SlideShare a Scribd company logo
1 of 12
Download to read offline
Blaž Ivanc
blaz.ivanc@determinanta.si
Guest Lecture at the Defense Studies
InformationTechnology and National Security
17 January 2017
 A critical infrastructure contains information systems as well as industrial
control systems (ICS).The latter include:
 Supervisory control and data acquisition systems (SCADA): The systems are
referred to as the central nervous system of a wide-area control network.
 Distributed control systems: they are part of system control on one integral
location.
 Programmable logic controllers (PLC): they are used in the control of specific
applications, most frequently in machine control in the production process.
 Control elements are a key part of one or several control sub-systems:
 Remote Terminal Unit (RTU), Master Terminal Unit, Human-Machine
Interface, Intelligent Electronic Device, control servers and other control
information infrastructure are also classified in this group.
 Understanding the system prior to the attack enables the attackers to
implement more complex attack.
 After the attacker has broken into the critical infrastructure network, the
following threats are common: response injection, command injection,
and denial of service.
 The known weakness of communication protocols in ICS is the absence of the
appropriate authentication, which enables false data injection and false response
packets.
 The absence of verifying the integrity of measurement data in sensors enables
response injection and consequently inappropriate responses in relation to the actual
situation.
 Deception attacks
▪ The attacks with the goal of deception can be found in the industrial control systems
as a change in the parameter values and can, as a result, impact on the behaviour
of components, e.g. switches, controllers, and actuators.
▪ Deception attacks vs. replay attacks
 False data injection attack
▪ Attacker can inject random or target false data.
▪ Stealth attack.
▪ Identifying the network models can enable the attacker to implement simple attacks
that are yet hard to detect.
 Network traversal attack
▪ Attack penetrates the network layers and enables the attacker the path to the key
elements of industrial control systems by exploiting the trust relationship among
the network hosts.
Node Description
G-0 Cyber-attacks in critical infrastructure
G-1 Reconnaissance and attack development
G-2 The attack on industrial control systems
G-3 Getting acquainted with the field data
G-4 Development of offensive computer-network operation in the mirrored
environment.
G-5 Direct compromising of the industrial control systems
G-6 Attack on the system integrator level
G-7 Acquiring documentation and program files
G-8 Computer network analyses
G-9 Attacks on a field level
G-10 Exploiting the weakness of routine procedures
G-11 Embedding backdoor in IT systems
G-12 Data manipulation
G-13 Capturing data flow traffic
G-14 Data flow emission
G-15 Traffic processing
G-16 Program change in programmable logic controller
G-17 Manipulation on sensor level
G-18 Compromising communication paths
G-19 Remote manipulation through additional users
G-20 Local manipulation of the process database
G-21 Adding communication paths
G-22 Embedding of the MitM attack mechanism
 The target can often be the system integrator of the industrial control
system in the critical infrastructure.This raises the following questions:
 Can the operator of the critical infrastructure prevent concrete information attacks that
exploit the system integrator as an entry point?
 Can the operator of the critical infrastructure prevent a security incident resulting from
compromising technology on the level of the manufacturer?
 Has the operator of the critical infrastructure considered information attacks
originating from compromising higher structures (systems integrator, technology
producer) while performing risk assessment and was the operator able to provide
concrete security countermeasures?
 System supply chain is the appropriate point for compromising,
especially in terms of structures that can represent more demanding
attack techniques or merely exploit its situation in the required access to
the application with simple offensive methods.
 Key features of novel cyber-attacks
 The attacks are focused on compromising data integrity with the aim of causing
consequences in the physical space
 The attacks reveal new offensive information techniques
 The malicious code dropper can exploit at least one of the unknown software
vulnerabilities with the purpose of expanding or raising the privileges
 Autonomous generating of the system specific payload
 Attack scenario - Stuxnet
 Attack scenario includes the spreading of malicious code and compromising of
programmable logic controllers.
▪ Stuxnet was discovered in June 2010.The targets of the attack were the facilities for enrichment
of uranium in Iran.
 The malicious code Stuxnet has spread inside the target in several ways.
▪ Malicious code dropper exploited also the unknown vulnerabilities.
 Purpose of the attack was to reprogram the industrial control systems by changing the
PLC code.
▪ The final system targets of the attack were control system, engineering system and the selected
programmable logic controllers.
 Changes in the operation of programmable logic controllers (PLC) are achieved by
replacing the DLL file.
▪ The key for the target payload was in PLC rootkit.
 Characteristics of the Enhanced Structural Model:
 segmental distribution of the model structure
▪ S-1 (Dropper), S-2 (Payload), S-3 (Structure of malicious code spreading)
 demonstration of countermeasures
▪ C-1 (Network-isolated systems), C-2 (Control over the events in computer resources),
C-3 (Network system for intrusion detection), C-4 (Authentication security mechanisms)
 use of labels for exploiting vulnerability
 use of labels for attack vectors
▪ v1 (Weak Authetication), v2 (DLL Hijacking),
v3 (MitM)
 use of additional nodes
▪ Conditional subordination node
G-2 = P-1 OR (G-5 AND G-6)
▪ Housing node
 Critical infrastructure operators are advised to establish cyber defense departments which
will review security issues in terms of threat agents.
 Sophisticated critical infrastructure attack analyses show that attacks executing a discrete covert
channel are a relatively evenly distributed combination of a physical and a cyber attack supported by
extensive intelligence efforts.
 According to the findings more security measures should be introduced in Slovenia
immediately:
 Mandatory introduction and monitoring of the implementation of security standards for industrial
control systems.
 It is necessary to determine the level of independence of the critical infrastructure operator in terms
of physical process management through industrial-control systems.
 It would be wise to establish a small, highly competent organization for cyber security and CIP. In
Slovenia, this would ensure a secure supply of individual system components, assessment of
adequate security mechanisms, forcing the local know-how to pursue constant development and
monitor the progress of technology related areas.
Questions?
Contact
blaz.ivanc@determinanta.si
https://si.linkedin.com/in/blazivanc

