Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/281964312

Security Solution to Protect SCADA Systems from Cyber Attacks

Conference Paper · January 2013

CITATIONS READS
0 455

5 authors, including:

Peeyush Jain Paritosh Tripathi


Centre for Development of Advanced Computing PricewaterhouseCoopers
10 PUBLICATIONS   26 CITATIONS    7 PUBLICATIONS   7 CITATIONS   

SEE PROFILE SEE PROFILE

K vinod Kumar Ashwin Nivangune


Centre for Development of Advanced Computing Centre for Development of Advanced Computing
3 PUBLICATIONS   12 CITATIONS    9 PUBLICATIONS   19 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Development of Distributed Honeynet System for Broadband Network View project

SCADA Security View project

All content following this page was uploaded by Peeyush Jain on 21 September 2015.

The user has requested enhancement of the downloaded file.


Proc. Int. Conf. on Communication Engineering and Network Technologies, CENT

Security Solution to Protect SCADA Systems from


Cyber Attacks

Peeyush Jain1, Paritosh Tripathi1, Vinod Kumar1 Ashwin Nivangune1 Zia Saquib1
1
Centre for Development of Advanced Computing,
Gulmohar Cross Road No. 9,
Juhu Mumbai, India
{peeyushj, paritosh, vinod, ashwin, saquib}@cdac.in

Abstract. Supervisory Control and Data Acquisition (SCADA) systems,


control and monitor utility infrastructure, such as electricity, gas, water etc,
which happen to be part of critical infrastructure. Existing SCADA systems
were originally designed for reliability. Initial SCADA systems used
proprietary protocols like Modbus, DNP3 to access sensed data and initiate
supervisory control. These SCADA systems were not designed with Internet
security in mind, which provides challenges as these systems are migrated
toward common Internet communication protocols and networks. Compared to
IT systems, SCADA systems have a higher requirement concerning reliability,
latency and uptime, so it is not always feasible to apply IT security measures
deployed in IT systems. This paper provides an overview of security issues in
SCADA networks. A range of threats to SCADA network security is offered.
Next, attention is focused on security assessment of the SCADA. This is
followed by an overview of relevant SCADA security solutions. Finally our
security solution approach which is embedded in “bump-in-the-wire” is
discussed.
Keywords: SCADA, SCADA security, Cyber-attacks, Threats, Vulnerabilities,
Model Based IDS, Cryptography, Security Solution, Key Distribution.

1 Introduction

Critical infrastructure is basically cyber-physical systems (CPS) with embedded


computing systems and communication capabilities at one side and the physical
system at the other. SCADA is a communication technology scheme for collecting
data from distant facilities and also controlling them. SCADA system allows an
operator to make set point changes on distant process controllers, to monitor alarms
and to gather measurement information from a remote location. SCADA systems are
composed of three components, Remote Terminal Units (RTU) to collect data from
remote sensors and devices, Master station with Human Machine Interface (HMI) for
monitoring & controlling and Communication Infrastructure for connecting the
various components. The SCADA systems are built using public or proprietary
communication protocols which are used for communications between an MTU and
one or more RTUs. The SCADA protocols provide transmission specifications to
interconnect substation computers, RTUs, IEDs, and the master station. The most

