onboard locomotive security methods · 2017. 4. 10. · onboard locomotive security methods mark...

33
Onboard Locomotive Security Methods Mark Kraeling Product Architect GE Transportation April 5, 2017

Upload: others

Post on 27-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Onboard Locomotive Security Methods

Mark KraelingProduct ArchitectGE Transportation

April 5, 2017

Page 2: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Biography: Mark Kraeling

• Product Architect

• Embedded Software

• Applicable Work:

– Wayside PTC software

– Security Architect for GoLINC platform

– Ethical Hacker for IT systems

– Advanced technologies implementation

Page 3: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Learning Objectives1. Learn about network security methods applicable

to mobile assets

2. Gain an understanding of how security could be deployed for an IT-centric mobile data center on locomotives

3. Discuss the various embedded security fundamentals and learn about their applicability to networks

4. Show demonstrations of network and unwanted intrusions and how security rules and methods can detect and intercept them

Page 4: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Agenda

• Connecting assets to the back office

• Mobile Data Center on a locomotive

• Security Fundamentals for a Mobile Data Center

• Active Security Methods

• Demonstrations

• Conclusions

Page 5: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

CONNECTING ASSETS TO THE BACK OFFICE

Agenda Topic 1 of 6

Page 6: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Data Flow

Freight Locomotive

Heavy Haul Freight Train

Network

Corporate Network

Page 7: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Wireless Technologies

802.11 WiFi: Similar to older systems, it was not designed with security at inception and design

LTE: Designed with security considerations up front

Private LTE: As opposed to public carriers, allows creation of private network for communication

Page 8: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Potential Wireless Risks

• Cellular modems not assigned and connected to corporate back office

• Intruders from corporate network

• Hackers that bypass WiFi overlay security

• Mis-Management of keys and certificates

Page 9: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

MOBILE DATA CENTER ON A LOCOMOTIVE

Agenda Topic 2 of 6

Page 10: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Modular Electronics

• AAR S-9101 Ancillary Card Cage (ACC)

Page 11: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Similar Technology to Back Office

• Processing: HyperVisor-enabled processing that allow multiple operating systems and applications to run concurrently

• Storage: Network storage for networked applications

• Communications: Aggregated communications for locomotive, to better manage asset to infrastructure communications

Page 12: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Potential Electronics Risks

• Intruder onboard locomotive attempting network access with a device

• Intruder that attempts access to software through a remote session

• Intruder that attempts to alter functionality through alternate software load or alteration of connections

Page 13: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

SECURITY FUNDAMENTALS FOR A MOBILE DATA CENTER

Agenda Topic 3 of 6

Page 14: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Traditional Methods

• Secure Network Protocols: Method of encryption to allow point-to-point secure communications

• Firewalls: A list of the permitted traffic that is allowed between networks. Traffic must pass through Layer 3 networking device. Normal configuration is to block everything but only allow certain traffic

Page 15: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Traditional Methods

• Authentication of Data Sources: Method to ensure that source of data or destination is true

• Hardware-assisted Flow Control: Hardware that is put into place to limit flow control for data interfaces

Typically Hardware and System Solutions

Page 16: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Think Like an Attacker

• Threat Analysis: Before a system is designed, if I were to attack it how would I? How could others?

• Abuse Cases: Not a use case, but an “abuse” case – what are the scenarios and methods that should be part of design up front so that we can handle it

Page 17: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Think Like an Attacker

• Embedded Systems: Designed to process various inputs, and then based on conditions drive outputs. Typically time-constrained and need to meet timing requirements.

• Attacker: Has “all day” to determine course of action, evaluate data, and try another attack

Typically Software Solutions

Page 18: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

ACTIVE SECURITY METHODSAgenda Topic 4 of 6

Page 19: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Passive vs. Active

• Firewall: Will continuously block ports or IP addresses not listed in the rules or chains of the configured rules

• SSH/Session: If the incorrect credentials are attempted, the session will not connect, then loops to the beginning to wait for another login

Passive security stops a singular attack

Page 20: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Passive vs. Active

• Determine a threat is taking place, then

Stop It

Report It

Record It

Stop It in the future

…and ideally Learn from it

Page 21: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Network Security: Active Firewall

• A typical firewall follows a specific chain of rules, and if the packet is allowed it is passed through. Otherwise, it is dropped

• This continues…

• Active firewall will track incoming packets that are dropped, and then take action [report it / prevent it]

Page 22: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Network Security: Denial of Service

• Denial of Service attacks use high rates of data to flood network

• Rate limiting checks for excess bytes of data over a given timeframe, then takes action to prevent it from occurring

• Could include updated firewall rules or turning off hardware port

Page 23: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Network Security: Packet Inspection

• Packet Inspection involves looking at each of the network packets promoted to the processing layer

• Specific patterns can be matched that have been identified as being malicious

• Packet classification can also be performed

Page 24: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Network Security: Detect Port Scan

• Network hackers typically will perform a port scan to see which ports are open

• System can detect a scan is in process, and report and block that source address

• System could also present hacker a “false” reporting of ports that are open, including an enticing HoneyPot port

Page 25: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

System Security: File Monitoring

• While running, files such as executables, libraries, and configurations can be monitored

• If an editing program or file change takes place, could block activity or user from making changes to the system

• System can then report activity with access type

Page 26: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

System Security: Least Privilege Execution

• Executables in the system are setup to run with “least privilege execution”

• Running with highest privilege creates a possibility that exploited process could do larger damage to system

• Helps limit security liability

Page 27: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Local Security: Session Logging

• If a local or remote access through secure shell (SSH) is allowed, record all activity

• Could look for commands that are blacklisted, to again block activity or user from being able to execute command

• Session logs include user, all executed commands, and screen feedback

Page 28: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Local Security: Trusted Platform

• Onboard hardware could include Trusted Platform hardware (TPM) to perform secure boot

• Keys are created to match signed image with the TPM module so that booting will not occur if there is not a match

• Prevents running rogue software on the hardware

Page 29: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Local Security: HoneyPotting

• HoneyPotting involves setting up a “virtual” port for a hacker to log into

• The environment itself is a complete fabrication –and the user is presented information that appears to be correct but isn’t

• While there, information about hacker is recorded and reported while session is occuring

Page 30: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

DEMONSTRATIONSAgenda Topic 5 of 6

Page 31: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Demonstration

[Embedded video showing various attacks and prevention methods from previous slides]

Page 32: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

CONCLUSIONSAgenda Topic 6 of 6

Page 33: Onboard Locomotive Security Methods · 2017. 4. 10. · Onboard Locomotive Security Methods Mark Kraeling Product Architect GE ... –Wayside PTC software –Security Architect for

Conclusions

• Nearly impossible to put an effective security architecture in place after system requirements and design

• Newer technologies allow a more “active” security system that covers network, file system, and local security