towards secure resilient critical infrastructure by design

TowardsSecure&Resilient CriticalInfrastructure byDesign - PowerPoint PPT Presentation

TowardsSecure&Resilient CriticalInfrastructure byDesign EunsukKang CybersecurityCampV Dec12,2019 CybersecurityintheNews SecurityinPractice Release product first, patch as needed


  1. Towards�Secure�&�Resilient� Critical�Infrastructure� by�Design Eunsuk�Kang Cybersecurity�Camp�V� Dec�12,�2019

  2. Cybersecurity�in�the�News

  3. Security�in�Practice Release product first, patch as needed

  4. Critical�Infrastructure:�Game�Changer?

  5. What’s different about critical infrastructure vs traditional computer security?

  6. Challenges�in�Securing�Critical�Infrastructure • Heterogeneity : Interactions between software & physical components A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems. Ratascih et al., IEEE Trans. on Dependable Systems (2019)

  7. Challenges�in�Securing�Critical�Infrastructure 2016 Stuxnet attack (2010) • Heterogeneity : Interactions between software & physical components • Scale & impact : Beyond information security; attacks can have safety implications

  8. Challenges�in�Securing�Critical�Infrastructure • Heterogeneity : Interactions between software & physical components • Scale & impact : Beyond information security; attacks can have safety implications • Legacy : Systems built without security as a goal; difficult to retrofit existing security mechanisms

  9. Challenges�in�Securing�Critical�Infrastructure • Heterogeneity : Interactions between software & physical components • Scale & impact : Beyond information security; attacks can have safety implications • Legacy : Systems built without security as a goal; difficult to retrofit existing security mechanisms • Human factors : Often the weakest link; little security expertise among users & operators

  10. Secure�&�Resilient�Critical�Infrastructure Automating Designing for system-wide resiliency against security assessment attacks in AI-driven for ICS systems

  11. Secure�&�Resilient�Critical�Infrastructure Automating Designing for system-wide resiliency against security assessment attacks in AI-driven for ICS systems

  12. Secure�Water�Treatment�Plant�(SWaT) UV Ultrafiltration Chemical • Fully functional testbed, dechlorinator Unit dosing station developed at Singapore U. of Technology & Design • 6-stage distributed control system • 62 sensors & actuators • Wired & wireless communication Cabinet Reverse with PLCs Osmosis Unit Water Treatment Testbed, Singapore U. of Technology and Design

  13. Challenges�to�Securing�SWaT UV Ultrafiltration Chemical dechlorinator Unit dosing station Cabinet Reverse with PLCs Osmosis Unit • Typical SCADA: Little built-in security protection; limited use of crypto; connected to the Web (remote operator interface) • Safety-critical : Tank overflow, pump damage, water contamination, etc., • Heterogenous : Dynamics of water tank, valves, pumps, etc., • System operators: HMI designed for safety, not security

  14. ‐ ‐ � � � � � � � � � � � � � Challenge:�System-Wide�Security�Evaluation ’s six • What is the impact of local, component-level vulnerabilities on the overall plant safety? Where are the weakest links in the system? • Existing approaches: Manual process or focus on component vulnerabilities

  15. Security�Assessment�Framework�for�ICS System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Goal: Automate system-wide ICS security evaluation through attack modeling, synthesis and validation • Approach: Leverage combinations of techniques from • System modeling: Reusable, analyzable threat model for ICS • Formal verification: Automated, exhaustive analysis for attack synthesis • Machine learning: Inference of physical dynamics model from operation logs

  16. Security�Assessment�Framework�for�ICS System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Reduced effort : • Modeling: Dynamics are difficult to model; learn from data • Analysis: Automate attack benchmark generation • Validation: Automatically execute & validate attacks • Rigorous guarantee : Based on a mathematical foundation; systematically enumerate all possible attacks • System-wide : Analyze impact of local vulnerabilities on the overall system safety

  17. Overview�of�the�Approach System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Goal: Automate system-wide ICS security evaluation through attack modeling, synthesis and validation • Research Problems • Heterogenous (cyber & physical) model integration framework • Automated attack synthesis • Data-driven inference of physical dynamics model • Automated anomaly detection & incident response

  18. Overview�of�the�Approach System Architecture Model Operator Automated Model Physical Validation System Attack Attack Traces Inference Dynamics Attack Traces Testbed Logs Attack Traces Synthesizer Tool Model Threat Model Valid Attack: Library Yes or No? CPS Modeling Framework • Goal: Automate system-wide ICS security evaluation through attack modeling, synthesis and validation • Research Problems • Heterogenous (cyber & physical) model integration framework • Automated attack synthesis • Data-driven inference of physical dynamics model • Automated anomaly detection & incident response

  19. Control�Systems Controller Sensor Actuator Physical Process • System Structure • Physical processes Tanks, valves, pumps • Controller Issue actuator commands based on sensor values • Safety Requirements • No tank overflow, pump damage, water contamination

  20. Invariant-Based�Monitor Monitor M Controller Valve state=ON Tank Pump state=Low Sensor Actuator state=OFF Physical Process • Invariant : Describes expected behavior of a physical process given the state of actuators • Example: “If the valve is closed and the pump is on, then the water level in the tank should decrease over time” • Monitor : Checks whether invariant satisfied; if not, raise an alarm to indicate potential anomalies in the system

  21. Threat�Model M Controller A A Sensor Actuator Physical Process • Attacker capabilities • Compromise comm. links; drop/inject/modify packet • Inject fake sensor readings or actuator commands • Assume: PLCs & physical plants trusted • vs. safety : Multiple sensors compromised at a time • Attacker’s goal • Lead system into unsafe state without being detected

  22. Security�Assessment�Framework A framework for system operators to explore: (1) Is the current monitor sufficient to ensure the safety requirements? (2) What actions does the attacker need to perform to bypass the monitor? Our approach: To automate these tasks, build a formal, analyzable model of an attacker

  23. Modeling�an�Attacker M Controller A A Sensor Actuator T:�Traces Physical Process Attacker as an edit function A:�T�→�T Edit automata: Enforcement mechanisms for run-time security policies Ligatti, Bauer, Walker (2005)

  24. Invariant-Based�Monitor Monitor M Controller Valve state=ON Tank Pump state=Low Sensor Actuator state=OFF Physical Process • Invariant : Describes expected behavior of a physical process given the state of actuators • Example: “If the valve is closed and the pump is on, then the water level in the tank should decrease over time” • Monitor : Checks whether invariant satisfied; if not, raise an alarm to indicate potential anomalies in the system

  25. Modeling�the�Monitor M Controller A A Sensor Actuator T:�Traces Physical Process Attacker as an edit function A:�T�→�T Monitor as a predicate on traces M:�T�→�{true,�false} where �M(t)�=�true� if system execution t satisfies its invariants

  26. Water�Treatment�Example Monitor Tank Valve Pump state=Low state=ON state=OFF

  27. Sensors Monitor Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF

  28. Example�Editing Monitor Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF t�=�<�L=Low,�F1=Y�

  29. Example�Editing Monitor N Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF t�=�<�L=Low,�F1=Y� t'=�<�L=Low,�F1= N

  30. Example�Editing Monitor Flow Meter 1 Level Sensor Flow Meter 2 Flow Sensor 1 Flow Sensor 2 reads=Y reads=Low reads=N reads=Y reads=N Tank Valve Pump state=Low state=ON state=OFF t�=�<�L=Low,�F1=Y,�F2=N t'=�<�L=Low,�F1= N ,�F2=N

Recommend


More recommend