information and it security for power system operation › archive › 2011 › presentations › op...

22
Information and IT Security for Power System Operation Göran Ericsson and Kun Zhu 2011-05-25

Upload: others

Post on 23-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Information and IT Security

for

Power System Operation

Göran Ericsson and Kun Zhu

2011-05-25

Page 2: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Agenda

• Introduction of Svenska Kraftnät

- Swedish National Grid Company

• R&D activities in Sweden

- Collaboration between SvK, KTH and FOI(Swedish Denfence Research Agency)

- Viking project

• Conclusion

Presentation for EPCC 2011, 2011-05-25

Page 3: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

3Presentation for EPCC 2011, 2011-05-25

Page 4: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Missions (in brief)

• Provide transmission of power on the national grid level in compliance with security, efficiency and environmental requirements

• To perform the system operator function for electricity and natural gas cost-efficiently

• To promote an open Swedish, Nordic and European market for electricity and natural gas

• To ensure a robust nationwide supply of electricity

Presentation for EPCC 2011, 2011-05-25

Page 5: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Research Collaboration within Sweden

• Vulnerability scanning

- Detection and false alarms

- Remediation

• Reflections from a Cyber Defense Exercise

- How reliable is the Common Vulnerability Scoring System?

- Expert assessment of the probability of successful remote code execution attacks

- How good are experts and different prediction models?

Presentation for EPCC 2011, 2011-05-25

Page 6: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Vulnerability Scanning

• Purpose: to identify and evaluate possible vulnerabilities of the IT systems based vulnerability scanning tools

Presentation for EPCC 2011, 2011-05-25

Page 7: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Vulnerability Scanning Project

• How does it work?

• Network scanning

• Vulnerability scanning

• Vulnerability analysis

Scanner

Hello, what services and operating systems are you guys running?

I am 172.18.1.3, Windows XP SP2, unpatched, with file sharingand remote desktop enabled

Presentation for EPCC 2011, 2011-05-25

Page 8: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Vulnerability Scanning Project

• How does it work?

• Network scanning

• Vulnerability scanning

• Vulnerability analysis

Scanner

Hmm.. XP SP2 withoutpatches… There are 17 vulnerabilitites that are applicable.

Presentation for EPCC 2011, 2011-05-25

Page 9: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Vulnerability Scanning Project

• How does it work?

• Network scanning

• Vulnerability scanning

• Vulnerability analysis

Scanner

Do you have default passwords or any other sillyconfiguration flaws?

My password is ”password”, it is handy as no one forgets it!

Presentation for EPCC 2011, 2011-05-25

Page 10: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Vulnerability Scanning Project

• How does it work?

• Network scanning

• Vulnerability scanning

• Vulnerability analysis

Presentation for EPCC 2011, 2011-05-25

Page 11: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Vulnerability Scanning Project

0

10

20

30

40

50

60

70

80

90

100

0 10 20 30 40 50 60 70 80 90 100

% D

ete

cti

on

% False Alarm

Unauthenticated scans

Nessus

Qualys

NeXpose

SAINT

McAfee

AVDS

Patchlink scan0

10

20

30

40

50

60

70

80

90

100

0 10 20 30 40 50 60 70 80 90 100

% D

ete

cti

on

% False Alarm

Authenticated scans

Nessus

Qualys

NeXpose

SAINT

McAfee

AVDS

Patchlink scan

Presentation for EPCC 2011, 2011-05-25

Page 12: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Vulnerability Scanning Project

0

10

20

30

40

50

60

70

80

90

100

0 10 20 30 40 50 60 70 80 90 100

% R

em

ed

iati

on

% Detection

Unauthenticated scans

Nessus

Qualys

NeXpose

SAINT

McAfee

AVDS

Patchlink scan0

10

20

30

40

50

60

70

80

90

100

0 10 20 30 40 50 60 70 80 90 100

% R

em

ed

iati

on

% Detection

Authenticated scans

Nessus

Qualys

NeXpose

SAINT

McAfee

AVDS

Patchlink scan

• Automated security scanning needs to be complemeted through otherefforts…

5884 pages

report …

Presentation for EPCC 2011, 2011-05-25

Page 13: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Presentation for EPCC 2011, 2011-05-25

Cyber Denfense Exercise

Page 14: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Cyber Denfense Exercise

• Does the vulnerability level of a system affect the time needed to compromise the system?

• Vulnerabilities can be measured through the Common Vulnerability Scoring System (CVSS)

- Scale from 0 – 10

• 15 system-level vulnerability metrics are testedto see if any metric displayed a relation to the time needed to compromise the systems

- Drawn from literature (9 metrics) and models used by the industry (6 metrics).

Presentation for EPCC 2011, 2011-05-25

Page 15: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Cyber Denfense Exercise

• TTC: Time from start of attack (measured through the first alarm from the intrusion detection system Snort) until successful compromise of that host.

Snort t1 = 1400.3 sec

t2 = 3000.2 sec

TTC = t2 – t1

Presentation for EPCC 2011, 2011-05-25

Page 16: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Research in cyber security so far…Cyber Defense Exercise

• Statistics for the best model…

Presentation for EPCC 2011, 2011-05-25

Page 17: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Research in cyber security so far…Cyber Defense Exercise

• A more detailed security estimation model is needed!

Presentation for EPCC 2011, 2011-05-25

Page 18: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

H. Holm, M. Ekstedt and D. Andersson “Empirical analysis of system-level vulnerability metrics through actual attacks” submitted to IEEE Trans on Dependable and Secure Computing.

Presentation for EPCC 2011, 2011-05-25

Page 19: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Viking Project

• VIKING stands for Vital Infrastructure, Networks, Information and Control Systems Management

• EU financed Framework 7 Collaborative STREP Project and is part of themes 4, ICT, and 10, Security.

• Between 2008-11-01 and 2011-10-31

• To investigate the vulnerability of SCADA systems and the cost of cyber attacks on society

• A consortium of industrial and academic partners

- KTH, Stockholm

- ETH, Zurich

- University of Maryland

- E.ON

- ABB

- Astron Informatics

- MML

www.vikingproject.eu

Presentation for EPCC 2011, 2011-05-25

Page 20: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

VIKINGFrom security requirements

to societal costs

Attack

SCADA system

Power network

Societal cost

AttackInventory

System ArchitectureVulnerability Models

SCADA functionality manipulation:State Estimator, AGC

Virtual city/citizensimulator

Virtual T&D networksimulator

Presentation for EPCC 2011, 2011-05-25

Page 21: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Cyber-security from SvK perspective

• It is of paramount importance to take security into consideration in the procurement phase of new system for power grid operation and control

- Architecture: is the system are composed by different zones with security concerns?

- Security mechanism

- Authorization: third party access

• The same security concern should be shared with other critical infrastructures in society, such as water, gas and transportations.

Presentation for EPCC 2011, 2011-05-25

Page 22: Information and IT Security for Power System Operation › archive › 2011 › Presentations › OP 5 Zhu... · 2016-11-07 · Information and IT Security for Power System Operation

Questions?

Presentation for EPCC 2011, 2011-05-25

[email protected]

[email protected]