Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA...

25
Introduction C2WindTunnel The Simulation Simulation of Network Attacks on SCADA Systems Rohan Chabukswar 1 , Bruno Sinopoli 1 , Gabor Karsai 2 , Annarita Giani 3 , Himanshu Neema 2 , Andrew Davis 2 1 Carnegie Mellon University, 2 Vanderbilt University, 3 University of California Berkeley First Workshop on Secure Control Systems April 12, 2010 Stockholm, Sweden Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Transcript of Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA...

Page 1: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

Simulation of Network Attacks on SCADASystems

Rohan Chabukswar1, Bruno Sinopoli1, Gabor Karsai2,Annarita Giani3, Himanshu Neema2, Andrew Davis2

1Carnegie Mellon University, 2Vanderbilt University, 3University of California Berkeley

First Workshop on Secure Control SystemsApril 12, 2010

Stockholm, Sweden

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 2: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

Outline

1 IntroductionSecurity of SCADA SystemsSimulation of SCADA Systems

2 C2WindTunnelHigh Level ArchitectureRun Time Infrastructure

3 The SimulationThe SystemAttacksObservations and Conclusions

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 3: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

Security of SCADA SystemsSimulation of SCADA Systems

Legacy SCADA Systems

Supervisory Control and Data Acquisition Systems

Designed to have long life spans, decades

Currently used SCADA systems designed when securitywasn’t a big issue

Internet connection exposes the systems to externalsecurity attacks

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 4: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

Security of SCADA SystemsSimulation of SCADA Systems

Upgrading Legacy SCADA Systems

SCADA systems are cumbersome to upgrade1 Upgrading security implies downtime, not desirable in

critical systems like power plants and traffic control2 Legacy SCADA devices are too limited to be upgraded3 SCADA networks are customized for the systems and their

security properties cannot be generalized

Legacy and future SCADA systems require assessment andelimination of security vulnerabilities

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 5: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

Security of SCADA SystemsSimulation of SCADA Systems

Simulation of SCADA Systems

It is essential to model and simulate communicationnetworks to study mission critical situations

SCADA system is composed of units in domains likedynamic systems, networks and physical environments

Each of these units can be modeled using a variety ofavailable simulators and/or emulators

Simulation of such system needs underlying softwareinfrastructure for a logically and temporally coherentframework

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 6: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

High Level ArchitectureRun Time Infrastructure

C2WindTunnel

Enables various simulation engines to interact and transmitdata, log and analyze real time simulation results

Uses discrete event model of computation for the preciseintegration of a range of simulation enginesRequires integration on two levels for each simulationmodel:

1 API Level: Provides basic services like message passingand shared object management

2 Interaction Level: Synchronization and coordination.

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 7: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

High Level ArchitectureRun Time Infrastructure

High Level Architecture (HLA)

Basis of C2WindTunnel

Initially designed by US Department of Defense (DoD) toensure interoperability and reusability of models andsimulation componentsComponents of the HLA:

1 HLA rules to ensure proper interaction among federatesand to delineate the respective responsibilities

2 Object Model Template (OMT) to prescribe format andsyntax for recording and communicating information

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 8: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

High Level ArchitectureRun Time Infrastructure

Run Time Infrastructure (RTI)

Run Time Infrastructure (RTI) is the softwareimplementation of HLA

A collection of software that provides a set of HLA requiredservices to multiple simulation systems

Several commercial and open-source RTIs available in themarket, some of which have been verified by the USDefense Modeling and Simulation Office.

RTI handles Federation, Object, Time, and EventManagement

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 9: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

High Level ArchitectureRun Time Infrastructure

Time and Event Management

Time Management:

Federate manager uses HLA-specified synchronizationpoints to guarantee that all federates are ready to proceedwith the simulation

Simulation proceeds for a small time step, after which eachfederate needs permission from the RTI to proceed

Event and Data Interaction

A publish and subscribe mechanism is used by the HLA

Each federate declares to the federation which events it isinterested in

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 10: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

C2WindTunnel Simulation Architecture

Distributed Simulation Platform

Simulation Data DistributionAnd Communication Middleware

Run Time Infrastructure

Glue Code

SimulinkFederate

OMNeT++Federate

SimulinkFederate

Controller Network PlantModel Model Model

Model Integration Layer

“Virtual” ComponentsExperiment

SpecificationAnd

Configuration

Models

Run-time

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 11: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

The Plant

Feed 1(A, B, C)

Feed 2(Pure A)

Purge (A, B, C)

Product (D)

Vapor

Liquid

Figure: Chemical Plant (A + C → D)

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 12: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Control Problem

Objectives:

Maintain production rate by controlling valves

Minimize operating cost (function of purge loss of A and C)

Restrictions:

Operating pressure below shutdown limit of 3 MPa

Flows have a maximum at their saturation points

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 13: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

The Controller

y

y0

StateEstimator

LinearQuadraticRegulator

u

u0

+

Figure: The Controller (Simulated in Simulink)

