Presentations Trustworthy Cyber Infrastructure for Power (TCIP) - - PDF document

presentations
SMART_READER_LITE
LIVE PREVIEW

Presentations Trustworthy Cyber Infrastructure for Power (TCIP) - - PDF document

Trustworthy Cyber Infrastructure for the Power Grid Presentations Trustworthy Cyber Infrastructure for Power (TCIP) Protection Detection and Response Mechanisms Klara Nahrstedt , Illinois , Zbigniew Kalbarczyk , Illinois University of


slide-1
SLIDE 1

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

1

Trustworthy Cyber Infrastructure for Power (TCIP)

Klara Nahrstedt, Illinois

Protection Detection and Response Mechanisms

University of Illinois • Dartmouth College • Cornell University • Washington State University

, Zbigniew Kalbarczyk, Illinois Control Communication Architecture

University of Illinois • Dartmouth College • Cornell University • Washington State University From presentation by D. Whitehead, “Communication and Control in Power Systems”, TCIP Summer School , June 2008

slide-2
SLIDE 2

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

2 Presentation Methodology Power-Grid supporting Digital Networks and Distributed Systems

(Presenter: Klara Nahrstedt) (Presenter: Klara Nahrstedt)

University of Illinois • Dartmouth College • Cornell University • Washington State University

Power-Grid supporting Computing Base

(Presenter: Zbigniew Kalbarczyk)

Characteristics and Goals for Control Networks and Devices

  • Characteristics

– Mission-oriented – Stable

  • Goals

1. Real-time availability to sustain the critical functions of the power grid 2. Integrity to trustworthy deliver correct commands and data 3. Confidentiality to safeguard trade secrets

University of Illinois • Dartmouth College • Cornell University • Washington State University

  • Trends

– Update /replace existing devices, networks, software with low cost commodity infrastructure such as Linux, Windows, Intel-based processors, Mesh Networks, WiFi, Zigbee, Internet protocols (TCP/IP), …

slide-3
SLIDE 3

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

3 Power-Grid supporting Digital Network: State of the Art

  • Network State of the Art

– No routable traffic in many cases between substations and control centers – Serial lines between sensors and RTUs in substations

IEC 61850

and RTUs in substations – One way digital communication from the substation to the control center, – Hierarchical organization between substations and control centers – No wireless or very little wireless network deployment

  • Real-Time State of the Art

University of Illinois • Dartmouth College • Cornell University • Washington State University

– Separate networks for real-time and management traffic

  • Network Security State of the

Art

– Security by obscurity or perimeter security

The Problem Space

  • Real-Time Availability is not addressed adequately under new trends

– Real-Time Problems: Service-oriented model instead of mission-

  • riented model, Low stability since software changes constantly (new

patches) , Difficulties in maintaining configurations in real-time conditions conditions

  • Real-Time Management Problem
  • Cyber-Security is not addressed adequately

– Security problems: Attacks on Integrity by polluting data, losing data

  • Key Management Problem
  • Authorization, Authentication, Access Control Problem
  • Attack Management Problem

– Security problems: Attacks on Confidentiality by attacking Ethernet

University of Illinois • Dartmouth College • Cornell University • Washington State University

– Security problems: Attacks on Confidentiality by attacking Ethernet switches, IP traffic routers; end devices to get to data

  • Key Management Problem
  • Authorization, Authentication, Access Control Problem
  • Attack Management Problem
slide-4
SLIDE 4

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

4 Approach: End-to-End Real-Time Trust Provisioning via Protection, Detection, Response

Control Center Level

ISO

Ethernet / IP-Network (Secure, Real-time, Monitored)

Backup

Ethernet / IP-Network (Secure, Real-time, Monitored)

Coordinator Level

Private IP-Based Network (Secure, Real-time, Monitored) Private IP-Based Network (Secure, Real-time, Monitored)

Data “Smart” Gateway/Hub

Private IP-Based Network (Secure, Real-time, Monitored)

Network Level Metering and Load Control

University of Illinois • Dartmouth College • Cornell University • Washington State University

