AMI Threats Intrusion detection requirements deployment

Download Report

Transcript AMI Threats Intrusion detection requirements deployment

David Grochocki et al
 Lures
Potential attackers
 Smartmeters do two way communication
 Millions of Meters has to be replaced
 Serious damages just a click away
Survey Various Threats
Identify the required
information which would
detech the attacks
Identify Common Attack
Techniques
Model an IDS
Decompose the data to
form a Attack Tree
 Communication
between NAN and Gateway
(DCU) – Mostly 802.15.4 or sometimes 802.11
 Communication between Gateway (DCU) and
Utility company – 3G, Edge, WiMax.
 NAN Mesh offers reliability and robustness
 But.,
 Complicates Security Monitoring Solution
 Few smart meter vendors distribute meters
which can report to the utility company
directly through user’s home internet.
 Access
to a communication infrastructure
other than Internet
 Access to millions of low computation
devices
 Access to sensitive customer information
 High visibility and Impact
 Financial Value of Consumption data
5
Attack motivations
 30 Unique attack techniques
 Relevant ones to AMI are alone considered
Survey Various Threats
Identify the required
information which would
detech the attacks
Identify Common Attack
Techniques
Model an IDS
Decompose the data to
form a Attack Tree
 DDoS
attack
 Stealing Customer Information
 Remote Disconnection
 Why?
Results in data outage for many Meters
 How?

Install malware on meter or remote
network exploit

Co-ordinate DDoS among compromised
meters

Flood DCU with large packets

 Why?
Eavesdropping, Social Engineering
 How?

Stealing encryption keys of the smart
meter by physically tampering or
bruteforcing the cryptosystem

Capture AMI traffic

Decrypt to obtain clear text information

 Why?
Distrupt Business, Inflict loss
 How?

Installing malware on the DCU through
physical tampering or by exploiting a
network vulnerability

Identify the meters with corresponding
address information

Use that information to disconnect
targeted users

Survey Various Threats
Identify the required
information which would
detech the attacks
Identify Common Attack
Techniques
Model an IDS
Decompose the data to
form a Attack Tree
 System
Information

CPU Usage, Battery Level, Firmware
Intergrity, Clock Synchronisation
 Network Information

NAN Collision rate, Packet loss
 Policy Information

Authorized AMI devices, Authorized
Updates, Address Mappings, Authorized
services
Survey Various Threats
Identify the required
information which would
detech the attacks
Identify Common Attack
Techniques
Model an IDS
Decompose the data to
form a Attack Tree
 Centralized
Utility Company
IDS Model
IDS
DCU
 Can
detect attacks against Utility network
 But, will miss attacks against smart meters
Meter
+
IDS
Meter
Meter
DCU
Meter
+ IDS
Meter
Meter +
IDS
 Will
have access to meter specific
information
 But.,
 Attacks on DCU cannot be detected
 Functioning both as a meter and IDS can be
resource intensive
 Keys of all other meters have to be stored in
Meter + IDS devices to inspect data
 Not a good idea to store some one’s
decryption key on some one else’s meter
IDS
Meter
Meter
DCU
Meter
Meter
IDS
 More
processing power
 Less number of IDS sensors required
 So less number of places where keys are
stored
 But still, Attacks on DCU are not detected
IDS
Meter
Meter
DCU
Meter
Meter
IDS
Utility Company
IDS
 Either
Centralized + Embedded or
Centralized + Dedicated sensors
 Can detect both attacks at both (DCS and
NAN) ends
 According
to the architecure discussed in this
paper, DCU is the device which is more likely
to have a Public IP address
 Smart meter vendors or third parties may
soon start integrating 802.11 or GSM/3G into
smart meters
 But, why?
 Banner
Grabbing!
 SHODAN – Exponse Online Devices
 Ipv4 computer search engine
 Webcams, Routers, Power Plants, iPhones,
Wind Turbines, Refrigerators, VoIP Phones