© Elsevier, 2012

418
common protocols [10] used are: IEC (International Electrotechnical Commission)
60870-5-101[4], 60870-5-104 and DNP3 [7]. DNP3 is based on the early work of the
International Electronical Commission (IEC) that resulted in the IEC 60870-5
protocol for SCADA. DNP3 and IEC 60870-5 are both part of the IEEE Standard
1815 and 1379-2000 [11]. Recently the International Electrotechnical Commission
(IEC) has come up with a new protocol, IEC 61850, which can provide more
enhanced functionalities [12].
The use of DNP3 is not limited to serial wire connections within a substation or
from a substation to a SCADA master using a modem and phone lines. DNP3’s
functionality contributes to the protocol’s widespread use in substation local area
networks using TCP/IP Ethernet, on corporate frame relay networks, fiber optic
systems, standard or CDPD cellular systems as well as many licensed or unlicensed
radio systems. Link layer frames are embedded into TCP/IP packets for transmission.
This approach enabled DNP3 to take advantage of Internet technology and permitted
collecting data economically and controlling widely separated devices. But this also
exposes vulnerabilities such systems [30]. The benefits of using the Internet
technology to carry SCADA communications come at the cost of compromised
security since the data over the Internet can be an easy target for an attack [8][26]-
[29]. To make the situation more challenging, DNP3 [7], as most other SCADA
protocols, has no built-in security feature such as message authentication, which
assures that a party to some computerized transaction is not an impostor. Various
threats that DNP3 faces include eavesdropping, man-in-the-middle attack (in which a
malicious hacker not only listens to the messages between two unsuspecting parties
but can also modify, delete, and replay the messages), spoof and replay (an attack that
attempts to trick the system by retransmitting a legitimate message), unauthorized
access either by human (intentionally or accidentally) or by specialized software.
The other possibilities of attacks are due to the fact that function codes and
message flags in different SCADA protocols can be manipulated [12]. This causes
violation of integrity, confidentiality and improper commands for RTUs, etc.
Anybody can control a SCADA device with injection of malicious packets into the
network. Denial of Service (DoS) attacks, deleting system files, planting a trojan to
control the system, modifying any logged data in remote database system and IP
Spoofing are other possible threats to SCADA systems [5]. These threats may lead to
shutting down operations, data loss, gaining complete control and defaming etc. The
security models developed for IT systems may not suit the security requirements of
SCADA systems. SCADA systems have many characteristics that differ from IT
systems, including different risks and priorities. Some of these include performance,
availability, time-critical responses, resource constraints, communication, system
operation, access to components. For SCADA systems, availability is top most
priority followed by confidentiality and integrity. For IT systems, confidentiality is
top most priority followed by integrity and availability. The key technical challenges
revolve around the limitations of what can be installed and configured on the SCADA
systems and the technical limitations of other components within the SCADA
environment [1]. These constraints should be a basic consideration for applying a
security mechanism.
1. Limited computational capacity: The RTUs have very low computational power.
2. Limited Space Capacity: Memory of RTUs is usually quite low.

419
3. Low bandwidth: The data transmission rate for SCADA systems is low.
4. Real-time processing: Transmission and processing of data in SCADA systems
should be timely. Otherwise it may cause latency problems.

2 Related Work

Chee-Wooi et al. [15] and Ignor et al. [9] provides an overview of security solutions
for SCADA, further [15] provides some vulnerability assessment method and security
framework for SCADA. We here present related work delving into cryptographic
primitives and intrusion detection. Sandia National Laboratories proposed a
cryptographic key management approach for SCADA (SKE) [3] in 2002. This
scheme uses CA for handling key management and distribution in an automatic
fashion. All keys used are of 128 bit in length. RTU-RTU communication is not
possible in this mechanism. It does not support broadcast and multicast
communication. Information Security Institute [2] proposed architecture for SCADA
systems (SKMA), where a new entity 'Key Distribution Center (KDC)' came into
picture, which is used to maintain long term keys for every node. KDC also contains
information regarding the system structure, and allows or denies the key
establishment requests; while doing this role; it supports the distribution of keys.
Donghyun Choi[6] also proposed his approach which supports multicast and
broadcast with an additional computation at run time at MTU side. The approach
provides multicasting in a limited fashion. For distribution of key, the approach uses a
Key Distribution Centre (KDC), which constructs logical key structure and uses Iolus
framework. Simple Public Key Infrastructure (SPKI) was developed starting in 1995.
Simple Distributed Security Infrastructure (SDSI) is a new design for a public key
infrastructure, designed by members of LCS's Cryptography and Information Security
research group [5].
The Wireless Sensor Networks (WSN) have intelligent distributed control
capabilities, and the capability to work under severe conditions, so some of the
schemes of this area may be useful for securing SCADA systems, as µPKI. It uses
public key encryption only for some specific tasks as session key setup between the
base station and sensors giving the network an acceptable threshold of confidentiality
and authentication. µPKI only implements a subset of a PKI services .A number of
key establishment protocols based on pre-distribution are explored[2][3][6][13], but
they do not scale effectively to large networks. For a given level of security each
protocol incurs a linearly increasing overhead in either communication cost per node
or memory per node or both. These symmetric key based schemes are
computationally efficient; the trade-off has to be paid for complicated key pre-
distribution and key management. In particular, the public key cryptography,
symmetric key encryption and the addition of SKE-based key management will likely
make strong security a more realistic expectation in the future. We also expect that the
hardware of SCADA will be improved so that it can be suitable for the application of
cryptography.
Intrusion detection is defined as the process of monitoring the events occurring in a

420
computer system or network and analyzing them for signs of possible incidents,
which are violations or imminent threats of violation of computer security policies,
acceptable use policies or standard security practices [35]. Two major approaches of
intrusion detection are signature based and anomaly based. The signature detection
matches traffic to a known misuse pattern while the anomaly detection works on the
abnormalities in the observed data. There are other methods which fall between the
two approaches like probabilistic based and specification based [33]. One embeds
probabilistic modelling while the other allowable system traffic patterns. Misuse
based detection methods have reached a saturation point, most of the current research
has been in writing signatures or enhancements of signature matching using state
machines (regex). Generating good signatures requires extensive study and in-depth
vulnerability assessment of the system which is a tedious task in itself. We have come
across [14] which provide signatures for SCADA specific IDS though. Lot of research
has been going on in anomaly based detections [15]-[17]. Zhu and Sastry [33] give a
very detailed outlook of IDS for SCADA.
Recently it has been observed that two types of approaches state based intrusion
detection and its enhancements [18]-[21] and model based security[22][23] is what
the research community is majorly focusing on. Both the approaches require the real
system to be represented and updated as per changes that take place in the real
network. In state based approach, the representation is in form of tag, value pairs for
each PLC/RTU which these units are sensing. The idea is to define critical state on
predicates of these tag value pairs. One of most important advantage that has been
suggested is to identify critical state even if licit commands are sent but their
combined effect is catastrophic. In the model based approach the real system is
represented as cyber-physical system. To depict such a system, researchers use
available simulator for the physical part and protocol adaptors for the cyber part. This
CPS can then be used to observe effect of commands on real network by first
executing them on the simulated environment and if found threatening, generating
alerts. Most of work that has been explored does not provide clarity on how bad data
injection [24] would be tackled. As obvious signature based approaches are too
dependent on regular update of signatures and anomaly based on training data for
intrusion detection. In case of model based approach defining accurate models and
false alarms may become challenging.

3 Security Solution

To meet the challenges discussed, we propose an integrated security framework for


power systems. The proposed solution is a “bump in the wire”, which consists of key
distribution, encryption-decryption, and model based intrusion detection. This
solution caters to data security at communication channel and an independent method
of verification of the responses from power system for intrusion detection. The
proposed security solution architecture is shown in the Figure1 and implementation of
our “bump-in-the-wire” solution in SCADA system is shown in Figure 2.

421
Fig. 1. Overall Security Architecture
As shown in Figure 2, the key will be distributed at the time of installation of “bump-
in-the-wire” between the MTU and RTU at both sides, then it will be automatically
revoked periodically using our key distribution protocol (Sec-KeyD). To explain the
data flow through our security solution we consider data flow from MTU to RTU.
When MTU has to send some commands it will pass through “bump-in-the-wire” at
MTU side. “Bump-in-the-wire” contains a protocol hardening solution i.e. Flexi-
DNPSec [32], which converts DNP3 packets into new format, called as Flexi-
DNPSec packets. This conversion helps to integrate our key management solution
with it because DNP3 doesn’t provide such facility. Now Flexi-DNPSec protocol
have the key management features i.e. key generation, key distribution, storage,
automatic key revocation and encryption/decryption using our key distribution and
key management scheme.
When data passes through “bump-in-the-wire” device, encryption of the coming
data will take place using the same key that has been exchanged initially. Then
encrypted data will traverse the network and will be captured at the RTU side and
decrypted using the same key. Decrypted data will re-converted into DNP3 packets. A
copy of it will be passed to the Model based IDS. Model based IDS is used to detect
divergence of real power system from that of the correct and uncompromised model.
For Encryption-Decryption we are using Blowfish. The detail working of components
of our security solution will be discussed in subsequent sections.

