Null Feb 13

36
- Sundar
  • date post

    19-Oct-2014
  • Category

    Documents

  • view

    769
  • download

    4

description

Securing Critical Infrastructure

Transcript of Null Feb 13

Page 1: Null Feb 13

- Sundar

Page 2: Null Feb 13

• Systems in real-time data management , on which our day to day activities depend :

– Water plants

– Gas

– Electric grids

– Refineries

– Nuclear plants

– Large manufacturing plants

– Traffic control Systems

Page 3: Null Feb 13

Vitek boden took over the entire control system in Australia and released the sewage water into drinking water

Slammer worm disabled the safety monitoring system of Ohio's Davis Besse nuclear plant for nearly 5 hrs in Jan 2003

Gas pipelines in Russia was controlled by a hacker for 24 hrs in 1999

Page 4: Null Feb 13

SCADA systems are often physically distributed over large areas, making hysical security a challenge. Simple vandalism is a real/well known risk: -- “[…] vandals shot out approximately 80 individual insulators on the BPA Cougar-Thurston 115,000 volt transmission line causing it to go out of service at that time. The vandalism occurred near Cougar Dam, which is approximately 25 miles east of Eugene. BPA crews replaced the damaged insulators at an estimated cost of $6,000. Even though no electrical service to EWEB and Lane Electric Cooperative customers was disrupted by the vandalism.

Eugene Water and Electric had to purchase additional power to serve its customers during the 13 hours that it took to repair the damaged line.”

http://www.bpa.gov/corporate/BPAnews/archive/2002/NewsRelease.cfm?ReleaseNo=297

Page 5: Null Feb 13

• -- „A Washington man who admitted to tampering with more than 20 high-voltage transmission towers in four Western states said yesterday he was trying to point out the power system's vulnerabilities. "I intended to loosen the bolts and by doing so illustrate the vulnerabilities of these towers," Poulin told the judge.

• Poulin said in a telephone interview before his arrest that he considered his actions necessary to point out that he was able to damage the towers despite being "62 years old, overweight, arthritic, diabetic, half-blind and a cancer patient living on a minimum of 12 medication pills a day.“‟

• seattletimes.nwsource.com/html/localnews/2001796373_transmission20m.html

Page 6: Null Feb 13

“Starting around 14:14, FE [FirstEnergy] control room operators lostthe alarm function that provided audible and visual indications when asignificant piece of equipment changed from an acceptable to problematicstatus. Analysis of the alarm problem performed by FE after theblackout suggests that the alarm processor essentially “stalled” whileprocessing an alarm event. With the software unable to complete thatalarm event and move to the next one, the alarm processor bufferfilled and eventually overflowed. After 14:14, the FE control computerdisplays did not receive any further alarms, nor were any alarms beingprinted or posted on the EMS‟s alarm logging facilities.“FE operators relied heavily on the alarm processor for situationalawareness, since they did not have any other large-scale visualization toolsuch as a dynamic map board. The operators would have been onlypartially handicapped without the alarm processor, had they known it hadfailed. However, by not knowing that they were operating without an alarmprocessor, the operators did not recognize system conditions werechanging and were not receptive to information received later from MISOand neighboring systems. The operators were unaware that in thissituation they needed to manually, and more closely, monitor andinterpret the SCADA information they were receiving.”

ftp://www.nerc.com/pub/sys/all_updl/docs/blackout/NERC_Final_Blackout_Report_07_13_04.pdf [emphasis added]

Page 7: Null Feb 13

Traditionally network and security folks have focused virtually all our attention on the “enterprise” side of the network, ignoring the parallel “hidden” half of the network associated with process control systems and embedded systems.

Process control systems and embedded systems use different protocols, and no one ever really mentioned them. They were out of sight and out of mind, and managed by hardware guys.

Page 8: Null Feb 13
Page 9: Null Feb 13

• Supervisory control and data acquisition is defined as a common process control application that collects data from sensors from the remote locations and sends them to remote central console for management and control.

• Mainly used large scale distributed measurement and control system spread over geographies

• Control of complex dynamic critical infrastructure systems

Page 10: Null Feb 13
Page 11: Null Feb 13
Page 12: Null Feb 13

Physical \Control Measurements such as

RTU,MTU, PLC

Measure Voltage, Adjust Valve, flip switch

Normally based on Windows , Linux or Unix

Human Machine Interfaces

Transport mediums

Analog , serial, internet, wifi, radio etc

Page 13: Null Feb 13

SCADA devices are often controlled from central monitoring stations (MTUs, or “master terminal units”).

Historically those were Unix-based systems, but many contemporary MTUs are now Microsoft Windows based.

“The end-of-life for Windows NT is having a big impact on the industry.”

Page 14: Null Feb 13

Because SCADA devices with embedded controllers tend to have limited computational power,

Connected via low speed serial lines, SCADA protocols tend to be quite simple, with little or no

protection against spoofing, replay attacks, or a variety of denial of service attacks.

„In a demonstration at a recent security conference, [Jeff Dagle, a PNNL EE] hacked into his testbed system and tripped an electrical breaker. The breaker then signaled the SCADA software that it had opened. But the SCADA controller did not respond because it had not instructed the breaker to open. It was a classic denial-of-service attack. "We were demonstrating a weakness at the protocol level itself," said Dagle.‟

http://memagazine.org/backissues/dec02/features/scadavs/scadavs.html

Page 15: Null Feb 13

Industrial plants, and the instrumentation they include, tend to be long life cycle projects – ten, fifteen or twenty year project lives are by no means uncommon.

by the time the facility is finally decommissioned, there‟s no provision for refreshing those devices the way you might upgrade out of date PCs in some office.

