SlideShare a Scribd company logo
1 of 26
North American collaborations via
INSPIRE/MASSIF

Luigi Romano
CINI (Consorzio Interuniversitario Nazionale per
l’Informatica)
luigi.romano@uniparthenope.it
     Internet of Services 2011: Collaboration meeting for FP7 projects
                    International Collaboration session
                        Brussels September 29, 2011
Roadmap

 Evidence that Critical Infrastructures (CIs) are vulnerable
 to cyber-attacks
    Focus on Power Grids, but true in general
 How we combined detection, diagnosis, and remediation
 for protecting CIs from cyber-attacks
    The INSPIRE project
 Our experience with International cooperation initiatives
    The INSPIRE INCO project
 Collaboration objectives
    The MASSIF project
 Contact Info
Evidence
that Critical Infrastructures
are vulnerable to cyber-attacks
Basic Concepts

 Power Grid (tentative definition): an interconnected
 network for delivering electricity from suppliers to
 consumers, which is synchronous with a given phase
 Phasor: complex number that represents both the
 magnitude and the phase angle of the sine waves found
 in electricity
 Synchro-Phasors: phasor measurements that occur at
 the same time
 Phasor Measurement Unit (PMU): device which
 collects Synchro-Phasors to determine the health of the
 power grid (using a GPS radio clock)
Results in a nutshell

                               1
                                               Administrator

                2                                              4
                                        LAN




Power       Synchro Phasor                            Phasor
 Grid           device     3                     Data Concentrator

 1) Password Eavesdropping
 2) Weak Policies on Password selection/maintenance, device
    fingerprinting possible (and relatively easy)
 3) Unreliable channels (wrt both integrity and availability)
 4) Poor input validation
Security Analysis of a commercial Synchro-
Phasor - Passwords

 Password Management
   Multilevel Security:
   0, 1, B, P, A, O, 2, C
   After a pre-defined time, security level is downgraded to 0
   (def. 5 min)
 Security evaluation results
   Default passwords are simple and can be found in most
   common dictionaries
   No constraints for password selection
       All levels can share the same password
        No aging mechanism
   All passwords can be manually reset
Security Analysis of a commercial Synchro-
Phasor - Communication

 Communications are in clear: ftp, telnet, IEEE C37.118,
 proprietary protocols
    Passwords can be easily intercepted
    Data can be easily intercepted
    Data can be altered
                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   2b   40   00   80 06 62 50 c0 a8 01 01 c0 a8   .).+@...bP......
                                 0020   01   02   04   76   00   17   a8 64 9c b4 11 74 59 af 50 18   ...v...d...tY.P.
                                 0030   00   fe   22   b0   00   00   54                              .."...T

                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   2e   40   00   80 06 62 4d c0 a8 01 01 c0 a8   .)..@...bM......
                                 0020   01   02   04   76   00   17   a8 64 9c b5 11 74 59 b0 50 18   ...v...d...tY.P.
                                 0030   00   fe   35   ae   00   00   41                              ..5...A

                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   2f   40   00   80 06 62 4c c0 a8 01 01 c0 a8   .)./@...bL......
                                 0020   01   02   04   76   00   17   a8 64 9c b6 11 74 59 b1 50 18   ...v...d...tY.P.
                                 0030   00   fe   2d   ac   00   00   49                              ..-...I

                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   31   40   00   80 06 62 4a c0 a8 01 01 c0 a8   .).1@...bJ......
                                 0020   01   02   04   76   00   17   a8 64 9c b7 11 74 59 b2 50 18   ...v...d...tY.P.
                                 0030   00   fe   2a   aa   00   00   4c                              ..*...L
SQL Injection attack
 to an Open Source PDC
protected override void ProcessMeasurements(IMeasurement[] measurement {
               foreach (IMeasurement measurement in measurements)
               {
                   // Create the command string to insert the measurement as a
   record in the table.
                   StringBuilder commandString = new
            StringBuilder ("INSERT INTO Measurement VALUES ('");
                   commandString.Append (measurement.SignalID);
                   commandString.Append ("','");
                   commandString.Append ((long)measurement.Timestamp);
                   commandString.Append ("',");
                   commandString.Append (measurement.AdjustedValue);
                   commandString.Append (')');

