otsdn what is it does it help
play

OTSDN What is it? Does it help? Dennis Gammel Schweitzer - PowerPoint PPT Presentation

OTSDN What is it? Does it help? Dennis Gammel Schweitzer Engineering Laboratories, Inc. Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org Important Aspects of Critical OT Networks


  1. OTSDN – What is it? Does it help? Dennis Gammel Schweitzer Engineering Laboratories, Inc. Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org

  2. Important Aspects of Critical OT Networks • Determinism and low latency • Precise time • Fast fault detection, isolation, and recovery • Cybersecurity defense in layers • Monitoring, self-testing, and alarming • Maintainability, testing and diagnostics • High MTBF hardware cred-c.org | 2

  3. Message Delivery Performance Criteria Defined by International Standards IED performance requirements IEC 61850, IEC 60834, IEC 15802, IEEE 802.1 Latency specifications IEC 61850, IEC 60834, IEC 15802, IEEE 802.1 Speed IEC 61850 cred-c.org | 3

  4. Message Delivery Quality Criteria Defined by International Standards Dependability and security requirements IEC 61850, IEC 60834 Availability requirements IEC 61850, IEC 60834, IEEE 802.1 Reliability metrics IEC 61850, IEEE 1613, IEC 60870 cred-c.org | 4

  5. International Standards Dictate Protection Signal Exchange Acceptance Criteria • Signal < 3 ms packet transit < 1 ms 99.99% of the time • Signal <18 ms packet transit <15 ms 0.01% of the time • Zero dropped GOOSE messages per year, <9 extra messages every 24 hours cred-c.org | 5

  6. Challenges With Traditional Ethernet Switching • Designed for plug and play • Conveniently does things “we don’t want” • Reactive failover • Topology dependent performance • Difficult to achieve 100% test coverage cred-c.org | 6

  7. Network Healing Using IEC 62439-1 RSTA C1 IED IED C2 7 7 S1 S2 RSTA RSTA 2 2 1 1 2 IED S3 RSTA 1 7 Peer-to-peer RSTP informs RSTA cred-c.org | 7

  8. Introducing SDN Traditional Software-Defined Ethernet Switch Networking (SDN) Switch Individual Control and Centralized Control Plane, Data Planes Individual Data Plane Centralized Control Plane Traditional Eth Switch Control Plane Data Plane SDN Ethernet Switch Data Plane cred-c.org | 8

  9. Introducing SDN and OpenFlow Application Layer OAM Applications Network Visualization Configuration Programming Control Plane Network Operating System Open Flow Simple Packet- Simple Packet- Forwarding Forwarding Hardware Hardware Data Plane Simple Packet- Forwarding Hardware cred-c.org | 9

  10. How SDN Works Data plane inspects each Ethernet packet and performs one or more • Match fields – match rule based on first 4 layers of the Ethernet packet • Instructions – perform one or more programmed actions • Counters – increment counters and send counter data to centralized point cred-c.org | 10

  11. Multilayer Match Rules Forward Packets SDN Flow Match Rule TCP / UDP Ethernet IP Header Header Header Payload Layer 3 Layer 4 Layer 2 cred-c.org | 11

  12. OTSDN vs Traditional SDN Static vs Reactive Flows • Traditional SDN uses reactive flows to dynamically respond and adapt to changes in the network and traffic • Focus is on bandwidth utilization and latency rather than determinism • Continuous learning and flow management • Uncertain network performance at any given time • SDN Controller performance bottleneck cred-c.org | 12

  13. Reactive IT SDN in Operation IT Flow Controller SDN Switch Rule Server Rule SDN Switch Rule SDN Switch Packet Packet IED cred-c.org | 13

  14. OTSDN vs Traditional SDN Static vs Reactive Flows • OTSDN is uses static flows for proactive engineering of known network configuration • Static flows can be used because all traffic is known • Networks never have new traffic or devices without official change order • New or unexpected traffic will be dropped • Network state and performance is always known and as designed cred-c.org | 14

  15. Proactive OT SDN in Operation OT Flow Controller SDN Switch Rule Server SDN Switch SDN Switch Rule Rule Packet IED IED cred-c.org | 15

  16. Design Traffic Where Paths Are Based on Requirements and Applications Flow Controller Is Not Required for Network Operation GOOSE 2 SDN Switch Relay GOOSE 1 Relay SDN Switch SDN Switch Engineering Access SCADA Combined Rugged SDN Switch Computer cred-c.org | 16

  17. OTSDN - Cybersecurity at Every Network Hop • Only allow traffic that is required and only to the places it is needed. • No ARP Cache poisoning • No Broadcast storms • No BPDU attacks • Hosts only see traffic for destined them and nothing else cred-c.org | 17

  18. No traffic injection from unexpected locations • Locked down flows restrict what traffic is allowed on the network at every point • Spoofing a device MAC/IP address is difficult • Packets that match flow rules must originate from predetermined location. • Any attempt to spoof a device from an alternate location raises alert and tracked cred-c.org | 18

  19. Traditional Intrusion Detection System External with Slow Action Response IDS Knowledge WAN Database Alarms & events Gateway Analysis Engine Network Sensor Switch Network Sensor Response / Action Switch Switch Network Sensor IED IED cred-c.org | 19

  20. OTSDN Intrusion Detection System Integrated With Fast Dynamic Response WAN Dynamic change of IDS Application security policies OTSDN Switch OTSDN OTSDN Controller Switch OTSDN OTSDN Switch Switch IED IED cred-c.org | 20

  21. Targeted IDS • All needed traffic is engineered to go where it is needed • Any unmatched traffic can be easily be discarded or sent to an IDS • IDS will ONLY see the traffic that was not already engineered • IDS will be burdened much less than watching all traffic • More scrutiny can be given to this unwanted traffic cred-c.org | 21

  22. Targeted Deep Packet Inspection Focus DPI processing only where it is needed • Individual Flow(s) from individual switch(es) can easily be sent to a DPI processor. • The DPI process can determine if the packets should be allowed on the network. • If allowed, send it back to the OTSDN switch for further processing, otherwise drop/log. • Reduces burden on the DPI device by only processing the chosen stream of data. cred-c.org | 22

  23. Conclusion • OTSDN is standard technology with different methodology • Purpose engineered networks allow deny-by-default cybersecurity at every hop in the network • Deterministic failover with traffic metrics • New approach to IPS, IDS, and DPI • Multipath capable / Application based circuits • Controlled change management and network access cred-c.org | 23

  24. http://cred-c.org @credcresearch facebook.com/credcresearch/ Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend