A Behavior-based Approach to Secure and Resilient Industrial Control Systems

24
A Behavior-based Approach to Secure and Resilient Industrial Control Systems Dimitrios Serpanos Industrial Systems Institute/RC ATHENA, Director University of Patras, Professor Patras, Greece Alpen-Adria University Klagenfurt, March 9, 2017

Transcript of A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Page 1: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Dimitrios Serpanos

Industrial Systems Institute/RC ATHENA, DirectorUniversity of Patras, Professor

Patras, Greece

Alpen-Adria University Klagenfurt, March 9, 2017

Page 2: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

ICS are Cyber-Physical Systems

•Inter-disciplinary emerging area

•Computation + Physics

•Algorithms + Logic + Control + …

Page 3: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

IT vs. OTInformation Technology Operational Technology

Purpose Process transactions, provide information

Control or monitor physical processes and equipment

Architecture Enterprise wide infrastructure and applications (generic)

Event driven, real time, embedded hardware and software (custom)

Interfaces GUI, web browser, terminal and keyboard

Electromechanical, sensors, actuators, coded displays, hand-held devices

Ownership CIO and IT Engineers, technicians, operators and managers

Connectivity Corporate network, IP based

Control networks, hardwired twisted pair and IP based

Role Supports people Controls machines

Page 4: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

ICS Control Loop

Page 5: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

ICS Control Loop Attack

Page 6: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

System View - Requirements

•Hierarchical structure

•Heterogeneous technologies

•Autonomy

•Continuous operation/fail-safe

•Dependability

•Dependence on large number of input devices

•Large installation base (legacy systems)

•Increasing connectivity

Page 7: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Attacks on ICS

•Resilience

•Continuous operation under attack

•Attack mitigation

•Fast recovery after attack

•System evolution without disruption

Attacks

Page 8: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

There have been several incidents…

Page 9: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Strategy and approach

•Build it right and continuously monitor- US Federal Government Strategy

•Our approach

- Programmable (executable) specification with security propertieso Secure by design

- Middleware monitoring process (app) executiono ARMET compares app and specification execution

- Specification includes defense against identified process vulnerabilitieso Novel vulnerability analysis against false data injection attacks

Page 10: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Method

•Define executable process specification

•Augment with all necessary invariants

•Refine to a single behavioral spec (program)

•Include implementation and specification to middleware (ARMET)

•Compare predictions (spec) and observations (implementation)

•Identify inconsistencies – diagnose - recover

Build it right

Continuously monitor

Page 11: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Program derivation by stepwise refinement

Specification (set of acceptable behaviors)

Refinement step(resolves some implementation questions)

Singleprogram

Proof (⊇)Proof (⊇)

Proof (⊇)

Proof (⊇)

Proofs constructed & checked with Coq, a general-purpose logic platform

Page 12: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Example: Water tank control (spec)

Page 13: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Example: Water tank control (code)

Page 14: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

ARMET: Organization

Page 15: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

ARMET: middleware for secure and resilient ICS

•Self-aware system- Self-awareness through dependency-directed reasoning

•System is allowed to only behave legally- Continuous monitoring of prediction/observation consistency- IF inconsistency, THEN diagnosis- Recovery (safe state from alternate, reliable source)

•Detection of unknown attacks- Inconsistency between predictions and observations

•System adaptability to evolutionary constraints- ICS-CERT standards, security and privacy policies, etc.- Specify policies as legal behavior & monitor behavioral consistency

Page 16: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Example: Water-tank attack

Page 17: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

False Data Injection Attack

• FDI attack- Feed fake measurement data to the system- Avoid being detected as bad data- Mislead the controllers- The attacks can be local (each control unit) or global (the whole

control network)

• FDI defense: develop a defense system using techniques for data estimation based on formalizing

- plant, sensors, channels, control software and actuators- attack, defense and detection

Page 18: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

ICS Control Loop

Page 19: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

FDI Vulnerability – SMT Problem

•Assumption- Process P(x)- There is a monitor mon(x,y) [x= process variables, y= measurements]

•Write satisfiability expression for process- FDI(y)= There_exists x : pass_monitor(x,y) AND NOT correct_reading(x,y)- Solve for satisfiability of FDI(y)

o IF FDI(y) is satisfiable with injected values, THEN there exists attack

•Available tool today: dReal

Page 20: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Example: FDI Attack for State Estimation

Page 21: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Analysis of benchmarks

Page 22: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Conclusions

•ICS security is extremely challenging

•We are developing a general framework for CPS security that generalizes both formal program analysis and fault detection methods

•We have a working prototype- We are developing increasingly advanced ICS models

•We have a promising vulnerability analysis technique- We have shown vulnerability in realistic nonlinear power grid models

•Behavior-based ICS protection and analysis is promising

Page 23: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

Team

•Howard Shrobe (MIT)

•Armando Solar-Lezama (MIT)

•Adam Chlipala (MIT)

•Sicun Gao (MIT)

•Muhammad Taimoor Khan (Alpen-Adria University Klagenfurt)

•Sana Al Farsi (QCRI)

•Aref Al Tamimi (QCRI)

•Mohammed Al Obaidi (QCRI)

•Anastasios Fragopoulos (QCRI)

Page 24: A Behavior-based Approach to Secure and Resilient Industrial Control Systems

THANK YOU !