Challenges in Ensuring the Security of Cyber Physical Systems Singapore University of Technology and Design Aditya P Mathur January 12, 2013 Birla Institute.

Slides:



Advertisements
Similar presentations
Cyber Physical Systems: Security and Safety
Advertisements

Challenges in Protecting Critical National Infrastructure from Cyber Attacks Singapore University of Technology and Design Aditya P Mathur September 27,
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems Organizers: NC State University & UNC Chapel Hill.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
How organizations use ICT:. Technological advancements in  process monitoring,  control  and industrial automation in recent years have improved the.
Lecture 11 Intrusion Detection (cont)
Distributed Control Systems Emad Ali Chemical Engineering Department King SAUD University.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
STUXNET. Summary What is Stuxnet? Industial Control Systems The target/s of Stuxnet. How Stuxnet spreads. The impact of Stuxnet on PLC’s.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
SCADA and Telemetry Presented By:.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Security Equipment Equipment for preventing unauthorised access to data & information.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
A sophisticated Malware Arpit Singh CPSC 420
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
Illinois Center for Wireless Systems Wireless Security Quantification and Mechanisms Bill Sanders Professor, Electrical and Computer Engineering Director,
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
1. Introduction 1.1 Background 1.2 Real-time applications 1.3 Misconceptions 1.4 Issues in real-time computing 1.5 Structure of a real-time system.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Topics of presentation
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Low Level Control. Control System Components The main components of a control system are The plant, or the process that is being controlled The controller,
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
Control Theory in Industry, Robotics and Infrastructure
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Stuxnet.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Understand Malware LESSON Security Fundamentals.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cyber Physical Systems: Security and Safety Zia Saquib, PhD Centre for Development of Advanced TIFR, May 6, 2016.
XFEL The European X-Ray Laser Project X-Ray Free-Electron Laser Wojciech Jalmuzna, Technical University of Lodz, Department of Microelectronics and Computer.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
How a presumably military grade malware sabotaged the Iranian nuclear program W32.Stuxnet Presenter: Dolev Farhi |
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Information Systems Security
Week 1 Lecture 1 – Challenges in Security of Cyber Physical Systems
W32.Stuxnet How a presumably military grade malware sabotaged the Iranian nuclear program Presenter: Dolev Farhi |
Securing Network Servers
UNICOS: UNified Industrial COntrol System CPC (Continuous Process Control) Basic course SESSION 3: PLC basics UCPC 6 UNICOS-Continuous Process Control.
Chapter 2: System Structures
How SCADA Systems Work?.
6: Processor-based Control Systems
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
PLANNING A SECURE BASELINE INSTALLATION
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Cyber Security For Civil Engineering
Presentation transcript:

Challenges in Ensuring the Security of Cyber Physical Systems Singapore University of Technology and Design Aditya P Mathur January 12, 2013 Birla Institute of Technology and Science

Questions of interest 2 What is a CPS? What are the security issues in CPS and how do they differ from those in traditional information systems? To what extent can a CPS be secured against cyber crime? Are there some fundamental design principles that ought to be used when designing or upgrading a CPS? What are the curricular ramifications of CPS security?

CPS: Examples 3 Shipping Healthcare Energy Transportation

Smart Grid - Overview

Smart Grid – Smart Metering

Smart Metering Privacy Issue (1)

Smart Metering Privacy Issue (2)

Cyber Physical System: Components 8

CPS: Greenhouse 9

CPS: Blending process 10

Cyber Physical Systems: Abstraction 11

CPS: Component view 12

CPS: Systems View 13 Physical System Sensor Control System Actuator y u: input x: state Estimation and control : Network

CPS Network-based Attacks 14 Physical System Sensor Control System Actuator y’ not y: Sensor compromised u’ not u controller compromised Network jammed

Existing Techniques 15 Authentication Digital signatures Access control Intrusion detection

Enhancement of existing approaches 16 How deception and DoS attacks affect application layer performance (e.g., estimation and control)? Intrusion detection and deception attacks in control systems? What if a human is not in the loop for intrusion detection?