422
Fig. 2. Implementation of Security Solution

3.1 Security Solution Components

3.1.1 Model based security


It is important to analyze the security risks and develop appropriate security solutions
to protect SCADA systems. However, a key problem is the lack of proper modelling
tools to evaluate the security. As widely accepted in academic and industrial
communities, it is impractical to conduct security experiments on live systems. A
modelling simulation tool would enable the simulation of SCADA systems with the
benefit of testing different attacks and security solutions. However, these tools are
either proprietary, used by researchers within the organization, and the software is not
released for external use or is not generic enough to support different architectures,
protocols, and systems, exception being a recent work SCADASim [31]. There are
test case archives available for power systems from University of Washington [34],
Queen Mary University of London [35] and others but these are of little use to people
working in the cyber world without a proper tool, which can interpret these values of
physical / electrical into cyber world in terms of protocol packets.
SCADA systems can be misled by faked RTU. It does not have a reliable or
independent method of verifying the responses from the Power System. The Viking
project [23] and [22] are some of the recent works that tries out model based security.
However it is doubtful whether the technology has been deployed in the ground. The
full details of the evaluation are also not available. Except for Viking, there are no
systems that we are aware of that will secure the SCADA system by a model based
approach. To this need we propose SCADA based power system utilities; being a
CPS can be simulated with existing tools. Our approach to simulation of a CPS is
based on the use of existing simulation tools for the cyber and physical networks,

423
Fig. 3. Model Based Security Architecture

respectively. This choice is due to the powerful capabilities of specialized tools in


representing their domain (cyber or physical), which allows the focus of our work to
shift to accurate representation of the interactions between the cyber and physical
networks. An electric grid has independent and dependent variables. So, for example
load happens to be independent variable whose value keeps on changing in an electric
grid while variable like power generation is dependent, as it’s value depends on load
and is calculated every time load changes in the grid.
The power system will be modeled using a tool like PSAT [25]. Initially, the PSAT
model of the power system will be used for generating DNP3 data. Hence, probes into
the PSAT model will have to be interfaced to DNP3 packet generators. Incoming
commands to the power system from the SCADA will have to be applied to the
simulated model in PSAT. Thus a versatile testbed for the development of security
solutions for SCADA is available. Secondly, the model can be used to compare with
the real system. This can be used to detect divergence of real power system from that
of the correct and uncompromised model. The divergence could give valuable leads to
possible security breaches and suggestions for counter measures. We explore the
same idea that Viking [14] did. The main advance this will bring is on clean, minimal
and effective methods to separate domain specific information into models, and then
combining them through their interfaces to the secure SCADA system. Commands
from MTU can go through a what-if analysis and can give hints on the effects it can
have on the SCADA network under purview.

3.1.2 Key Management


One critical security requirement is that communication channels need to be secured.
After considering security issues of confidentiality, authentication and integrity of
data we can not ignore the role of key management. Strength of encryption and
decryption is dependent on encryption algorithm and key which is used for encryption
and decryption. Secure keys need to be established before cryptographic techniques
can be used to secure communications. Managing keys at one node solves problem of

424
storage only but distribution of keys is another major issue. The main challenges in
key distribution are authentication of receiver and maintaining the secure path for key
transmission. Schemes like SKE approach are available for key distribution, there is a
need of involving third party like CA but security might be compromise from third
party.Manual storing of keys at each node is also a big issue. For automatic storing of
keys at each node we can use Diffie-Hellman key exchange method, but for this, one
time extra computation cost at both side and extra storage is needed. In Diffie-
Hellman key exchange, there is always a chance of man in middle attack. By using
challenge response, protocol authenticity of recipient might be confirmed for
distribution of key but key can be obtained by attacker by replay attack.
Considering limited memory capacity and processing power, it is necessary to store
minimum number of keys and efficient algorithm without compromising with
required constraint. The efficiency of memory also ought to be considered because
thousands of keys and data needs to be manage and maintain in a limited memory
space. Many efforts have been done in recent years to secure the SCADA
communication including the key management issues. We propose an efficient key
distribution scheme (Sec-KeyD) [37], which overcome shortcomings present in the
current approaches and fulfills the SCADA constraints, availability, time-critical
responses, and access to components efficiently with following advances:
1. Ensures the Authenticity of both end nodes (Server as well as Client)
2. Enhances the confidentiality
3. Eliminates the issue of trustiness of third party, as no third party is involved.
4. Eliminates replay attack
5. Eliminates the man-in-middle attack
6. No False Server Attack
7. Automatic Revocation of symmetric key
8. Ensures the freshness of message
9. No transfer of session key on open channel nor installed manually