Substation Level Sensor/Actuator Level

IED IED IED Local HMI IED DFR IED IED IED “Smart” Gateway/Hub Ethernet / IP-Network (Secure, Real-time, Monitored)

Approach

  • Protect, Detect, Respond

– Protect: Prevent (Plan, Admit, Reserve) violations, Enforce (Schedule, Encrypt, Sign) real- ti il bilit i t it d

Data

Protection Functions Detection Functions Response Functions

Control Center

time availability, integrity and confidentiality – Detect: Monitor, Assess and Alert violations, threats, vulnerabilities, misbehaviors, errors

Private IP-Based Network (Secure, Real-time, Monitored)

DFR IEDIEDIED

Protection Functions Detection Functions Response Functions University of Illinois • Dartmouth College • Cornell University • Washington State University

– Respond: Act against abnormal events , Issue reconfigurations, Bridge new and legacy entities along the end-to-end path, Contain misbehaved entities

IED IED IED Local HMI IED

Protection Functions Detection Functions Response Functions

Substation

slide-5
SLIDE 5

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

5 Protect, Detect, Respond Framework

Power Grid Protocols: IEC 61850, DNP3, ICCP, MODBUS

Protect: Enforce & Prevent Detect Respond

SCADA Data Keys Setup Encryption/ Decryption Re-keying Protocols Detection of AAA Violations Per-Packet Authentication, Role Authorization, Access Control Trust Negotiation Q alit

  • f

Detect Violation of Keys Confidentiality Password Change Access Privileges Change

Key Man. AAA

Control

University of Illinois • Dartmouth College • Cornell University • Washington State University Real-time Delivery Scheduling Quality of Service Admission, Reservation QoS Monitoring Detection of QoS Degradation Vulnerabilities/Attack Assessment, Monitoring, Detection, Containment and Recovery QoS Adaptation

Real Time Man.

Attack Man.

Current Research Thrusts (1): Key Management

  • Problem:

– Allocate and distribute keys to heterogeneous devices in Power Grid over diverse networks – Allow cryptographic functions for confidentiality and integrity DNSSEC

Control Center/SCADA

y g y – Recover from attacks when keys are compromised

  • Idea:

– Simplified key management – Resource-efficient combinatorial public key management approach

  • Results so far:

– Domain Cert: simplified PKI / DNSSEC

Gateway DNSSEC Cache Gateway

SMOCK

DomainCert

University of Illinois • Dartmouth College • Cornell University • Washington State University

DNSSEC certificate management – SMOCK: resource-efficient group key scheme for legacy devices

  • In progress:

– Integrated hierarchical key management with diverse key schemes

New IED Devices Legacy IED Devices

slide-6
SLIDE 6

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

6 Current Research Thrusts (2): AAA Management

  • Problem:

– Achieve confidentiality, integrity and availability in dynamic and evolvable fashion – Allow for robust, flexible and high performance authorization across organizations

  • Idea:

– Data Plane Security Architecture – Authorization via trust negotiation

  • Results so far:

– GridStat with transparent inter-changable security modules assigned on a per status variable granularity – Trustbuilder2 framework – Integrated Gridstat and TrustBuilder2

Access?

Control Center 2 Alice at Control Center 1 University of Illinois • Dartmouth College • Cornell University • Washington State University

– ABUSE: enabling human users to draw correct trust conclusions about “secure” email (Validated against Aug 2003 transcripts)

  • In progress:

– Exploration of end-to-end AAA/Security Architectures

Service

P

Employee at NERC- certified control center? Audit policy? Audit policy Employee ID Access granted

(2) Trust Negotiation State Consistency Example Scenario

Control Center 2 Alice at Control Center 1

The scenario: Alice can be either a power operator or an internal auditor in Control Center 1, though these roles are mutually exclusive. As an internal auditor, she can also act as an information classifier. Alice wishes to access a remote service available to power

  • perators who are information classifiers, and forces the use of an inconsistent system

state to accomplish this.

Alice requests access to the status database

Control Center 2 Alice at Control Center 1

Certified power operator in NERC-certified control center? Information classifier?

X

Inconsistent State!