                  MySqlCommand command = new MySqlCommand
   (commandString.ToString(),
   m_connection);
                  command.ExecuteNonQuery();
              }
              m_measurementCount += measurements.Length;
          }
If you don’t trust me ... then trust them
How we combined detection,
diagnosis, and remediation for
protecting CIs from cyber-
attacks
Typical architecture of a
SCADA system
A bird’s eye view of INSPIRE
 Peer-to-peer
  overlays



                                   P2P
                          MPLS
                                         Wireless Sensor
                                            Networks




                Offline Security
                  Framework
INSPIRE main results

 Analyzed vulnerabilities which affect SCADA systems
 Analyzed dependencies between CIs and the underlying
 communication networks
 Designed a self-reconfigurable architecture, suited for
 SCADA systems
 Developed diagnosis and recovery techniques, suited for
 SCADA systems
 Provided SCADA traffic with Quality of Service (QoS)
 guarantees
Our experience with
International cooperation
initiatives
INSPIRE-INCO in a nutshell

 Proposal: 248737
 Acronym: INSPIRE-International (Cooperation)
 Program: FP7
 Call: FP7-ICT-2009-4
 Funding scheme: Small or medium-scale focused
 research project -STREP - CP-FP-INFSO
 Duration: 12 months (October 1, 2009 - September 30,
 2010)
 Activity: ICT-4-9.2 - Supplements to support International
 Cooperation between ongoing projects
The Consortium

 Europe (INSPIRE):
   CINI, Consorzio Interuniversitario Nazionale per l’Informatica -
   Coordinator (Italy)
   TUD, Technical University of Darmstadt (Germany)
   ITTI, ITTI Sp.zo.o. (Poland)


 http://www.inspire-strep.eu/

  US (GridStat):
    WSU, Washington State University (USA)

 http://www.gridstat.net/
The Funding Scheme

                        Funding for International             Funding for Research:
Funding for Research:
                             Cooperation:                       EC Grant 225553
 NSF Grant 0326006
                        Extension to NSF Grant
                               0326006
                                              Funding for
                                               Mobility:
                                            EC Grant 248737
Mutual Benefits – Sharing Data




  INSPIRE Experimental Testbed
Mutual Benefits – Sharing
Experiences
Mutual Benefits – Sharing Ideas
The MASSIF project
 Multi-domain
parallel-running                                                                                                 Alert and reaction
  processes          Highly-scalable, dependable and                     Predictive security analysis               generation
                        multi-level event collection
                                                                                                                                            Actions and
                                                                                                                                             Counter-
                                                                                                                                             measures




Olympic Games                                                                                               Trustworthy event collection

                                                                     Multi-level security event modeling

                                  Languages
                                                                                                                                              Security
                                                                                                                                            analysis and
                       EVENTS           POLICIES                                                                                             notification
 Mobile money
transfer service                RELATIONS          REACTIONS




                                Multi-level event
                                                                             Process and attack
                                  correlation
                                                                                 simulation
                                                                                                                Resilient framework
  CI Process                                                                                                       architecture
 Control (Dam)                                                                                                                             Security-aware
                                                                                                                                             processes




    Managed
Enterprise Service           Event and                                Event, Process Models and
 Infrastructures       Information Collection                               Attack Models

                                                               Resilient event processing and integration
  Scenarios
  Prototypes                                             Advanced SIEM Framework
Collaboration Status

