb to turn both lights for cars and pedestrian green at the same time ONCE A WHILE.

  24. Again, a real case in US (Dec 2015). They examined the traffic light and performed forensic analysis on the PLC …........ 25

  25. Surprisingly ….. Event/log Date/time Program last modified Dec 08 2015 3:05pm Program last compiled Dec 08 2015 5:46pm Program last uploaded (by engineer) Dec 08 2015 5:46pm Program last uploaded (by ????) Dec 26 2015 4:18am Accident Dec 26 2015 pm 26

  26. What we can do (our research directions besides attack) ? - Build a protection layer * Difficulty: low processing power, limited memory/buffer of PLC. - Add-in a forensic module * For detection and investigation. 27

  27. Building a protection layer (i) E.g. firewall …....... (ii) Light-weight detection module inside the PLC. Remark: We also have some interesting methods to do forensics (e.g. how to log the events with limited buffers/power) 28

  28. Acknowledgements Dr. KP Chow, leader of our research group Our talented research students/engineers - Raymond Chan * - Chun Fai Chan, Ken Yau - Han Yu, Bo Zhang, Yuan Zhang Alex Choy, Our partner: PolyU Cisco ** We are more than willing to collaborate with industry for related R&D problems ** <Thank you> 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend