Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

A Trust System Architecture for

SCADA Network Security

IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 1,


JANUARY 2010
Gregory M. Coates, Kenneth M. Hopkinson, Member, IEEE, Scott R.
Graham, Member, IEEE, and Stuart H. Kurkowski, Member, IEEE
ABSTRACT

 This paper discusses the use of a communications network


security device, called a trust system, to Enhance
supervisory control and data-acquisition (SCADA) security.
The major goal of the trust system is to increase security
with minimal impact on existing utility communication
systems.
 This paper concentrates on placing the trust system into a
broader context, creates new trust system implementations
to increase its flexibility, and demonstrates the trust system
using TCP traffic.
INTRODUCTION
 A trust system can perform at or near the real-time requirements that
the supervisory control and data acquisition (SCADA) network
requires even with the overhead of TCP/IP and UDP/IP
communications, Internet Protocol Security (IPSec) encryption,
firewall rules, format check, and access control functions.

 The goal is to both enhance security in traditional systems and to


facilitate information sharing between regional utilities

 A final consideration is whether a gradual upgrade path exists for a


SCADA Network. A secure system that requires that all existing devices
be replaced is unlikely to be implemented in existing utilities.
LITERATURE REVIEW
 SCADA systems are found throughout the public utility
industry and are integral to operation of critical
infrastructure including oil and gas pipelines, electric
power generation facilities and transmission grids, and air
traffic control towers.
 Threat to Utility Operations
 Changes in the SCADA Environment
 Current State of SCADA System Protection
TRUST SYSTEM

What the Trust System Is?

What the Trust System Does?


TRUST SYSTEM IMPLEMENTATION
 The trust system can be implemented in a variety of ways

1. Passive Mode Implementation


2. Half-Active Mode Implementation
3. Active Mode Implementation
4. Tunnel(Gateway) Mode
Real-World Applications of the Trust System
 Utility Intranet can make possible unprecedented situational
awareness between utility companies, control and engineering centers,
and neighboring utility control areas.

 The trust system, when placed at strategic locations such as


connections between adjacent utility companies, outgoing connections
from utility companies to area control

 Figure illustrates the fact that the trust system can be arranged in both
master-slaves, which would be typical within utilities, as well as in
peer-to-peer arrangements, which would be likely in communication
systems connecting utilities together.
SPECIFIC CHALLENGES
Per-User Authentication and Access Control
 SCADA Security Issues
 Recommendations From Literature
 Objections and Questions From Utilities
 Trust System Solutions
Prevention of Data Interception or
Alteration
 SCADA Security Issues

 Recommendations From Literature

 Objections and Questions From Utilities

 Trust System Solutions


Cyber security Priorities
 SCADA Security Issues

 Recommendations From Literature

 Objections and Questions From Utilities

 Trust System Solutions


Depiction of the Successful Root Logon by a Legitimate User
CONCLUSION
 SCADA networks are vulnerable to attack, whether from a digital

source or a natural disaster.


 The trust system is flexible and can be implemented in whatever way

best fits SCADA networks’ needs


 The trust system enforces access restrictions between IP addresses

that should not be allowed to communicate with one another via


specific message types and interfaces.
 The trust system, implemented in active mode, intercepts all

malicious messages.
REFERENCES
 M. Grimes, “SCADA exposed,” presented at the ToorCon 7, San Diego, A, 2005.

 R. Graham and D. Maynor, “SCADA security and terrorism: We’re not crying wolf,”

presented at the Black Hat Federal, Washington, DC, 2006.


 G. M. Coates, K. M. Hopkinson, S. R. Graham, and S. H. Kurkowski “Collaborative,

trust-based security mechanisms for a regional utility intranet,” IEEE Trans. Power
Syst., vol. 23, no. 3, pp. 831–844, Aug. 2008.
 K. P. Birman, J. Chen, K. M. Hopkinson, R. J. Thomas, J. S. Thorp, R. Van Renesse,

and W. Vogels, “Overcoming communications challenges in software for monitoring


and controlling power systems,” Proc. IEEE, vol. 93, no. 5, pp. 1028–1041, May 2005.
 D. Bailey and E. Wright, Practical SCADA for Industry. Oxford, U.K.: Newnes, 2003.
THANK YOU
QUIERIES???????

You might also like