 Luigi Romano and Salvatore D'Antonio, participated
 in the "Trustworthy Networks and Services" session
 on March 24th with two talks, titled "Detection,
 Diagnosis, and Remediation: Three Pillars for
 Protecting Critical Infrastructures from Cyber-
 Attacks" and "Effective Countermeasures Against
 Emerging Threats in the Future Internet" .
 Bell Canada has shown great interest in the MASSIF
 Project and Craig Gibson (Senior Security Advisor)
 joined the MASSIF Technical Advisory Board
Collaboration Status


 Craig Gibson Proposed potential use cases for
 the MASSIF project:

 Craig Gibson participated MASSIF EB Meeting
 in Naples 14-15 September providing early
 feedbacks about the project and proposing to
 extend the scope of MASSIF to wireless,
 wireline, video and mobile applications.
Collaborations Plan

     Among the scenarios proposed by Bell Canada we plan
     to investigate the consequences of GPS spoofing
     against Synchrophasor devices.
  GPS satellite




GPS spoofer
                  GPS receiver
                                                Internet

                                 SyncroPhasor
                                                           DB
Contact Info
More Info

Luigi Romano
  luigi.romano@uniparthenope.it
  The Fault and Intrusion Tolerant Networked SystemS
  (FITNESS)
  research group Web site:
http://www.dit.uniparthenope.it/FITNESS/


The INSPIRE and INSPIRE INCO project Web sites:
  http://www.inspire-strep.eu
  http://www.inspire-inco.eu/

   The MASSIF project Web site:
   http://www.massif-project.eu

More Related Content

Similar to North American collaborations via INSPIRE/MASSIF

Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent MonitoringIntelie
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldIRJET Journal
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningIRJET Journal
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET Journal
 
IRJET - Bridge Monitoring System using IoT
IRJET -  	  Bridge Monitoring System using IoTIRJET -  	  Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoTIRJET Journal
 
Capacity Planning for Linux Systems
Capacity Planning for Linux SystemsCapacity Planning for Linux Systems
Capacity Planning for Linux SystemsRodrigo Campos
 
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNINGA SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNINGIRJET Journal
 
Aplications for machine learning in IoT
Aplications for machine learning in IoTAplications for machine learning in IoT
Aplications for machine learning in IoTYashesh Shroff
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET Journal
 
Automated traffic sign board
Automated traffic sign boardAutomated traffic sign board
Automated traffic sign boardijcsa
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET Journal
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET Journal
 
IRJET- Public Garden Automation System
IRJET-  	  Public Garden Automation SystemIRJET-  	  Public Garden Automation System
IRJET- Public Garden Automation SystemIRJET Journal
 
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 

Similar to North American collaborations via INSPIRE/MASSIF (20)

Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent Monitoring
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time World
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine Learning
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb People
 
IRJET - Bridge Monitoring System using IoT
IRJET -  	  Bridge Monitoring System using IoTIRJET -  	  Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoT
 
Capacity Planning for Linux Systems
Capacity Planning for Linux SystemsCapacity Planning for Linux Systems
Capacity Planning for Linux Systems
 
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNINGA SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
 
Aplications for machine learning in IoT
Aplications for machine learning in IoTAplications for machine learning in IoT
Aplications for machine learning in IoT
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
AF-2599-P.docx
AF-2599-P.docxAF-2599-P.docx
AF-2599-P.docx
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
 
Automated traffic sign board
Automated traffic sign boardAutomated traffic sign board
Automated traffic sign board
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga Instructor
 
IRJET- Public Garden Automation System
IRJET-  	  Public Garden Automation SystemIRJET-  	  Public Garden Automation System
IRJET- Public Garden Automation System
 
