viking - The Team for Research in Ubiquitous Secure Technology

Download Report

Transcript viking - The Team for Research in Ubiquitous Secure Technology

A project under the
7th Framework Programme
CPS Workshop
Stockholm
12/04/2010
Gunnar Björkman
Project Coordinator
A Security Project for
the Protection of
Vital Infrastructures
Offic e LA N
Workstation for operators
D MZ LA N
Advanced Workstations
Firewall
SC A D A LA N
Firewall
Historic
B
A
Webserver
ICCP
Communication
Equipment (Front-End)
SCADA Server
(Online/Standby)
Application Servers
Modem
Communication Networks
Firewall
Firewall
System Vendors
CLARiiON
Automation Systems
for Substations
RTU /
PLC
CLARiiON
RTU /
PLC
Geographically distributed process
Other
Control Centers
CLARiiON
RTU /
PLC
IN TER N ET WA N
VIKING - 2
VIKING
Society is dependent on electricity
VIKING
VIKING - 3
The Power Network
VIKING
SCADA
Workstation for operators
Advanced Workstations
Office LAN
SCADA LAN
Firewall
A
SCADA Server
(Online/Standby)
B
Communication
Equipment (Front-End)
Application Servers
Modem
Communication Networks
System Vendors
Front-End
Substation LAN
Front-End
Firewall
Substation LAN
INTERNET WAN
CLARiiON
CLARiiON
VIKING - 4
IED
IED
CLARiiON
IED
Modem
SCADA Security
VIKING
Workstation for operators
Advanced Workstations
Office LAN
SCADA LAN
Firewall
A
SCADA Server
(Online/Standby)
B
Communication
Equipment (Front-End)
Application Servers
Modem
Communication Networks
System Vendors
Front-End
Substation LAN
Front-End
Firewall
Substation LAN
INTERNET WAN
CLARiiON
CLARiiON
VIKING - 5
IED
IED
CLARiiON
IED
Modem
VIKING - 6
VIKING
Why could SCADA be targeted?

SCADA systems monitor and control production and
distribution of i.e. electricity, gas and heat.

SCADA systems were traditionally physically
separated from the office IT network, using
proprietary protocols and OS

SCADA systems was not in the scope of IT

SCADA systems develops today on a standard
platform with standard protocols

SCADA systems are normally not patched and have
a life-cycle of 20 year

SCADA systems have today direct access to the
office IT networks and systems
VIKING - 7
VIKING
SCADA system and security ?

From the GAO report, May 2008, security study regarding TVA.

Remote access system was not securely configured

System and clients was not security patched

Lack of security security settings for key programs

Firewalls were bypassed or inadequately configured

Passwords were not effectively implemented

Logging was limited

No antivirus protection

Lack in security in the connections between Process and Office
IT network

Etc…..

Conclusion “TVA Needs to Address Weaknesses in Control
Systems and Networks
VIKING
VIKING - 8
Consequences of Cyber Security
Incidents… (?)
VIKING
Potential Consequences
VIKING - 9

Northeast Blackout 2003, US and Canada

50 million people without electricity

Financial losses estimated to 6-10 billion USD

Railway system interrupted

Airports shut down (passenger screening, electronic tickets)

Gas stations unable to pump gas

Disrupted cellular communication

Disrupted television (cable tv)

Internet traffic disrupted

Water system lost pressure: boil water advisories, closing of restaurants

Sewage spills
CIA senior analyst Tom Donahue: “We have information that cyber attacks
have been used to disrupt power equipment in several regions outside the
United States. In at least one case, the disruption caused a power outage
affecting multiple cities.”
VIKING - 10
VIKING
This is what we want to avoid!
VIKING
Strategic objectives of the VIKING project
VIKING - 11
The VIKING project will concentrate on cyber attacks on SCADA
systems for the Transmission and Distribution of electricity. The
project has the following objectives:

Provide a holistic framework for identification and assessment of
vulnerabilities for SCADA systems. The framework should provide
computational support for the prediction of system failure impacts and
security risks.

Provide a reference model of potential consequences of misbehaving
control systems in the power transmission and distribution network that
can be used as abase for evaluating control system design solutions.

Develop and demonstrate new technical security and robustness
solutions able to meet the specific operational requirements that are
posed on control systems for our target area.

Increase the awareness of the dependencies and vulnerabilities of
cyber-physical systems in the power industry.
VIKING
Members
Industrial Partners
ABB AG (Germany)
E.ON AG (Germany)
Astron (Hungary)
MML Analysis & Strategy (Sweden)
Academic Partners
Royal Institute of Technology (Sweden)
ETH Zurich (Switzerland)
VIKING - 12
University of Maryland (USA)
VIKING
From security requirements to social costs
Attack
SCADA system
Power network
VIKING - 13
Societal cost
VIKING
Modelling Approach
Network
Control Center
commands
Substation
Actuators
Power Grid
actions
Applications
Substation
Automation
measurements
measurements
Sensors
information
VIKING - 14
commands
state
power
attack
Distribution
decisionsupport
Transmission
commands
power
Operator
Society
Cost
VIKING
Models
Network
Applications
Actuators
commands
attack
Attack
Inventory
measurements
Substation
Automation
Power System
Models
measurements
Sensors
information
commands
VIKING - 15
actions
state
power
System
Architecture
Models
Power Grid
Distribution
decisionsupport
Substation
power
Cyberphysical
Models
Operator
commands
Transmission
Control Center
Society
Society
Models
Cost
VIKING - 16
VIKING
Example attack tree
VIKING
Destroy transformer TD223
VIKING - 17
Grain write access to actuator GT435
Society Models
…
…
VIKING


Previous work has been focused on testing attacks on physical
SCADA system

Viking will do a model based approach

Integrated analysis chain of models from attacks to societal cost
Previous work has been focused on the central system, e.g.
firewalls

VIKING - 18

What characterizes the VIKING approach?
Viking looks on the complete SCADA system including substation and
communication systems
Development of new methodologies

Use of power applications to detect manipulated data, i.e. higher level
of Intrusion Detection System

Use of security enhanced communication structures

Coupling between physical process and IT systems models to study
security issues

Etc.
VIKING - 19
VIKING
Potential Research Results of VIKING

Estimates of the security risk (in terms of monetory loss for the
society) based on threats trees, graphical system architecture and
society models

Comparable, quantitative results for cyber security for different
control system solutions

Use of existing model based application as application level
Intrusion Detection Systems to detect manipulation of data

Use of innovative and existing communication solutions to secure
power system communication

Help with identifying ”weak spots” and how to mitigate them

An environment for performing what-if analyses of the security risk
impact of different architecture solutions
VIKING
Summary
VIKING will investigate the vulnerability of
SCADA systems and the cost of cyber
attacks on society
VIKING will propose and test strategies
and technologies to counteract these
weaknesses
VIKING - 20
VIKING will increase the awareness for the
importance of critical infrastructures and
the need to protect them
VIKING

Project Coordinator Gunnar Björkman


[email protected]
Technical Coordinator Pontus Johnson

VIKING - 21
Contact
[email protected]