towards secure resilient critical infrastructure by design
play

TowardsSecure&Resilient CriticalInfrastructure byDesign - PowerPoint PPT Presentation

TowardsSecure&Resilient CriticalInfrastructure byDesign EunsukKang CybersecurityCampV Dec12,2019 CybersecurityintheNews SecurityinPractice Release product first, patch as needed


  1. Towards�Secure�&�Resilient� Critical�Infrastructure� by�Design Eunsuk�Kang Cybersecurity�Camp�V� Dec�12,�2019

  2. Cybersecurity�in�the�News

  3. Security�in�Practice Release product first, patch as needed

  4. Critical�Infrastructure:�Game�Changer?

  5. What’s different about critical infrastructure vs traditional computer security?

  6. Challenges�in�Securing�Critical�Infrastructure • Heterogeneity : Interactions between software & physical components A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems. Ratascih et al., IEEE Trans. on Dependable Systems (2019)

  7. Challenges�in�Securing�Critical�Infrastructure 2016 Stuxnet attack (2010) • Heterogeneity : Interactions between software & physical components • Scale & impact : Beyond information security; attacks can have safety implications

  8. Challenges�in�Securing�Critical�Infrastructure • Heterogeneity : Interactions between software & physical components • Scale & impact : Beyond information security; attacks can have safety implications • Legacy : Systems built without security as a goal; difficult to retrofit existing security mechanisms

  9. Challenges�in�Securing�Critical�Infrastructure • Heterogeneity : Interactions between software & physical components • Scale & impact : Beyond information security; attacks can have safety implications • Legacy : Systems built without security as a goal; difficult to retrofit existing security mechanisms • Human factors : Often the weakest link; little security expertise among users & operators

  10. Secure�&�Resilient�Critical�Infrastructure Automating Designing for system-wide resiliency against security assessment attacks in AI-driven for ICS systems

  11. Secure�&�Resilient�Critical�Infrastructure Automating Designing for system-wide resiliency against security assessment attacks in AI-driven for ICS systems

  12. Secure�Water�Treatment�Plant�(SWaT) UV Ultrafiltration Chemical • Fully functional testbed, dechlorinator Unit dosing station developed at Singapore U. of Technology & Design • 6-stage distributed control system • 62 sensors & actuators • Wired & wireless communication Cabinet Reverse with PLCs Osmosis Unit Water Treatment Testbed, Singapore U. of Technology and Design

  13. Challenges�to�Securing�SWaT UV Ultrafiltration Chemical dechlorinator Unit dosing station Cabinet Reverse with PLCs Osmosis Unit • Typical SCADA: Little built-in security protection; limited use of crypto; connected to the Web (remote operator interface) • Safety-critical : Tank overflow, pump damage, water contamination, etc., • Heterogenous : Dynamics of water tank, valves, pumps, etc., • System operators: HMI designed for safety, not security

  14. ‐ ‐ � � � � � � � � � � � � � Challenge:�System-Wide�Security�Evaluation ’s six • What is the impact of local, component-level vulnerabilities on the overall plant safety? Where are the weakest links in the system? • Existing approaches: Manual process or focus on component vulnerabilities

  15. Security�Assessment�Framework�for�ICS System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Goal: Automate system-wide ICS security evaluation through attack modeling, synthesis and validation • Approach: Leverage combinations of techniques from • System modeling: Reusable, analyzable threat model for ICS • Formal verification: Automated, exhaustive analysis for attack synthesis • Machine learning: Inference of physical dynamics model from operation logs

  16. Security�Assessment�Framework�for�ICS System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Reduced effort : • Modeling: Dynamics are difficult to model; learn from data • Analysis: Automate attack benchmark generation • Validation: Automatically execute & validate attacks • Rigorous guarantee : Based on a mathematical foundation; systematically enumerate all possible attacks • System-wide : Analyze impact of local vulnerabilities on the overall system safety

  17. Overview�of�the�Approach System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Goal: Automate system-wide ICS security evaluation through attack modeling, synthesis and validation • Research Problems • Heterogenous (cyber & physical) model integration framework • Automated attack synthesis • Data-driven inference of physical dynamics model • Automated anomaly detection & incident response

  18. Overview�of�the�Approach System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Goal: Automate system-wide ICS security evaluation through attack modeling, synthesis and validation • Research Problems • Heterogenous (cyber & physical) model integration framework • Automated attack synthesis • Data-driven inference of physical dynamics model • Automated anomaly detection & incident response

  19. Control�Systems Controller Sensor Actuator Physical Process • System Structure • Physical processes Tanks, valves, pumps • Controller Issue actuator commands based on sensor values • Safety Requirements • No tank overflow, pump damage, water contamination

  20. Invariant-Based�Monitor Monitor M Controller Valve state=ON Tank Pump state=Low Sensor Actuator state=OFF Physical Process • Invariant : Describes expected behavior of a physical process given the state of actuators • Example: “If the valve is closed and the pump is on, then the water level in the tank should decrease over time” • Monitor : Checks whether invariant satisfied; if not, raise an alarm to indicate potential anomalies in the system

  21. Threat�Model M Controller A A Sensor Actuator Physical Process • Attacker capabilities • Compromise comm. links; drop/inject/modify packet • Inject fake sensor readings or actuator commands • Assume: PLCs & physical plants trusted • vs. safety : Multiple sensors compromised at a time • Attacker’s goal • Lead system into unsafe state without being detected

  22. Security�Assessment�Framework A framework for system operators to explore: (1) Is the current monitor sufficient to ensure the safety requirements? (2) What actions does the attacker need to perform to bypass the monitor? Our approach: To automate these tasks, build a formal, analyzable model of an attacker

  23. Modeling�an�Attacker M Controller A A Sensor Actuator T:�Traces Physical Process Attacker as an edit function A:�T�→�T Edit automata: Enforcement mechanisms for run-time security policies Ligatti, Bauer, Walker (2005)

  24. Invariant-Based�Monitor Monitor M Controller Valve state=ON Tank Pump state=Low Sensor Actuator state=OFF Physical Process • Invariant : Describes expected behavior of a physical process given the state of actuators • Example: “If the valve is closed and the pump is on, then the water level in the tank should decrease over time” • Monitor : Checks whether invariant satisfied; if not, raise an alarm to indicate potential anomalies in the system

  25. Modeling�the�Monitor M Controller A A Sensor Actuator T:�Traces Physical Process Attacker as an edit function A:�T�→�T Monitor as a predicate on traces M:�T�→�{true,�false} where �M(t)�=�true� if system execution t satisfies its invariants

  26. Water�Treatment�Example Monitor Tank Valve Pump state=Low state=ON state=OFF

  27. Sensors Monitor Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF

  28. Example�Editing Monitor Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF t�=�<�L=Low,�F1=Y�

  29. Example�Editing Monitor N Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF t�=�<�L=Low,�F1=Y� t'=�<�L=Low,�F1= N

  30. Example�Editing Monitor Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF t�=�<�L=Low,�F1=Y,�F2=N t'=�<�L=Low,�F1= N ,�F2=N

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend