Who’s In Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems
David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, Raheem Beyah NDSS 2016
Presented by: Yi Zhang October 18th, 2016
Whos In Control of Your Control System? Device Fingerprinting for - - PowerPoint PPT Presentation
Whos In Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems David Formby , Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, Raheem Beyah NDSS 2016 Presented by: Yi Zhang October 18 th , 2016 Cyber Physical
David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, Raheem Beyah NDSS 2016
Presented by: Yi Zhang October 18th, 2016
Personal Computers Mobile Phones Embedded Devices
Motors, pumps, Generators, Valves, Relays…
– LighPng, locks, thermostat, security system
– Power grid, water/sewage, oil/gas, manufacturing, supervisory control and data acquisiPon (SCADA) – Cyber-based compromise can lead to physical harm – Current ICS is filled with vulnerable, legacy devices
– push system into unsafe state, cause physical harm – Previous fingerprinPng work not suited for ICS – TradiPonal IDS have limitaPons
Illustration of simple false data injection
– Compromised node
– Physical access
– Develop accurate fingerprinPng methods to idenPfy what type of device the responses are originaPng from.
– Cross Layer Response Time (CLRT) – EsPmate device processing Pme – Black Box Model fingerprints
– Physical fingerprinPng – EsPmate physical operaPon Pme – Black Box Model fingerprints – New class of fingerprinPng - White Box Modeling
– Time between TCP ACK and SCADA response – StaPc and unique distribuPon
slow and regular traffic
Adversary cannot simply respond faster to beat IED, must match the CLRT fingerprint
architecture
Same hardware, different software
– Average accuracy 93%
performs even be\er
well
Training Data – Original dataset Testing Data – Upgraded network Training Data – Original dataset Testing Data – Different substation
– Time between command packet and event Pmestamp – Requires Pme synchronizaPon
Adversary must guess what event timestamp to respond with
Relays used in testbed, nearly identical specifications Testbed setup
No obvious differences between Open operations due to nearly identical ratings. Clear differences in Close
fingerprinting.
– Operate infrequently, no physical access
Current in coil Magnetic field Permanent magnet force Equation of motion Coil Force
Reduced accuracy, but could be refined as true samples become available
– Weak adversary : compromise one of the low powered devices – Strong adversary: gain physical access to the network
– Data acquisiPon and control – 99% and 92% classificaPon accuracy – Inventory and complemenPng tradiPonal IDS – Resistant to simple mimicry a\acks
– Internet of Things, developing white box methods