More Related Content

What's hot

What's hot (20)

Network security
Network security Network security
Network security
 
Incident response
Incident responseIncident response
Incident response
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
 
WEP
WEPWEP
WEP
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
Campus Area Network Security
Campus Area Network SecurityCampus Area Network Security
Campus Area Network Security
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Aircrack
AircrackAircrack
Aircrack
 
Supply chain-attack
Supply chain-attackSupply chain-attack
Supply chain-attack
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Network Security
Network SecurityNetwork Security
Network Security
 

Similar to Critical infrastructure Protection and Cyber Attack Modeling

3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1nicfs
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
 
D03302030036
D03302030036D03302030036
D03302030036theijes
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
Modification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical reviewModification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical reviewCSITiaesprime
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inmaribethy2y
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...SyvilMaeTapinit
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierAlireza Ghahrood
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesIJERA Editor
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques IJERA Editor
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET Journal
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsIRJET Journal
 

Similar to Critical infrastructure Protection and Cyber Attack Modeling (20)

3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
D03302030036
D03302030036D03302030036
D03302030036
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Modification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical reviewModification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical review
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Critical infrastructure Protection and Cyber Attack Modeling

  • 1. Blaž Ivanc blaz.ivanc@determinanta.si Guest Lecture at the Defense Studies InformationTechnology and National Security 17 January 2017
  • 2.  A critical infrastructure contains information systems as well as industrial control systems (ICS).The latter include:  Supervisory control and data acquisition systems (SCADA): The systems are referred to as the central nervous system of a wide-area control network.  Distributed control systems: they are part of system control on one integral location.  Programmable logic controllers (PLC): they are used in the control of specific applications, most frequently in machine control in the production process.  Control elements are a key part of one or several control sub-systems:  Remote Terminal Unit (RTU), Master Terminal Unit, Human-Machine Interface, Intelligent Electronic Device, control servers and other control information infrastructure are also classified in this group.
  • 3.  Understanding the system prior to the attack enables the attackers to implement more complex attack.  After the attacker has broken into the critical infrastructure network, the following threats are common: response injection, command injection, and denial of service.  The known weakness of communication protocols in ICS is the absence of the appropriate authentication, which enables false data injection and false response packets.  The absence of verifying the integrity of measurement data in sensors enables response injection and consequently inappropriate responses in relation to the actual situation.
  • 4.  Deception attacks ▪ The attacks with the goal of deception can be found in the industrial control systems as a change in the parameter values and can, as a result, impact on the behaviour of components, e.g. switches, controllers, and actuators. ▪ Deception attacks vs. replay attacks  False data injection attack ▪ Attacker can inject random or target false data. ▪ Stealth attack. ▪ Identifying the network models can enable the attacker to implement simple attacks that are yet hard to detect.  Network traversal attack ▪ Attack penetrates the network layers and enables the attacker the path to the key elements of industrial control systems by exploiting the trust relationship among the network hosts.
  • 5.