Traditional versus CPS security 17

Traditional 18 Confidentiality: Ability to maintain secrecy from unauthorized users. Integrity: Trustworthiness of data received; lack of this leads to deception. Availability: Ability of the system being accessible

CPS 19 Timeliness: responsiveness, freshness of data Ref: A Taxonomy of Cyber Attacks on SCADA Systems, Zhu et al., UC Berkeley. Availability: unexpected outages Integrity: genuine data displayed and received by the controller Confidentiality: Information regarding SCADA not available to any unauthorized individual Graceful degradation

Industrial Control Systems 20

SCADA 21 Supervisory Control and Data Acquisition System It is an industrial control system that consists of RTUs, PLCs, and HMIs to control an industrial process. Use: Manufacturing, power generation, fabrication, oil and gas pipelines, etc.

RTU 22 Microprocessor controlled Remote Terminal/Telemetry Unit Interface between physical objects and a SCADA. Transmits telemetry data to SCADA. Example: water quality. Siemens LC150 Pump Control Telemetry Unit

PLC 23 Programmable Logic Controller A computer to control the operation of electro- mechanical devices such as pumps, motors, switches Hard real-time system Programs stored in non-volatile memory, battery backup Programmed using State Logic, Basic, C: IEC programming standard Siemens S7-mEC embedded controller

PLC Programming 24 Programs stored in non-volatile memory, battery backup Programmed using IEC programming standard Languages: graphical (e.g., Ladder diagram) and textual (e.g., Structured Text, Sequential Function Charts) Ref: pts/ pdf

PLC Scan 25 PLC program is scanned continuously while reading the state of physical inputs and setting the state of the physical outputs. Scan time for one cycle is between 0-200ms. Larger scan times might miss transient events.

HMI 26 Human Machine Interface Operator panel to display and control of system/device state Programming software: Example: WinCC from Siemens

SDR 27 Software Defined Radio Radio communication system that has the traditional hardware components implemented in software. These include mixers, filters, amplifiers, modulator/demodulator, etc.

Network Security in CPS: Siemens Approach 28 Use the notion of “cell protection.” Divide plant network into “automation cells.” Inside such a cell all devices are able to communicate with each other. Access is controlled at the entrance to each cell using a hardware device Communication with the outside world is via VPN- protected channel.

CPS Survivability 29 How can a CPS continue to function above a given threshold in the presence of attacks? Despite these techniques, systems continue to be compromised.

Two stories: North Pole Toys Stuxnet 30

North Pole Toys: Basics 31 On-line retailer. Carries specialized toys generally not found elsewhere. Process: Toy Assembly, Toy Packaging and Toy Shipping 2011: Replaced the old manufacturing system with new automated industrial control system. Files are carried on USB sticks from main server to the workshop; air gap established

North Pole Toys: Attack 32 Day before Thanksgiving 2011……. Instead of one toy per box, multiple toys were being placed. Some empty boxes were being wrapped. Initial suspicion: Incorrect PLC code; but the code found to be correct. Discovery: kAndyKAn3 worm had infected the PLC and the main office computers.

Stuxnet 33

Uranium and its isotopes 34 Uranium: Naturally occurring radioactive element Uranium 238: % Uranium 235: % Uranium 234: %

Uranium Only isotope found in nature in any appreciable quantities; is fissile, i.e., can be broken apart by thermal neutrons.

Uranium enrichment: Basis 36 Exploit mass difference (238 versus 235) Produce UF 6

Uranium enrichment: Zippe Centrifuge 37 geoinfo.nmt.edu/resources/uranium/enrichment.html Use centrifuges (rapidly revolving cylinders); pulsating magnetic field applied to the rotor; bottom is heated; rotation in vacuum Heavier U238 atoms down and outward Lighter U235 atoms move towards center and are collected Banks of centrifuges used to get the desired amount of U type_centrifuge

Iranian nuclear enrichment plant 38 Intl Atomic Energy Commission found over removed from cascades in a few months!! What happened? About 8700 centrifuges installed; replacement rate of 10% per year (approximately 800/yr);

Malware suspicion 39 It was found that the virus was using a zero-day vulnerability to spread. June 17, 2010: A computer belonging to an Iranian a customer of VirusBlokAda was caught in a reboot loop.

Stuxnet Spread:.LNK file via USB 40 Microsoft informed; the virus named Stuxnet using the file names found in the virus (.stub and MrxNet.sys) The.LNK file drops a new copy of Stuxnet onto other systems It also drops a rootkit which is used to hide the Stuxnet routines. Some driver files used a certificate stolen from a company in Taiwan.