University of Illinois • Dartmouth College • Cornell University • Washington State University

Power operator credential. Audit Policy? Access granted!

Service

Certified audit policy.

P

Information classifier certificate.

√ √ √

slide-7
SLIDE 7

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

7 Current Research Thrusts(3): Real-Time Availability

  • Problem:

– Deliver SCADA data in real-time within millisecond to second ranges

  • ver commodity cyber-infrastructure

(wireless/wired Internet)

  • Idea:

Example of data driven channel access

|Q| = no. of slots allowed

  • Idea:

– Coordinated scheduling – Optimized resource allocation – QoS-based routing and real-time streaming

  • Results so far:

– Consensus-based distributed control in MAC layer – iDSRT: Integrated and Coordinated network CPU node scheduling

RTApps

Application

BEApps

iDSRT

Quantized state values

University of Illinois • Dartmouth College • Cornell University • Washington State University

network, CPU, node scheduling framework – GridStat: QoS overlay routing, multi- phase protocols

  • In progress:

– Integration of different QoS schemes for prevention, enforcement and adaptation of real-time traffic

iEDF MAC DSRT

Middleware Network MAC Kernel User iCoord Data Plane Control Plane

(3) End-to-end Real-Time Data Delivery (Example at the Substation)

Middleware Power Application

Real-Time CPU Scheduling/ Coordination SCADA Data IEC 61850

Gateway Device

Private IP-Based Network (Enabled: Security , QoS Routing, Real-time Streaming, Monitoring Middleware Power App

Real-Time CPU SCADA Data/Alarm Generation IEC 61850

Middleware

Power App Real-Time CPU SCADA Data/ Alarm Generation IEC 61850 PHY/MAC (Consensus-based Distributed Control)

Network

Real-Time Network Scheduling University of Illinois • Dartmouth College • Cornell University • Washington State University PHY/MAC (Consensus-based Distributed Control) Internet Network Real-Time Network Scheduling Real-Time CPU Scheduling/ Node Coordination

PHY/MAC (NIC Card)

Internet Network Real-Time Network Scheduling Scheduling/ Node Coordination

IED Device IED Device

slide-8
SLIDE 8

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

8

TCIP Testbed Results: End-to-End Delay

University of Illinois • Dartmouth College • Cornell University • Washington State University

iDSRT has lowest end-to-end delay Current Research Thrusts (4): Attack Management

  • Problem:

– Monitor cyber and power side sensor data and provide system security state estimation – Understand and detect characteristics of QoS/security attacks and design effective t i t t t i

Abnormality 1

A1 Abnormal

Critical Normal Coarse-

grained Containment Fine- graine d contai nment

containment strategies – Find optimal response and recovery actions

  • Idea:

– Multiple degrees and contexts of attack – Coarse grained and fine-grained attack containment – Probabilistic Real-Time Intrusion Response

  • Results so far:

Severity1

S1 S2

RRE

University of Illinois • Dartmouth College • Cornell University • Washington State University – ACF: Attack Containment framework with jamming detection – RRE: Response and Recovery Engine

  • In progress:

– Alibi protocols for jammer identification – End-to-end Attack Monitoring and Detection with RRE and ACF

slide-9
SLIDE 9

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

9

(4) Attack Management

Recovery and Response Framework At the Control C t

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Recovery and Response Engine (RRE)

Aggregation Correlation Bad Data Detection RRE DB

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Alerting to System Operator

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

RRE Central Unit

:

Decision Making

  • n Recovery

Actions

Data/Control Monitor

Vulnerabilities/Attack Detection Attack Containment/ Cooperative Response

Attack Logs

Attack Container Framework Center

Processing/ egation

Bad Data Detection RRE DB

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Supervisory Control and Data Acquisition Networks Actions

Alerts

University of Illinois • Dartmouth College • Cornell University • Washington State University Attack Monitoring/ Containment

Coope at e espo se

Log Summarization

Framework At the Substation

Attack Monitoring/ Containment Attack Monitoring/ Containment Data Aggre

Power-Grid supporting Computational Base

University of Illinois • Dartmouth College • Cornell University • Washington State University

slide-10
SLIDE 10

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

10 The Problem Space

University of Illinois • Dartmouth College • Cornell University • Washington State University