  • 6. Node Description G-0 Cyber-attacks in critical infrastructure G-1 Reconnaissance and attack development G-2 The attack on industrial control systems G-3 Getting acquainted with the field data G-4 Development of offensive computer-network operation in the mirrored environment. G-5 Direct compromising of the industrial control systems G-6 Attack on the system integrator level G-7 Acquiring documentation and program files G-8 Computer network analyses G-9 Attacks on a field level G-10 Exploiting the weakness of routine procedures G-11 Embedding backdoor in IT systems G-12 Data manipulation G-13 Capturing data flow traffic G-14 Data flow emission G-15 Traffic processing G-16 Program change in programmable logic controller G-17 Manipulation on sensor level G-18 Compromising communication paths G-19 Remote manipulation through additional users G-20 Local manipulation of the process database G-21 Adding communication paths G-22 Embedding of the MitM attack mechanism
  • 7.  The target can often be the system integrator of the industrial control system in the critical infrastructure.This raises the following questions:  Can the operator of the critical infrastructure prevent concrete information attacks that exploit the system integrator as an entry point?  Can the operator of the critical infrastructure prevent a security incident resulting from compromising technology on the level of the manufacturer?  Has the operator of the critical infrastructure considered information attacks originating from compromising higher structures (systems integrator, technology producer) while performing risk assessment and was the operator able to provide concrete security countermeasures?  System supply chain is the appropriate point for compromising, especially in terms of structures that can represent more demanding attack techniques or merely exploit its situation in the required access to the application with simple offensive methods.
  • 8.  Key features of novel cyber-attacks  The attacks are focused on compromising data integrity with the aim of causing consequences in the physical space  The attacks reveal new offensive information techniques  The malicious code dropper can exploit at least one of the unknown software vulnerabilities with the purpose of expanding or raising the privileges  Autonomous generating of the system specific payload
  • 9.  Attack scenario - Stuxnet  Attack scenario includes the spreading of malicious code and compromising of programmable logic controllers. ▪ Stuxnet was discovered in June 2010.The targets of the attack were the facilities for enrichment of uranium in Iran.  The malicious code Stuxnet has spread inside the target in several ways. ▪ Malicious code dropper exploited also the unknown vulnerabilities.  Purpose of the attack was to reprogram the industrial control systems by changing the PLC code. ▪ The final system targets of the attack were control system, engineering system and the selected programmable logic controllers.  Changes in the operation of programmable logic controllers (PLC) are achieved by replacing the DLL file. ▪ The key for the target payload was in PLC rootkit.
  • 10.  Characteristics of the Enhanced Structural Model:  segmental distribution of the model structure ▪ S-1 (Dropper), S-2 (Payload), S-3 (Structure of malicious code spreading)  demonstration of countermeasures ▪ C-1 (Network-isolated systems), C-2 (Control over the events in computer resources), C-3 (Network system for intrusion detection), C-4 (Authentication security mechanisms)  use of labels for exploiting vulnerability  use of labels for attack vectors ▪ v1 (Weak Authetication), v2 (DLL Hijacking), v3 (MitM)  use of additional nodes ▪ Conditional subordination node G-2 = P-1 OR (G-5 AND G-6) ▪ Housing node
  • 11.  Critical infrastructure operators are advised to establish cyber defense departments which will review security issues in terms of threat agents.  Sophisticated critical infrastructure attack analyses show that attacks executing a discrete covert channel are a relatively evenly distributed combination of a physical and a cyber attack supported by extensive intelligence efforts.  According to the findings more security measures should be introduced in Slovenia immediately:  Mandatory introduction and monitoring of the implementation of security standards for industrial control systems.  It is necessary to determine the level of independence of the critical infrastructure operator in terms of physical process management through industrial-control systems.  It would be wise to establish a small, highly competent organization for cyber security and CIP. In Slovenia, this would ensure a secure supply of individual system components, assessment of adequate security mechanisms, forcing the local know-how to pursue constant development and monitor the progress of technology related areas.