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

North American collaborations via INSPIRE/MASSIF

  • 1. North American collaborations via INSPIRE/MASSIF Luigi Romano CINI (Consorzio Interuniversitario Nazionale per l’Informatica) luigi.romano@uniparthenope.it Internet of Services 2011: Collaboration meeting for FP7 projects International Collaboration session Brussels September 29, 2011
  • 2. Roadmap Evidence that Critical Infrastructures (CIs) are vulnerable to cyber-attacks Focus on Power Grids, but true in general How we combined detection, diagnosis, and remediation for protecting CIs from cyber-attacks The INSPIRE project Our experience with International cooperation initiatives The INSPIRE INCO project Collaboration objectives The MASSIF project Contact Info
  • 3. Evidence that Critical Infrastructures are vulnerable to cyber-attacks
  • 4. Basic Concepts Power Grid (tentative definition): an interconnected network for delivering electricity from suppliers to consumers, which is synchronous with a given phase Phasor: complex number that represents both the magnitude and the phase angle of the sine waves found in electricity Synchro-Phasors: phasor measurements that occur at the same time Phasor Measurement Unit (PMU): device which collects Synchro-Phasors to determine the health of the power grid (using a GPS radio clock)
  • 5. Results in a nutshell 1 Administrator 2 4 LAN Power Synchro Phasor Phasor Grid device 3 Data Concentrator 1) Password Eavesdropping 2) Weak Policies on Password selection/maintenance, device fingerprinting possible (and relatively easy) 3) Unreliable channels (wrt both integrity and availability) 4) Poor input validation
  • 6. Security Analysis of a commercial Synchro- Phasor - Passwords Password Management Multilevel Security: 0, 1, B, P, A, O, 2, C After a pre-defined time, security level is downgraded to 0 (def. 5 min) Security evaluation results Default passwords are simple and can be found in most common dictionaries No constraints for password selection All levels can share the same password No aging mechanism All passwords can be manually reset
  • 7. Security Analysis of a commercial Synchro- Phasor - Communication Communications are in clear: ftp, telnet, IEEE C37.118, proprietary protocols Passwords can be easily intercepted Data can be easily intercepted Data can be altered 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 2b 40 00 80 06 62 50 c0 a8 01 01 c0 a8 .).+@...bP...... 0020 01 02 04 76 00 17 a8 64 9c b4 11 74 59 af 50 18 ...v...d...tY.P. 0030 00 fe 22 b0 00 00 54 .."...T 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 2e 40 00 80 06 62 4d c0 a8 01 01 c0 a8 .)..@...bM...... 0020 01 02 04 76 00 17 a8 64 9c b5 11 74 59 b0 50 18 ...v...d...tY.P. 0030 00 fe 35 ae 00 00 41 ..5...A 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 2f 40 00 80 06 62 4c c0 a8 01 01 c0 a8 .)./@...bL...... 0020 01 02 04 76 00 17 a8 64 9c b6 11 74 59 b1 50 18 ...v...d...tY.P. 0030 00 fe 2d ac 00 00 49 ..-...I 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 31 40 00 80 06 62 4a c0 a8 01 01 c0 a8 .).1@...bJ...... 0020 01 02 04 76 00 17 a8 64 9c b7 11 74 59 b2 50 18 ...v...d...tY.P. 0030 00 fe 2a aa 00 00 4c ..*...L
  • 8. SQL Injection attack to an Open Source PDC protected override void ProcessMeasurements(IMeasurement[] measurement { foreach (IMeasurement measurement in measurements) { // Create the command string to insert the measurement as a record in the table. StringBuilder commandString = new StringBuilder ("INSERT INTO Measurement VALUES ('"); commandString.Append (measurement.SignalID); commandString.Append ("','"); commandString.Append ((long)measurement.Timestamp); commandString.Append ("',"); commandString.Append (measurement.AdjustedValue); commandString.Append (')'); MySqlCommand command = new MySqlCommand (commandString.ToString(), m_connection); command.ExecuteNonQuery(); } m_measurementCount += measurements.Length; }
