+ All Categories
Home > Documents > Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability...

Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability...

Date post: 03-Jul-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
49
Challenges in Avoiding Process Anomalies in Critical Infrastructure Aditya Mathur CPSS Workshop. June 4, 2018 Professor and Center Director, iTrust Center for Research in Cyber Security Singapore University of Technology and Design Professor of Computer Science, Purdue University, West Lafayette, IN, USA 2nd Workshop on Cyber-Physical Systems Se curity and Resilience (CPS-SR) Montreal, Canada April 15, 2019 Aditya Mathur 1
Transcript
Page 1: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Challenges in Avoiding Process Anomalies in

Critical Infrastructure

Aditya Mathur

CPSS Workshop. June 4, 2018

Professor and Center Director, iTrust

Center for Research in Cyber Security

Singapore University of Technology and Design

Professor of Computer Science,

Purdue University, West Lafayette, IN, USA

2nd Workshop on Cyber-Physical Systems Se

curity and Resilience (CPS-SR)

Montreal, Canada

April 15, 2019

Aditya Mathur

1

Page 2: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Question

To what extent, and how, can we avoid

anomalies in operational critical infrastructure?

2

Page 3: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Tour Guide

A. Context C. Detection

D. Command Validation F. Next Steps

B. Anomalies

E. Experimental Evaluation

3

Page 4: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

A. Context

4

Page 5: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

A Distributed CI

Switch

Controller

[PLC]

S A

Controller

[PLC]

S A

Controller

[PLC]

S A

Historian SCADA

Level 2

Level 0

Level 1

Management

Systems

Firewall

NIDS

Attack

point

5

Page 6: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

ICS-CERT Annual Vulnerability

Coordination Report 2016

6

Page 7: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Tools for Invasion

Ransomware

Malware

Virus

Most

potent

threat

Social

Engineering!

The Physical and

Virtual insider!

7

Page 8: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

A Recent Successful Attack: 2019 Norsk Hydro

8

Page 9: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Water Treatment Water Distribution

Electric power generation, transmission, distribution, AMI

Critical Infrastructure: Interconnection

9

Page 10: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

B. Anomalies

10

Page 11: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Process anomaly

Valid state sequence:

q−k q−k+1 q−k+2 . . . q−1 q0 q1 q2 . . .

qi : plant state at time t=i

Anomalous state sequence:

q−k q−k+1 q−k+2 . . . q−1 q’0 q’1 q’2 . . .

Anomalous sequence

Question:

How to detect anomaly as close to q’0 as possible?11

Page 12: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Anomalies: Cause and Avoidance

Communications failure

Component failure

Process data manipulated

Actuator command manipulated

Programming errors

Fault tolerant design

Thorough testing

Secure design

Firewalls

IDS

12

Page 13: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Anomaly: Birth and Travel

Switch

Controller

[PLC]

S A

Controller

[PLC]

S A

Controller

[PLC]

S A

Historian SCADA Management

Systems

Physical device affected; process disturbed

Intrusion not detected

Code upload

State manipulation

Malicious command

Malicious

command

Controller

compromised

Controller

deceived

13

Page 14: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

The Anomaly Impact Pyramid

None

Mild

Severe

Catastrophic

14

Page 15: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

C. Detection

15

Page 16: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Requirements

Ultra-high detection rate

rare for an anomaly to be not detected

Ultra-low rate of false alarm:

e.g., less than 1-false alarm in 6-months; data collected every second

Timely detection

Offers “enough” time for an operator to take corrective action

and avoid damage

16

Page 17: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Process

Dynamics

State

Entanglement

Design

Centric

Plant design

Data

Centric

Plant data

if (q(c)==vi)

q(S);

Adepu et al. 2016

Machine

Learning:

Model; Noise

Approaches for Detection

S0

S

[0, 600] 3, 0.06, #5

S1

[2461, 2640] 3, 0.51, #45 S3

[601, 2460] 3, 0.44, #39

[0, 2640] 3, 0.05, #4

S2

[0, 2640] 4, 0.95, #82

[0, 2640] 3, 0.07, #5

S5

[0, 2640] 4, 0.93, #66

S9

[0, 2640] 1, 0.12, #10

S4

[0, 2640] 2, 0.88, #72

S10

[0, 2640] 4, 1.0, #10 [0, 2640] 2, 0.07, #5

S7

[0, 2640] 1, 0.93, #67

S6

[0, 2640] 2, 1.0, #66

[0, 2640] 3, 1.0, #77 [0, 2640] 2, 0.03, #2S8

[0, 2640] 1, 0.97, #64

[0, 2640] 2, 0.08, #5

[0, 2640] 3, 0.92, #59

[0, 2640] 1, 1.0, #10

Qin et al. 2018

Mujeeb et al.2018

Yk=f(Yk-1. z1, z2, … zn ) Heng et al. 2019

x ̇ = f(x,u,η)

y = g(x, θ)

Fabio et al. 2013

17

Page 18: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

DAD: Monitor placement

Plant

controller

Plant

controller

Plant

controller

Plant

network

Monitor: A coded version of a set of rules that must hold

during normal operation.

SCADA

SWITCH

Historian

Tuned Monitors

Page 19: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Claim

Near perfect anomaly detection is achievable BUT… may

not be adequate to protect a plant from severe damage.

