cyber security considerations for electric power systems

35
Tommy Morris Director, Critical Infrastructure Protection Center Assistant Professor Electrical and Computer Engineering Mississippi State University [email protected] (662)325-3199 Cyber Security Considerations for Electric Power Systems

Upload: tristen-blay

Post on 14-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cyber Security Considerations for Electric Power Systems

Tommy MorrisDirector, Critical Infrastructure Protection CenterAssistant ProfessorElectrical and Computer EngineeringMississippi State University

[email protected](662)325-3199

Cyber Security Considerations for Electric Power Systems

Page 2: Cyber Security Considerations for Electric Power Systems

Electronic Security Perimeter

Is this system air-gapped?

No.

But… •it’s fiber optic.•we own the network.•we own the wireless network.

Page 3: Cyber Security Considerations for Electric Power Systems

Electronic Security PerimeterIs this system air gapped?

What is this?•Leased line from phone company?•Does the utility sell BW to 3rd parties?

No.

Page 4: Cyber Security Considerations for Electric Power Systems

Common configuration

DMZ

Enterprise Network

Control Room

Outstation

WWW

Page 5: Cyber Security Considerations for Electric Power Systems

Can malware infect the control room or outstation?

DMZ

Enterprise Network

Control Room

Outstation

WWW

Yes

Page 6: Cyber Security Considerations for Electric Power Systems

Can malware infect the control room or outstation?

DMZ

Enterprise Network

Control Room

Outstation

WWW

Yes

Page 7: Cyber Security Considerations for Electric Power Systems

What about serial? RS-232/485

Stuxnet

Page 8: Cyber Security Considerations for Electric Power Systems

Take aways

Industrial control system networks are not commonly air gapped..

Industrial control systems can be infected by malware.

An electronic security perimeter alone is insufficient protection.

Need a defense in depth approach.

Page 9: Cyber Security Considerations for Electric Power Systems

Risk Assessment

Should considerlikelihood of attackcost of attackimpact of attack

Compared tocost of preventionlikelihood of prevention

Page 10: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

Interruption (Denial of Service)

An asset of the system is destroyed of becomes unavailable or unusable

Attack on availabilityDestruction of hardwareCutting of a communication lineDisabling the file management systemMay not be physical destruction. May be temporary.

Page 11: Cyber Security Considerations for Electric Power Systems

DOS Prevention Monitor and react

Monitor network traffic for DOS attacksClose offending portsIs it OK to close a network port in an ICS

network? Test devices for vulnerability

○ Protocol mutation (fuzzing)○ Known attacks○ Floods

Share results (ethically)Force vendor to patch

Page 12: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

InterceptionAn unauthorized party gains access to an

assetAttack on confidentialityWiretapping to capture data in a networkIntercepting a password -> badIntercepting a password file -> worseIntercepting ICS data from an RTU. Is that

bad?

Page 13: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

Page 14: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

ModificationAn unauthorized party not only gains

access but tampers with an assetAttack on integrityChange values in a data fileAlter a program to make it perform

differentlyModify content of messages transmitted on

a network

man-in-the-middle (MITM)

Page 15: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

ModificationModification in ICS -> very badFeedback control uses

○ sensors to monitor physical process○ Controllers to control the physical process.

Modifying measured output, measured error, system input, or reference affects system output.

Page 16: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

ModificationNeed to defend the sensor.Need to defend the device which

measures error.Need to defend the controller.Need to defend the communication

network.

Page 17: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

Page 18: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

FabricationUnauthorized party inserts counterfeit objects

into the systemAttack on authenticityInsertion of spurious messages in a networkAddition of records to a fileICS – insertion of

spurious/unwanted/unauthorized controlICS – adding data to a historian

Page 19: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart GridMSU

Page 20: Cyber Security Considerations for Electric Power Systems

ECE 8990 Smart Grid

ICS Example

MSU

Phasor Measurement

Unit (PMU)

GPS Clock

Phasor Data Concentrator (PDC)

Phasor Measurement

Unit (PMU)

Phasor Measurement

Unit (PMU)

Energy Management

System

NetworkAppliance

Error measurement,

Controller

Network

Sensor, reference

reference

Network

Network

Page 21: Cyber Security Considerations for Electric Power Systems

RESEARCH AT MSU

Page 22: Cyber Security Considerations for Electric Power Systems

Network Intrusion Detection for Industrial Control Systems Physical

Wireless IDS Not much at this level

Network, Transport Detect well known attacks

○ Tear drop, LAND, port scanning, Ping Common protocol rules

○ TCP, IP, UDP, ICMP

Application Layer Detect protocol mutations Detect protocol specific DOS attacks Model Based IDS to detect system level attacks

○ measurement injection○ command injection○ system state steering

Physical

Data Link

Network

Transport

Application

Most of our work is here.