  • 9. If you don’t trust me ... then trust them
  • 10. How we combined detection, diagnosis, and remediation for protecting CIs from cyber- attacks
  • 11. Typical architecture of a SCADA system
  • 12. A bird’s eye view of INSPIRE Peer-to-peer overlays P2P MPLS Wireless Sensor Networks Offline Security Framework
  • 13. INSPIRE main results Analyzed vulnerabilities which affect SCADA systems Analyzed dependencies between CIs and the underlying communication networks Designed a self-reconfigurable architecture, suited for SCADA systems Developed diagnosis and recovery techniques, suited for SCADA systems Provided SCADA traffic with Quality of Service (QoS) guarantees
  • 14. Our experience with International cooperation initiatives
  • 15. INSPIRE-INCO in a nutshell Proposal: 248737 Acronym: INSPIRE-International (Cooperation) Program: FP7 Call: FP7-ICT-2009-4 Funding scheme: Small or medium-scale focused research project -STREP - CP-FP-INFSO Duration: 12 months (October 1, 2009 - September 30, 2010) Activity: ICT-4-9.2 - Supplements to support International Cooperation between ongoing projects
  • 16. The Consortium Europe (INSPIRE): CINI, Consorzio Interuniversitario Nazionale per l’Informatica - Coordinator (Italy) TUD, Technical University of Darmstadt (Germany) ITTI, ITTI Sp.zo.o. (Poland) http://www.inspire-strep.eu/ US (GridStat): WSU, Washington State University (USA) http://www.gridstat.net/
  • 17. The Funding Scheme Funding for International Funding for Research: Funding for Research: Cooperation: EC Grant 225553 NSF Grant 0326006 Extension to NSF Grant 0326006 Funding for Mobility: EC Grant 248737
  • 18. Mutual Benefits – Sharing Data INSPIRE Experimental Testbed
  • 19. Mutual Benefits – Sharing Experiences
  • 20. Mutual Benefits – Sharing Ideas
  • 21. The MASSIF project Multi-domain parallel-running Alert and reaction processes Highly-scalable, dependable and Predictive security analysis generation multi-level event collection Actions and Counter- measures Olympic Games Trustworthy event collection Multi-level security event modeling Languages Security analysis and EVENTS POLICIES notification Mobile money transfer service RELATIONS REACTIONS Multi-level event Process and attack correlation simulation Resilient framework CI Process architecture Control (Dam) Security-aware processes Managed Enterprise Service Event and Event, Process Models and Infrastructures Information Collection Attack Models Resilient event processing and integration Scenarios Prototypes Advanced SIEM Framework
  • 22. Collaboration Status Luigi Romano and Salvatore D'Antonio, participated in the "Trustworthy Networks and Services" session on March 24th with two talks, titled "Detection, Diagnosis, and Remediation: Three Pillars for Protecting Critical Infrastructures from Cyber- Attacks" and "Effective Countermeasures Against Emerging Threats in the Future Internet" . Bell Canada has shown great interest in the MASSIF Project and Craig Gibson (Senior Security Advisor) joined the MASSIF Technical Advisory Board
  • 23. Collaboration Status Craig Gibson Proposed potential use cases for the MASSIF project: Craig Gibson participated MASSIF EB Meeting in Naples 14-15 September providing early feedbacks about the project and proposing to extend the scope of MASSIF to wireless, wireline, video and mobile applications.
  • 24. Collaborations Plan Among the scenarios proposed by Bell Canada we plan to investigate the consequences of GPS spoofing against Synchrophasor devices. GPS satellite GPS spoofer GPS receiver Internet SyncroPhasor DB
  • 26. More Info Luigi Romano luigi.romano@uniparthenope.it The Fault and Intrusion Tolerant Networked SystemS (FITNESS) research group Web site: http://www.dit.uniparthenope.it/FITNESS/ The INSPIRE and INSPIRE INCO project Web sites: http://www.inspire-strep.eu http://www.inspire-inco.eu/ The MASSIF project Web site: http://www.massif-project.eu