Stuxnet Spread: Vulnerabilities exploited 41 Print spooler Windows keyboard file Task Scheduler file Static password (Cyber) coded by Siemens into Step 7 software

Stuxnet..cut short a long story 42 Designed to target Simatic WinCC Step7 software from Siemens. A malicious DLL file intercepted commands from Step 7 to PLC that controlled frequency converters; replaced them by their own commands; the screen showed only valid commands. Stuxnet searched for a specific value—2C CB 00 01, 9500H, 7050; codes used in Profibus communication standard. The two 1-word codes were of frequency converters made in Finland and Iran.

Stuxnet..finally 43 The STL (Statement List) code sent 47F and 1 (command to start the frequency converter and set value to 1 ). Stuxnet strategy: Stay quiet for 2-weeks; increase the frequency of the converters to 1,410Hz for 15 minutes; restore them to a normal frequency of 1,064Hz for for 27 days; drop the frequency down to 2Hz for 50 minutes. Repeat above.

Control Systems: Basics 44 Ref: Secure control: towards survivable cyber physical systems, Amin et al.,

Linear feedback system 45 x: state vector A: state matrix B: Input matrix C: Output matrix D: Feedforward matrix u: Control input Y: System output x k+1 =Ax k +w k y k =Cx k +v k w: state noise and v: measurement noise vectors Problem: How to ensure optimal state estimation under noisy measurements? Gaussian random noise, zero mean and Q and R, both >0 as covariance

L inear feedback system: discrete version 46 x k+1 =Ax k +w k y k =Cx k +v k w: state noise and v: measurement noise vectors Problem: How to ensure optimal state estimation under noisy measurements? Gaussian random noise, zero mean and Q and R, both >0 as covariance. Assumption: (A;C) is detectable and (A;Q) is stabilizable, the estimation error covariance of the Kalman filter converges to a unique steady state value from any initial condition.Kalman filter

L inear feedback system: robustness 47 x k+1 =Ax k +w k y k =Cx k +v k w: state noise and v: measurement noise vectors Every raw measurement of y might not arrive at the controller (estimator), e.g., due to network congestion. Hence Kalman filters are needed that take into account packet losses (history of packet losses). Do we know the characteristic of packet losses when under attack (QoS parameters)? Perhaps consider state of the communications network as a stochastic event and develop new filtering techniques.

Fault tolerant control (FTC) 48 Goal: Maintain stability and acceptable behavior in the presence of component faults by applying physical and/or analytical redundancies. Passive FTC: Consider a fixed set of fault configurations and design the system to detect and compensate for these. Example: Control in the presence of sensor malfunction. Active FTC: Estimate state and fault parameters using measurements and control data and reconfigure the system using different control law.

PID Controller 49 P: Proportional I: Integral: D: Derivative e: Error u: Control input Y: System output Proportionality constants control the rise time, overshoot, settling time, and the steady state error of system output Y.

Proportional Controller 50 Always a steady state error. Error decreases with increasing gain. Tendency to oscillate increases with increasing gain.

PID Controller 51 Steady state error vanishes. Tendency to oscillate increases with increasing K D =1/T i, i.e., decreasing T i. Tendency to oscillate increases with increasing gain.

PID Controller 52 KP and KI selected for oscillatory system. Damping increases with increasing T d (K D =1/T d ). Derivative term is ineffective when T d is larger than about 1/6 th of the period.

The Gignac irrigation canal 53

SCADA in irrigation: Physical attacks 54 Solar panels stolen affecting radio communications Damaged monitoring bridge that hosts gate controllers Installing additional pumps

SCADA in irrigation: Other incidents 55 Tehama colusa canal, Willows, CA, USA Maroochy water breachMaroochy water breach, near Brisbane, Australia Harrisburg water filtering plantHarrisburg water filtering plant, Harrisburg, PA, USA

SCADA in irrigation 56 SCADA level velocity Hydraulic structures policies Control Signals (radio) Motorized gates and controllers

Irrigation canal model 57 m: Number of canal pools T, X: Cross section width and length of each pool (m) V: Average cross-sectional velocity (m/s) Y: Water depth P: Offtake; lateral outflow (m 2 /s) U i-1, U i : Opening of upstream and downstream gates Gates

