Network Function Insertion for Reliable and Secure Control Messaging - - PowerPoint PPT Presentation

network function insertion for reliable and secure
SMART_READER_LITE
LIVE PREVIEW

Network Function Insertion for Reliable and Secure Control Messaging - - PowerPoint PPT Presentation

Network Function Insertion for Reliable and Secure Control Messaging Over Commodity Transport Deniz Gurkan, Nicholas Bastin, Stuart Baxley University of Houston Funded by the U.S. Department of Energy and the U.S. Department of Homeland


slide-1
SLIDE 1

Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org

Network Function Insertion for Reliable and Secure Control Messaging Over Commodity Transport

Deniz Gurkan, Nicholas Bastin, Stuart Baxley University of Houston

slide-2
SLIDE 2

Resiliency against Threat Vectors in Commodity Transport

  • Sensor data and control directives from oil/gas production facilities are transmitted

unencrypted using unreliable transport protocols over lossy network infrastructures

  • Network threats evolve on a time scale significantly faster than the upgrade

schedules of industrial equipment

slide-3
SLIDE 3

Resiliency Solution: Network Function Insertion

  • Decouple the implementation of secure, reliable transport from the

actual industrial hardware

  • Provide agility in responding to new threats without downtime or vendor

upgrades

  • Design and implement a network function which can be deployed

without infrastructure disruption into existing ICS

slide-4
SLIDE 4

Resiliency through Policy Enforcement

  • Network transport quality
  • Loss
  • Delay
  • Re-ordering
  • Threat vectors: injection attacks
  • Signed packets: Integrity of the system – system control data:
  • Injection by an external third party
  • Injection by an internal third party
  • Encryption: Privacy – system sensor data:
  • Listening by a third party
slide-5
SLIDE 5

POLICY: control knobs with trade-off

  • A lossy network:

P1 P2

slide-6
SLIDE 6

POLICY: control knobs with trade-off

  • A lossy network:

P1 P3 P2

Custom POLICY: delayed but GUARANTEED delivery Custom POLICY: NO delivery unless IN-ORDER Existing protocols: retransmissions, lost connections, end point (not flow-specific) tuning

slide-7
SLIDE 7

Resiliency – Network Transport Quality

  • Loss, delay, re-ordering
slide-8
SLIDE 8

POLICY: control knobs with trade-off

  • A lossy network:

P1 P2 ACK RESEND P2

Custom POLICY: GUARANTEED delivery – delayed on lost packets

P3 P1 P2 P3 P1 P2 P3 P2

slide-9
SLIDE 9

Resiliency – Attack Vectors: injections

  • Integrity of the system (system control/sensor data), privacy (sensor

data)

slide-10
SLIDE 10

Resiliency against attacks

P1 P2 listening third party injecting third party P3 P1 P2 listening third party external third party internal third party sensor site injecting third party P3

Existing protocols: end to end protection with firewalls, without signed packets per flow

slide-11
SLIDE 11

POLICY: guarantee access by authorized personnel and keep sensor/control data private

listening third party injecting third party P3 listening third party external third party internal third party sensor site injecting third party P3 P1 P1 P1

Custom POLICY: signed and encrypted packets of the flow

slide-12
SLIDE 12

Reconfigurable ICS Scenario on UH Testbed

  • Support multiple concurrent arbitrary isolated topologies, with MTS

(Managed Topology Services) orchestration system:

  • Software-defined networking scenarios
  • Critical infrastructure security
  • Internet of things
  • Computer networking education
  • UH Testbed Resources:
  • Over 1000 1Gb and 10Gb switch ports from Brocade, Cisco, Dell/Force10, HP,

Intel, and Pica8

  • Over a dozen SDN switches
  • A variety of specialized forwarding devices (NPUs, hybrid server-switches, etc.)

from Caros, Cavium, Freescale, Intel, and Znyx

  • Over 250 general purpose CPU cores and 1.5TB of ram across two dozen servers
  • Over 100TB of raw storage capacity and 24 line-rate taps
slide-13
SLIDE 13

Network Function Insertion: Testbed Setup

  • Number of sites
  • Sensors per site
  • Sensor emulation software at sensor nodes
  • Management emulation software at remote console
  • Loss
  • Delay
  • Reorder
  • Without a NF - baseline behavior of the network
  • With NF - network function software at NF nodes
slide-14
SLIDE 14

Project Next Steps

  • Reference implementation that achieves representative ICS scenarios

with configurable loss and delay.

  • A test suite for the reference implementation using the UH Testbed.
  • A specification document for the network function deployment and

logical functionality.

  • Analysis to show the level of resiliency achieved through the network

function deployment.

  • Validation and verification results of our implementation and testbed

setup in collaboration with PNNL.

slide-15
SLIDE 15

http://cred-c.org @credcresearch facebook.com/credcresearch/

Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security