Current Research Thrusts (1)

University of Illinois • Dartmouth College • Cornell University • Washington State University

slide-11
SLIDE 11

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

11 Fuzz Testing

  • Results so far:

– Built LZFuzz, based on Lempel-Ziv compression – Successfully tested and validated on isolated SCADA

IED IED IED “Smart” Gateway/Hub
  • In progress:

– Building LZFuzz into a network appliance

Data “Smart” Gateway/Hub Ethernet / IP- Network (Secure, Real- time, Monitored) IED IED IED Local HMI IED DFR IED IED IED Ethernet / IP- Network (Secure, Real- time, Monitored)

Intercept packets Tokenize, mutate

LZfuzz string table

xxx gjhjhgjhgjhg http get put aquire resetxxx gjhjhg http get put aquire rese xxx gj hjhgjhgjhg http get put aquire reset xxx gjhjhgj hgjhg http get put aquire reset xxx g jhg http get put aquire resett

University of Illinois • Dartmouth College • Cornell University • Washington State University

– Accommodates sensitivity

  • Of results
  • Of network details
  • And of protocol details, too!

– Increases scalability

Current Research Thrusts (2)

University of Illinois • Dartmouth College • Cornell University • Washington State University

slide-12
SLIDE 12

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

12 Hardware Enhancements

Analysis Application Source Hardware Check Synthesis Software Compiler

  • Results so far:

– Reliability and Security Engine

  • Integration with power SCADA
  • Protects against pointer

SW/HW “Linking” FPGA Instantiation Protected Application

g p taintedness

  • Protects critical variables

– Faerieplay

  • Protects critical power

scheduling computation against insider attack

University of Illinois • Dartmouth College • Cornell University • Washington State University

  • In progress:

– Better Mousetrap

Current Research Thrusts (3)

University of Illinois • Dartmouth College • Cornell University • Washington State University

slide-13
SLIDE 13

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

13 OS Enhancements

Administrative Container (Global Zone) Trusted application Trusted application Trusted application

Trusted Container Trusted Container Security Monitor Security Monitor

X.509

  • Results so far:

– TPM support into Open Solaris

BIOS, Hardware, TPM Operating System

Trusted Container Manager (TCM) TCM Certification Authority (TCM-CA)

certificate

  • In progress:

– Trusted Zones on Demand

  • Scalable bridging of

trust domains in an ISO

  • Increasing availability
  • f legacy event-driven

University of Illinois • Dartmouth College • Cornell University • Washington State University

FUTURE ISO Protected Data

  • f legacy event driven

power apps – Low-impact node-based intrusion detection – Integration with hardware techniques

Current Research Thrusts (4)

University of Illinois • Dartmouth College • Cornell University • Washington State University

slide-14
SLIDE 14

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

14 Cryptography despite Constraints

  • Results so far:

– YASIR

  • Bump-in-the-wire
  • High security

g y

  • Low latency

– ECC and precomputation engines

  • In progress:

– Fast revocation for limited devices limited bandwidth

University of Illinois • Dartmouth College • Cornell University • Washington State University

devices, limited bandwidth – Key management despite limited bandwidth – Key management for decades of transition

Current Research Thrusts (5)

University of Illinois • Dartmouth College • Cornell University • Washington State University

slide-15
SLIDE 15

Trustworthy Cyber Infrastructure for the Power Grid

Presentations

University of Illinois • Dartmouth College • Cornell University • Washington State University

15 Attested Meters

CESIum

  • Results so far:

– First stage based on TPM and virtualization – Second stage based on

µC Sensor Power Main

mote-sized coprocessor system – Third stage based on typical meter industry processors

  • In progress:

University of Illinois • Dartmouth College • Cornell University • Washington State University

g – Kernel formally verified to code level – Using meter networks for emergency communications

Questions? Power-Grid supporting Digital Networks and Distributed Systems

+

University of Illinois • Dartmouth College • Cornell University • Washington State University

Power-Grid supporting Computing Base