Irrigation canal: Shallow Water Eqns 58 g: gravity (m/s 2 ) S f : friction slope S b : bed slope (m/m)

Irrigation canal: Control actions 59 U i-1 and U i : can be changed by controlling the actuators: Y: Known upstream and downstream Yi(0, t) and Yi(X,t): known measurements Upstream and downstream discharge:

Irrigation canal: Boundary conditions 60 Upstream and downstream discharge: Intermediate gates discharge:

Irrigation canal: Feedback actions 61 Change in gate openings u i (t) Boundary control actions are decentralized and local to each canal pool; computed using local water level measurements.

Irrigation canal: Water withdrawal attack 62 J i : Number of offtakes from pool i Lateral flow along the length of the ith pool: Indicator for j th offtake in i th canal: Total lateral withdrawal from i th canal:

Irrigation canal: Water withdrawal attack 63 Adversary can affect withdrawal from one or more of the J i offtakes in canal i. Water is withdrawn by discretely opening and closing the offtake gates. Thus, the offtake withdrawal vector switches between different modes Q={1, 2,….N}.

Irrigation canal: sensor deception attack 64 Adversary can affect sensor readings for upstream Yi(0, t) and Yi(X,t) and gate opening Ui(t) This leads to a transformed water level and gate openings.

Irrigation canal: Experiments 65

Irrigation canal: Experiments 66

CPS Design Principles 67

Aspects to consider Adversary models: Restrict the scope; but overly restrictive assumptions will likely limit their aplicability e.g., in DoS attacks. Trust models: Trust in human users and devices, e.g., sensors and actuators “Under attack” behavior: Detection and graceful degradation. Independence in component design: Redundant authentication mechanisms that are indepenent of each other

Potential research directions and educational needs 69

CPS Gaps? Study the overall design of selected critical CPS infrastructures and determine security gaps and their impact on functionality and safety of Singapore population. 70

CPS Modeling: Network models What is the state space of reach node (a subsystem)? What are the constraints across node-states? If and how could an attacker violate the constraints? 71

CPS [Supply chain] Monitoring Are the existing intrusion detection tools adequate for monitoring attacks across a supply chain? How could nodes in a supply chain-- with Singapore as a node-- be compromised? What monitoring tools are need to check the “health” of a supply chain given the possibility of an network attack? 72

CPS Attack scenarios How to defend against any such attacks? Are there attacks different from the existing ones that could sabotage a supply chain or any CPS? 73

CPS Control Robustness How to design controllers that could continue to function in the presence of deception and denial of service attacks? 74

CPS Access Control Are RBAC and TRBAC models for access control adequate for large distributed CPS and global supply chains? 75

CPS: Theoretical Foundations Control theoretic [e.g., work at Berkeley] 76 Game theoretic [e.g., work at UT Arlington] Verification and testing techniques[e.g., work at Purdue] Specification-based [e.g., work at UIUC]

CPS: Educational needs Traditional IT security: Cryptography, networks, OS, and other CS subjects 77 CPS security: Interdisciplinary education needed; Background in controls, game theory, industrial automation; Domain background Most importantly: Ability to acquire the necessary background through self learning

Summary What is a CPS? 78 What research directions Singapore ought to consider to ensure the functionality of its CPS and consequently the safety of its people? Why existing techniques for the detection and prevention of information-related attacks might be inadequate in CPS?

References [Sample] Secure Control: Towards Survivable Cyber-Physical Systems. Alvaro A. Ca ́rdenas Saurabh Amin Shankar Sastry, The 28th International Conference on Distributed Computing Systems Workshop, IEEE Common Cybersecurity Vulnerabilities in Industrial Control Systems. US Department of Homeland Security. May Cyber-Physical Systems Security for Smart Grid. White Paper. Manimaran Govindarasu, Adam Hann, and Peter Sauer. February Improving the Security and Privacy of Implantable Medical Devices, William H. Maisel and Tadayoshi Kohno, New England Journal of Medicine 362(13): , April Guide to Industrial Control Systems (ICS) Security. Keith Stouffer, Joe Falco, and Karen Scarfone. NIST June 2011.