„"Anti-virus software doesn't work on these SCADA systems,“ said Robert Childs, information security analyst at the Public Service Company of New Mexico, who spoke at NetSec about the challenges in working with SCADA vendors to get them to comply with the new rules. "Many of these systems are based on old Intel 8088 processors, and security options are limited to us.“‟

http://napps.nwfusion.com/news/2004/062104secwrap.html

Page 16: Null Feb 13

Remote devices (RTUs and PLCs) also tend to be hard to upgrade : --

The device may use an OS and application that was burned to ROM, and which is not rewritable (“upgrade” == replacing ROMs) –

The device may be physically sealed and not upgradeable,

Or be located in a difficult location, or have no removable media ---

The vendor may no longer be in business, or may not be producing upgrades,

Or the vendor may not be allowing upgrades

Page 17: Null Feb 13

In some cases the patches require approval from external bodies such as FDA which might delay the upgrades.

An example from the embedded system world: “Health care IT professionals say medical device makers prohibit them from changing the systems and even from running anti-virus software in some cases. These IT administrators say manufacturers often are slow to supply software patch updates and routinely claim the Food and Drug Administration (FDA) requires approval of patch-base changes. However the FDA says it has no such rules…”

http://www.nwfusion.com/news/2004/070504hospitalpatch.html

Page 18: Null Feb 13

Owing to need for positive access and control, there is a trend toward simple, known, and shared passwords.

Users like to avoid situations such as: “Do you know the password to turn off the nuclear reactor before it melts down? I forgot mine today…”

http://www.digitalbond.com/dale_peterson/ISA%20July%20Event.ppt

Page 19: Null Feb 13

Very poor authentication protocols

Legacy systems are used which have very well known vulnerabilities (platform dependency)

Systems not patched regularly

Sometimes quite a few nodes are exposed to external environment for debug points , that are used for attacks

No standard or minimal standards of encryption are used in the applications

Page 20: Null Feb 13

There‟s also the sheer issue of managing passwords for thousands of devices –passwords will tend to be common across devices as a practical matter

And of course those passwords aren‟t changed very often (if at all), even when staff transitions occur or years have gone by…

And always tend to have simple and easy to remember passwords for authorization.

Page 21: Null Feb 13

In many cases, SCADA traffic will be on just one port such as 502/tcp (e.g., Modbus/TCP).

The use of a single port (or just a couple of ports) makes it easy to track that traffic, or to poke a hole in firewalls to allow that traffic to pass,

Also makes it easy for the bad guys to scan for connected devices, and it makes it impossible to do port-based selective filtering.

Page 22: Null Feb 13

• One false data one mess up the whole of the system rather than one single unit Can bring down the whole system.

• The disruption could be due to natural events, such as hurricanes, earth quakes, and wild fires or due to man-made malicious events, such as physical destructions or electronic intrusions into infrastructure systems. Identifying, understanding, and analyzing such interdependencies among infrastructure systems pose significant challenges [2-4].

• These challenges are greatly magnified by the geographical expanse and complexity of individual infrastructures and the nature of coupling among them. The rest of the discussion focuses on electric power infrastructure.

Page 23: Null Feb 13

Much of what‟s being faced in the SCADA world has already been hashed through and fixed in the enterprise IT world. Those solutions, where suitable, need to be “thrown over the wall” to SCADA networks and systems so SCADA folks don‟t “reinvent the wheel.” We need to visit with our process control brethren.

Page 24: Null Feb 13
Page 25: Null Feb 13

DNP3

MODBUS

TASE 2.0 / ICCP

Page 26: Null Feb 13

User

UI (Generally known as Man Machine Interface - MMI)

Master Terminal Unit (MTU) Interfaces remote units and collects data from them

Remote Terminal Unit– Interfaces the remote sensors to the MTU

– Communication channel

– Such as internet (mostly clear text), BUS channels

Page 27: Null Feb 13

Mostly based on request response protocol

Does not validate the if the person requesting info is genuine or not

Just throws info when requested

No data encryption

So easily one could poison the BUS data or set the system to reset.

Inject false data into the BUS and create a havoc

Page 28: Null Feb 13

Modify the data coming from the RTU

Denial of service

Exploit Protocol anomalies

Shut down RTU`s , MTU`s

Page 29: Null Feb 13

The MODBUS protocol defines a simple Protocol Data Unit (PDU) independent of the underlying communication layers. The mapping of MODBUS protocol on specific buses or networks can introduce some additional fields on the Application Data Unit (ADU).

The client that initiates a MODBUS transaction builds the MODBUS Application Data Unit. The function code indicates to the server which kind of action to perform.

Page 30: Null Feb 13
Page 31: Null Feb 13
Page 32: Null Feb 13
Page 33: Null Feb 13

• Describes the encapsulation of a MODBUS request or

response when it is carried on a MODBUS TCP/IP network.

• A dedicated header is used on TCP/IP to identify the MODBUS Application

Data Unit, called the MBAP header (MODBUS Application Protocol header).

Page 34: Null Feb 13

These challenging problems call for inter-disciplinary research collaboration between physical as well as cyber systems researchers, and call for laying strong foundation for inter-disciplinary educational program on cyber-enabled critical infrastructure systems focusing on protection, security, resiliency, and sustainability.

Page 35: Null Feb 13

Defcon 15- T335 unraveling Scada protocols http://www.scadasecurity.org/index.php/Main_

Page http://www.modbus.org/docs/Modbus_Messagi

ng_Implementation_Guide_V1_0b.pdf Sandia SCADA Program - High-Security SCADA

LDRD Final Report by Rolf Carlson SCADA Security And terrorism - Internet Security

Systems Scada Security – by Joe St Sauver (uoregon

University) MODSCAN – DEFCON 2008

Page 36: Null Feb 13

Video Links :

scadasecurity.org - Open SCADA Security Project