19

Page 20: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

D. Command Validation

20

Page 21: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Definitions

⍵(t, a): A well-formed command sent to actuator a at time t.

⍵(t, a): Valid iff f(a, ⍵, sk), where sk is plant state when the command is issued.

f(a, ⍵, sk): actuator function for ⍵(t, a) ;

ensures correct and safe operation of the plant

21

Page 22: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Sample Actuator Functions

22

Page 23: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Source of invalid (malicious) commands

Faulty component or network communications

Incorrect code

Cyber attack

Faulty network communications

23

Page 24: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Origin of a Malicious Command

Direct:

Attacker sends a malicious command to an actuator.

Indirect:

Attacker deceives a PLC through manipulation of state variables.

In turn the deceived PLC sends a malicious command.

24

Page 25: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

A Key Requirement for Validation

…a command validator must be able to obtain accurate estimate

of the system state and predict continuous state variables.

Given what we know about the origin of a command…

25

Page 26: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Challenge 1

How to ensure that a command validator can obtain accurate state estimate?

Page 27: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Challenge 2

Where should a command validator be installed?

Page 28: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Challenge 3

When a command is found to be malicious, should it be sent to the

target actuator?

Page 29: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Challenge 4

How to avoid the damaging impact of late detection?

Page 30: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Past work

Mashima et al., 2016

An active command mediation approach for securing remote control interface of

substations

Stone et al., 2012

Improved modeling and validation of command sequences using a checkable

sequence language

Maimone et al., 2018

RP-check: An architecture for spaceflight command sequence validation

Lin et al., 2016

Runtime semantic security analysis to detect and mitigate control-related attacks in

power grids

Design centric; partial state estimation

Real-time (not simulation)

Our approach

ALL commands are validated

30

Page 31: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

The Approach

Page 32: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Architecture for Command Validation

GIC

Level 3

Level 2

Level 1

Level 0

PLC

Sensors Actuators

SCADA,

HMI, Historian

Remote I/O

Wireless / Wired Networks

Splitter LICfrom other

stages

Orthogonal

Defense

validated

commands

LIC: Local Intelligent Checker

GIC: Global Intelligent Checker

Page 33: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

E. Experimental Evaluation

33

Page 34: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Critical Infrastructure: Water Treatment

34

Page 35: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Set-up

PLC1 PLC2

RIO1 RIO2

SCADA, HMI, EWS

L0

L1

Physical

Process

MSG

MSG

Physical

Process

1. Attacker

2. Attacker

CV

S A S A

Page 36: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Time to make decision

Case 1: No attack before t0

Case 2: Attack before t0, detected before t0

Case 3: Attack before t0,

a. detected between t0 and t1,

b. detected after t1, and

c. Not detected.

Page 37: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Attacks: Stage 1

Target Attack Detected first by

MV101 Open and Close (chatter

attack)

CV

LIT101 Spoof level to low DAD; then after 6-seconds

CV stopped the MV101 open

command

P101 Stop the pump CV

LIT101 Cut sensor wire in RIO DAD

Page 38: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Attacks: Stage 2

Target Attack Detected first by

AIT202 Decrease the pH value CV

MV201 Close CV

P205 (NaOCl) Stop the pump CV

P201, P202 Turn ON CV

Page 39: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Attacks: Stage 3

Target Attack Detected first by

P301 Stop outflow from UF CV

DPIT301 Activate backwash CV

LIT301 Spoof to HH DAD

Page 40: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Summary 1: Detection and anomalies

CV detected 8 out of 11 attacks.

Remaining three attacks:

• on analog values,

• detected by DAD, i.e., caused anomalies, but

• did not lead to the desired impact.

Page 41: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Summary 2: Timing

No attack detected before t0.

Stage 1: Two out of four attacks detected before t1

Stage 2: All four attacks detected before t1

Stage 3: Two out of three detected before t1

Attacks detected between t0 and t1:

Page 42: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Conclusions

In the experiments conducted, CV worked well in

concert with the anomaly detector.

Anomalies arising out of continuous state variables are detected by

DAD. These may lead to malicious commands (indirect). .

Direct malicious attacks possible only when intelligent checkers are

compromised.

Page 43: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

F. Next Steps

43

Page 44: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Full Implementation and Evaluation

Implement CV across the entire plant.

Design and launch single and multi-point masking

attacks.

44

Page 45: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

CV Inside PLCs?

Should CV, with state prediction, be placed inside PLCs?

45

Page 46: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Design of Command Validator for Power Grid

Will the approach work on a power grid?

Timing is critical

46

Page 47: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

100% anomaly avoidance?

Is that a realizable dream?

47

Page 48: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Thanks…

PhD Students

…to all those who are making it happen!

Gayathri Sugumar

Mujeeb Chuadhary

Sridhar Adepu

Research Staff

Collaborators

Lin Qin, PhD Student

Professor Sicco Verwer

48

Siddhant Shrivastava

Jonathan Heng

Venkat Reddy

Vishrut Mishra

Andrew Yoong

Gauthama Iyer

Nandha Kandasamy

Robert Kooij

Page 49: Challenges in Avoiding Process Anomalies in Critical ... · ICS-CERT Annual Vulnerability Coordination Report 2016 6. Tools for Invasion Ransomware Malware Virus Most potent threat

Je vous remercie

Thank You!


Recommended