Secure and Private Smart Grid: The SPEAR Architecture
“
Nets Netsoft 2020 2020Panagiotis Radoglou-Grammatikis University of Western Macedonia pradoglou@uowm.gr
Secure and Private Smart Grid: The SPEAR Architecture Panagiotis - - PowerPoint PPT Presentation
Secure and Private Smart Grid: The SPEAR Architecture Panagiotis Radoglou-Grammatikis University of Western Macedonia pradoglou@uowm.gr Nets Netsoft 2020 2020 Under SPEAR Project A u t h o r s UOWM TECNALIA TE SID SIDROCO CERTH
Secure and Private Smart Grid: The SPEAR Architecture
Panagiotis Radoglou-Grammatikis University of Western Macedonia pradoglou@uowm.gr
Under SPEAR Project
A u t h o r s Alkiviadis Giannakoulias EU EUROPEAN DYN YNAMICS Michail Angelopoulos Anastasios Papadopoulos PPC PPC Vasileios Machamint Michalis Tzifas 8BEL BELLS Francisco Ramos SC SCHN HNEIDER ELE ELECT CTRICSPEAR Layers
3 - L a y e r A r c h i t e c t u r e SPE SPEAR FRF FRF SPE SPEAR SIEM SIEM SP SPEAR CHF CHF AlienVault OSSIM SPEAR SIEM Basis BDAC VIDS GTM, Message Bus SPEAR Forensic Repository AMI Honeypots Honeypot Manager SPEAR RISPEAR Architecture
3 - L a y e r A r c h i t e c t u r e1 st
st Layer: SPEAR SIEMSPEAR SIEM Basis & Message Bus
F i r s t L a y e r o f S P E A R S I E M Responsible for collecting and preprocesses smart grid data and transmit it to DAPS in near real time. SPE SPEAR SIEM SIEM Basi Basis – SPE SPEAR Sen SensorBDAC
Data ReceivingModVIDS
T h i r d L a y e r o f S P E A R S I E M Vis isual Analytics Receives from DAPS the preprocessed smart grid data and perform Visual Analytics. RB RBAC – RolGTM
F o u r t h L a y e r o f S P E A R S I E M Fuzzy Logic Reputation Update System Updates the reputation value for every asset by taking into consideration the previous reputation value and the time interval from the previous reputation degradation until the production of the updated reputation value. Fuzzy Logic Core Quantifies the incoming anomalous event using Fuzzy Logic and by taking into consideration five different variables: (e.g., asset value, event risk, priority and reliability).2 nd
nd Layer: SPEAR FRFSPEAR FR
A g g r e g a t i o n o f F o r e n s i c E v i d e n c e D a t a Post-Incident Forensics Built on top of open-source components such as cryptsetup, syslog-ng, softflowd, nfdump and nfsen toolsets. Data Sources Session data, log file, security eventsHoneypot Manager -Game Theory Intelligence (GTI)
(𝜄∗, 𝛯∗, 𝜒∗) = (0, 2𝑒3𝑂r − 𝑒4 2𝑒3 , 0), if 0 ≤ 2𝑒3𝑂r − 𝑒4 2𝑒3 ≤ 𝑂max and 𝑏1 ≤ 𝑏3 (0,0,0), if 2𝑒3𝑂r − 𝑒4 2𝑒3 < 0 𝑒1 + 𝑒2 + 2𝑒3𝑂max − 2𝑒3𝑂r 2𝑒3𝑂max , 𝑂max, 1 , if 0 ≤ 𝑒1 + 𝑒2 + 2𝑒3𝑂max − 2𝑒3𝑂r 2𝑒3 ≤ 𝑂max and 𝑒1 > 𝑒4 and 𝑏1 + 𝑏2 𝑂r ≥ 𝑏2 + 𝑏3 𝑂max + 𝑏1 + 𝑏2 𝑒1 + 𝑒2 2𝑒3 0, 𝑂r − 𝑒2 + 𝑒4 2𝑒3 , 1 , if 𝑒1 + 𝑒2 + 2𝑒3𝑂max − 2𝑒3𝑂r 2𝑒3 < 0 and 𝑏1 > 𝑏3, ∄, elsewhere When NA does not exist Sim Simulation Par arameters: ■ Nr = 3, Nmax = 10 20000 random solutions ■ a1 = 0.366, a2 = 0.103, a3 = 0.001 ■ d1 = 0.1, d2 = 0.744, d3 = 0.941, d4 = 0.04 Results ts: N = 10, θ = 0.744 N_r N_r: Number of real connected devices, , N_ N_max: Maximum number of connected devices and honeypots that can be deployed in an infrastructure in terms of computing resources, a: attacker’s weights, d: defender’s weights Inp nput Out Output a) Number of honeypots to be deployed, b) Number of real devices to be disconnected C a l c u l a t i o n o f t h e A p p r o p r i a t e N u m b e r o f H o n e y p o t sHoneypot Manager - Deployer
M a n a g e m e n t o f H o n e y p o t s ’ l i f e c y c l e Gateway between SPEAR SIEM and Honeypots It acts as a gateway between the SPEAR SIEM and the honeypots, by enabling the exchange of log data from the honeypots to the SPEAR SIEM. Honeypots as Virtual Machines It handles the lifecycle of the virtual machines in which the honeypots will be deployed. (Each AMI honeypot deployed in separate VM).RTU Honeypot
M a s t e r - C l i e n t H o n e y p o t s u p p o r t i n g m u l t i p l e h o n e y p o t s Multiple Protocols Modbus, IEC 61850, IEC 60870-5-104, DNP3 Integration of Existing Honeypots Conpot, Cowrie, IEC 61850 ServerNeuralPot
A D N N M o d b u s H o n e y p o tNeuralPot GAN
A D N N M o d b u s H o n e y p o t3 rd
rd Layer: SPEAR CHFSPEAR RI
A n o n y m o u s R e p o s i t o r y o f I n c i d e n t s Balance privacy/secrecy (victim identity) with security (usefulness of information sharing). Use of Delegation feature of MISP Tool: Organisation delegates to SPEAR the publicationThank You Questions ?
Thank You & Q /A
C o n t a c t u s p r a d o g l o u @ u o w m . g r h t t p s : / / w w w . s p e a r 2 0 2 0 . e u / h t t p s : / / g r. l i n k e d i n . c o m / i n / p a n a g i o t i s r g