3.1.3 SCADA Protocol Hardening


We choose DNPSec as a communication protocol and have done some changes in the
header of the protocol to make it useable as per our requirements and to integrate our
key management scheme. Size of the DNPSec Packet was fixed at 292 irrespective of
the size of the DNP packet. The payload, if lesser than that, is padded with dummy
data so that payload size can be of 256 bytes. And with DNPSec header and the
authentication data, it comes to 292. DNPSec packet is identified from DNP3 and
other packets on network by finding sync bytes 0x0564 at byte position 8-9 of the
DNPSec packet. Consequently only payload data (256 bytes) is encrypted instead of
encrypting payload and original LH header. This scheme provides the same
confidentiality level as the original DNPSec scheme. The original DNPSec protocol
has Key Sequence Number. When KSN reaches maximum and is re-cycled to 0, the
MTU sets SK bit and send the new session key. Instead of this arrangement, we
reserve the SK bits and instead use our key distribution protocol to negotiate the key
and freshness number between BITWs of MTU and RTU. And, this negotiation of
keys can be done after a configurable number of data exchanges[32].

425
4 Conclusion

As SCADA is opening up to standards it has become vulnerable to cyber-attacks. Due


to the possibility of cyber attacks and its impact on critical infrastructure it is
necessary to develop a protection system mitigating such type of severe threats. Lot of
work has been done by different research communities but we feel that still there are
shortcomings which need to be overcome. We proposed a security framework for
SCADA that covers an efficient key management and distribution for SCADA,
encryption-decryption and model based intrusion detection to fill the gap. We are
trying to generate traffic for power system to evaluate our work.

References

1. NCS Technical Information Bulletin 04-1, SCADA Systems, Oct2004


2. R. Dawson, C. Boyd, E. Dawson, and J.M.G. Nieto, “SKMA - A Key Management
Architecture for SCADA Systems,” Proceedings of the Grid computing, 2006.
3. C. L. Beaver, D.R. Gallup, W. D. NeuMann, and M.D. Torgerson “Key Management for
SCADA (SKE)”, printed at Sandia Lab March 2002.
4. DNP3 (Distributed Network Protocol version 3.0), and Modbus [ NCS Technical
Information Bulletin 04-1, SCADA Systems, Oct2004
5. S. East, J. Butts, M. Papa and S. Shenoi, “A taxonomy of attacks on the DNP3 protocol”,
IFIP Advances in Information and Communication Technology, 2009, pp 67-81
6. Sungjin Lee, Donghyun Choi, Choonsik Park, and Seungjoo Kim” An Efficient Key
Management Scheme for Secure SCADA Communication”, Proceedings Of World
Academy Of Science, Engineering And Technology Volume 35 November 2008
7. DNP User Group, http://www.dnp.org.
8. Bonnie Zhu, Anthony Joseph, Shankar Sastry A Taxonomy of Cyber Attacks on SCADA
System Proceedings of CPSCom 2011: The 4th IEEE International Conference on Cyber,
Physical and Social Computing, Dalian, China, October 19-22, 2011.
9. Igor Nai Fovino, Alessio Coletta, Marcelo Masera “Taxonomy of Security Solutions for the
SCADA Sector.” Version 1.1, March 2010
10. Makhija, J. and Subramanyan, L.R., “Comparison of protocols used in remote monitoring:
DNP 3.0, IEC 870-5-101 & Modbus”, November 2003
11. F. Cleveland, “IEC TC57 Security Standards for the Power System’s Info Infrastructure:
Beyond Simple Encryption,” IEC TC57 WG15 Security Standards ver5, October 2005.
12. IT Security Advisory Group, SCADA security: Advice for CEOs, Department of
Communications, Information Technology and the Arts, Canberra, Australia, 2005
13. AAmir Shahzad, Shahrulniza Musa, “Securing SCADA Communication Using Hybrid
Cryptography” ICUIMC, Proceedings of the 6th International Conference, 2012
14. Digital Bond, www.digitalbond.com
15. Chee-Wooi Ten; Manimaran, G.; Chen-Ching Liu “Cybersecurity for Critical
Infrastructures: Attack and Defence Modelling” IEEE Transactions on Systems, Man and
Cybernetics, Part A: Systems and Humans, 2010 Volume: 40 Issue: 4
16. Jared Verba and Michael Milvich “Idaho National Laboratory Supervisory Control and
Data Acquisition Intrusion Detection System (SCADA IDS)” IEEE Conference on
Technologies for Homeland Security, 2008
17. Dayu Yang, Alexander Usynin, and J. Wesley Hines “Anomaly-Based Intrusion Detection
for SCADA Systems”, 5th International Topical Meeting on Nuclear Plant Instrumentation,
Controls, and Human Machine Interface Technology, 2006