Page 23: Cyber Security Considerations for Electric Power Systems

IDS Framework for Synchrophasor Systems Synchrophasor systems being installed across country by

utilities with ARRA grants Improved electric grid visibility

○ Detect disturbances sooner

Wide area protection○ React to disturbances quickly to limit outage

IEEE C37.118 - Synchrophasor Network Protocol Need to develop Snort rules to

Protect against IEEE C37.118 protocol mutation type attacks

Detect reconnaissance, DOS, command injection, and measurement injection attacks

Read Spraberry has identified approximately 36 rules and is writing and testing now.

Page 24: Cyber Security Considerations for Electric Power Systems

IDS framework for MODBUS

Reviewed MODBUS specification and developed a fuzzing framework.

Using fuzzing framework to guide rule development.

○ Rules for specific frame types○ Function codes in frames define payload contents○ Rules based upon relationships between frames

query and response must match

○ Response special cases – exception framesmatch defined exceptions to query function code and error

types

50 rules in developmentSnort

IDS Framework

ICS network

Page 25: Cyber Security Considerations for Electric Power Systems

1. Radio Discovery < 24 hrs.2. Infiltration < 30 days3. Data Injection or Denial of

Service Attack4. Broken Feedback Control

Loop

Example AttackWireless Link

Page 26: Cyber Security Considerations for Electric Power Systems

SNORT Intrusion Detection for Industrial Control Systems

MTU

pump

relief

pipeline

RTU

control logic

Set PointSystem ModeControl SchemePump OverrideRelief OverridePID SetpointPID GainPID ResetPID RatePID DBPID CT

OutputPump StateRelief StatePressure

tap

•Detect Attacks• Command Injection• Measurement Injection• Reconnaissance• Denial of Service

Snort

Page 27: Cyber Security Considerations for Electric Power Systems

Cybersecurity Testing and Risk Assessment for Industrial Control Systems

PMU

ABC

PDC

AB

Substation

Router

MU-4000

PC

RTDS

Bus

Histor-ian

Page 28: Cyber Security Considerations for Electric Power Systems

Cybersecurity Testing and Risk Assessment for Industrial Control Systems

Denial of Service

Known attacks

High volume traffic

Protocol mutation

Device Security

Assessment

Security features

Standards conformance

Port scan

Vulnerability scan

Confidentiality, Integrity

Password confidentiality

Password storage

Man-in-the-middle

•Many vulnerabilities identified and communicated to vendor and project partner.•All addressed

• Firmware fixes• New security features• System architecture changes

Page 29: Cyber Security Considerations for Electric Power Systems

CIPC Lab Growth

Continue to add systems Currently designing SCADA lab

upgrades to increase diversity and complexity.

Needs RTDS Expansion Achilles Satellite Security

Analyzer

Page 30: Cyber Security Considerations for Electric Power Systems

Center for Computer Security Research

National Forensics Training Center

Critical Infrastructure Protection Center

Cyber Security Education

Information and Computing Security

Computer Crime and Forensics

Network Security and Cryptography

Industrial Control System Security

Advanced Network Security

Advanced Digital Forensics

Trustworthy Computing

Internet Security Protocols

Scholarship Programs

NSF Scholarship for Service

DOD Information Assurance Scholarship

National Center of Academic Excellence in Information Assurance EducationNational Center of Academic Excellence in Research

Page 31: Cyber Security Considerations for Electric Power Systems

Research Partners

Page 32: Cyber Security Considerations for Electric Power Systems

Identify vulnerabilities, implement attacks, investigate impact on physical systems.

Develop security solutions; system protection, intrusion detection, attack resilience

Train engineers and scientists for control systems security careers.

CyberSecurity

IndustrialControl

Systems

Critical Infrastructure Protection Center

Page 33: Cyber Security Considerations for Electric Power Systems

Tommy MorrisAsst. Prof.

Director, CIPCIndustrial Control System Security

Ray VaughnV.P. Research

Giles Distinguished ProfessorSoftware Engineering and

Computer Security

Dave DampierProfessor

Director, CCSRComputer Forensics

Malingham RamkumarAssoc. Prof.

Trustworthy Computing

Yogi DandassAssoc. Prof.

Root Kit, Hypervisor Detection

Wesley McGrewResearch Associate

Human Machine Interface Security, Software Vulnerability

and Exploitation

Page 34: Cyber Security Considerations for Electric Power Systems

Read SpraberyBS CPE

Jeff HsuBS EE

Uttam AdhikariPHD ECE

Wei GaoPHD ECE

Shengyi PanPHD ECE

David MuddMS ECE

Quintin GriceMS ECE

Joseph JohnsonBS EE

Lalita NetiMS ECE

Robert GosselinBS EE

Page 35: Cyber Security Considerations for Electric Power Systems

Thank you!