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 14: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Network Map

y5 u4 y6 u1 u2 y1 y2 y3 y7 y8 y9 u3 y4 y10

y u

Plant

Controller

Controller

Router

Relay

Router

Relay

Router

Master

Router

Reactor

Router

Purge

Router

Feed

Router

Product

Router

Figure: Network Map (Simulated in OMNeT++)

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 15: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

OMNeT++

Interpreter traverses the integration model andunderstands which interactions may be sent or received

Synthesizes glue code for each router in the system thatneeds to communicate data to other federates

OMNeT++ internal simulation clock is synchronized withthe RTI

If a message timestamp is outside the current simulationinterval, OMNeT++ requests the RTI for permission toproceed to the next time step

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 16: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Simulink

Interpreter generates code to integrate Simulink modelwith C2WindTunnel

S-function block in each model for each interaction

Synthesized integration code synchronizes simulation time

Performance penalties must be weighed against timingerrors to decide on time-steps

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 17: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Attacks

DDOS-like attacks are simulated on system, targetingvarious routers

Saturated with external communication requests from largenumber of zombie nodes

Rendered slow, effectively unavailable legitimate data

Controller, feed and product routers are attacked from30-second mark to 60-second mark out of simulation timeof 150 seconds

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 18: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Attack on Controller Router

0 50 100 1500.236

0.238

0.24

0.242

0.244

0.246

0.248

0.25

0.252

Time (s)

Ope

ratin

g C

ost (

$/km

ol)

Figure: All sensors, valve controls blocked, plant resets and resumesnormal operation after attack.

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 19: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Attack on Feed Router

0 50 100 1500.236

0.238

0.24

0.242

0.244

0.246

0.248

0.25

0.252

Time (s)

Ope

ratin

g C

ost (

$/km

ol)

Figure: Feed 1 and feed 2 sensors, valve controls blocked, no effecton plant

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 20: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Attack on Product Router

0 50 100 1500.236

0.238

0.24

0.242

0.244

0.246

0.248

0.25

0.252

Time (s)

Ope

ratin

g C

ost (

$/km

ol)

Figure: Several sensors, purge valve controller blocked, plant isuncontrolled for duration of attack, recovers after attack has ceased

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 21: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Conclusions

Effects of each individual attack are hard to predict andcompare analytically

For a complicated system, calculating effects would requireintensive analytical computations, could be intractable

Simulation is the best way to estimate effects, to implementand compare network configurations and redundancies

In proof-of-concept implementation of SCADA system,C2WindTunnel facilitated interaction and data transferbetween environments and monitoring response to attacks

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 22: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Future Work

Simulation can be used to analyze the current network andcontroller and develop more robust control algorithms andimprove the network

Expanding the SCADA system itself to employ a faultdetection and isolation and/or an intrusion detectionsystem

Observing the effect of other common network securityattacks on integrity and confidentiality of the data

Simulation of systems including hardware-in-the-loop.

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 23: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

Acknowledgements

This work was supported in part by TRUST (Team for Researchin Ubiquitous Secure Technology), which receives support fromthe National Science Foundation (NSF award numberCCF-0424422) and the following organizations: AFOSR(#FA9550-06-1-0244), BT, Cisco, DoCoMo USA Labs, EADS,ESCHER, HP, IBM, iCAST, Intel, Microsoft, ORNL, Pirelli,Qualcomm, Sun, Symantec, TCS, Telecom Italia and UnitedTechnologies.

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 24: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

References I

N. Lawrence Ricker, Model predictive control of acontinuous, nonlinear, two-phase reactor. Journal ofProcess Control, Volume 3, Issue 2, May 1993, Pages109-123.

J. O. Calvin, R. Weatherly, An introduction to the high levelarchitecture (HLA) runtime infrastructure (RTI).Proceedings of the 14th Workshop on Standards for theInteroperability of Defence Simulations, Orlando, FL, March1996, pp. 705-715.

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems

Page 25: Simulation of Network Attacks on SCADA Systems · Simulation of SCADA Systems Simulation of SCADA Systems It is essential to model and simulate communication networks to study mission

IntroductionC2WindTunnelThe Simulation

The SystemAttacksObservations and Conclusions

References II

G. Hemingway, H. Neema, H. Nine, J. Sztipanovits, G.Karsai, Rapid Synthesis of HLA-Based HeterogeneousSimulation: A Model-Based Integration Approach. inreview for Simulation.

R. Crosbie, J. Zenor, High Level Architecture.http://www.ecst.csuchico.edu/∼hla/.

HLA standard - IEEE standard for modeling and simulation(M&S) high-level architecture (HLA) — framework andrules. IEEE Std. 1516-2000, pp.i-22, 2000

OMNeT++ Simulation Package.http://www.omnetpp.org/

Rohan Chabukswar Simulation of Network Attacks on SCADA Systems