426
18. Igor Nai Fovino, Alessio Coletta, Andrea Carcano, and Marcelo Masera and A.
Trombetta“Modbus/DNP3 State-based Intrusion Detection System” 24th IEEE
International Conference on Advanced Information Networking and Applications 2010
19. A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Nai Fovino, and A. Trombetta “A
Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems”
IEEE Transactions on industrial informatics, VOL. 7, NO. 2, MAY 2011
20. Igor Nai Fovino, Alessio Coletta, Andrea Carcano, and Marcelo Masera “Critical State-
Based Filtering System for Securing SCADA Network Protocols” IEEE Transactions on
industrial electronics Vol. 59, No. 10, October 2012
21. S. Cheung, B.Dutertre, M. Fong, U Lindqvist, K.Skinner, A Valdes “Using Model based
Intrusion Detection for SCADA Networks” SCADA Security Scientific Symposium, 2007
22. Chen-Ching Liu, Alexandru Stefanov, Junho Hong, and Patrick Panciatici “Intruders in the
Grid” IEEE Power and Energy magazine, 2012
23. The Viking Project, www.vikingproject.eu
24. Yao Liu and Peng Ning and Michael K. Reiter “False Data Injection Attacks against State
Estimation in Electric Power Grids”, ACM Transactions on Information and System
Security (TISSEC), Volume 14 Issue 1, May 2011
25. The Power System Analysis Toolbox, Federico Milano
http://www.uclm.edu/area/gsee/Web/Federico/psat.htm
26. J. Ballman, "The Great Blackout of 2003 Aug. 14 Power Outage Largest in U.S. History,"
Disaster Recovery Journal, vol. 16, 2003.
27. J. Meserve, "Sources: Staged cyber attack reveals vulnerability in power grid", Washington,
D.C.: CNN, 2007.
28. A. Greenberg, "Hackers Cut Cities' Power," Forbes.com, 2008
29.The Aurora Power Grid Vulnerability, Frank Saxton,
http://unix.nocdesigns.com/aurora_white_paper.htm
30. Jason Stamp, John Dillinger, William Young, Jennifer Depoy, “Common Vulnerabilities in
Critical Infrastructure Control Systems”, Sandia National Laboratories, May 2003.
31.Carlos Queiroz, Abdun Mahmood, and Zahir Tari “SCADASim—A Framework for
Building SCADA Simulations”, IEEE Transactions on Smart Grid, Volume 2, No 4, 2011
32. S. Bagaria, S.B. Prabhakar and Zia Saquib, "Flexi-DNP3:Flexible Distributed Network
Protocol Version 3 (DNP3) for SCADA Security", ReTIS, Kolkatta, December 21-23, 2011
33 Bonnie Zhu & Sankar Sastry “SCADA-specific Intrusion Detection/Prevention Systems: A
Survey and Taxonomy”, Secure Control Systems (SCS), 2010
34.Universityof Washington,Electrical Engineering, www.ee.washington.edu/research/pstca
35.Queen Mary University of London,
elec.qmul.ac.uk/resources/electricitydata/pages/electricitydata.html
36. A. Patel, Q. Qassim, and C. Wills, “A survey of intrusion detection and prevention
systems,” Information Management & Computer Security, vol.18, no. 4, pp. 277, 2010.
37. Intellectual Property India, Application No. 2429/MUM/2010
http://164.100.176.38/patentsearch/search/index.aspx

427

View publication stats

You might also like