SlideShare a Scribd company logo
1 of 37
Download to read offline
Quimicefa for hackers: Attacking (and trying to
defend) chemical processes
Mikel Iturbe
$ whoami
● Mikel Iturbe
– Researcher at the Intelligent Systems for Industrial
Systems (ISIS SISI) Group of Mondragon
Unibertsitatea.
– Work mainly in ICS Security
● Intrusion (Anomaly) detection
– Among other things
● Data analysis
What I’ll talk about
● Intro to ICS/PCS/SCADA/IN/Industrial… security
● Process-level security
● Attacks on chemical plants
– Demo
● Countermeasures
– Example
● Conclusions
Control Systems
CC-BY-SA 3.0 Kreuzschnabel, Schmimi1848, Wolkenkratzer, Brian Cantoni, Hermann Luyken, Beroesz
Control Systems
● ICS/IACS/IN/SCADA/DCS...
© 2016 Little Bobby All Rights Reserved
A bit of history
● Trans-Siberian pipeline explosion (1982)
– Source unconfirmed (myth?)
– Two hypotheses on the cause:
● Operator mistake
● Malicious and leaked software caused the explosion
A bit of history
● Maroochy Water Breach (2004)
– 142 pumping stations
● Ex-employee attacks the system with stolen
equipment
● >1m liters of sewage water spilled with no
control.
A bit of history
● Stuxnet (2010)
– Designed to disrupt Iran’s nuclear program
– 4 zero-days
– Sabotaged uranium centrifuges by spinning them
faster
A bit of history
● German Steel Mill Incident (2014)
– Not much known (who,where…)
– Spear-Phishing > IT network > OT network
– A blast furnace could not be shut down properly.
“Massive” losses.
(Defensive) ICS Security
(Defensive) ICS Security
IT layers
ICS layers
Ok! Let’s start then
● Realistic environment for research
● Conducting attacks with physical impact
requires large domain knowledge
– Process (what is this?)
– Control (how it behaves?)
– Objective (what do I want to achieve?)
Ok! Lets start then
● http://www.ippe.com/Plants
● http://usedplants.com
●
Ok! Let’s start then
● Realistic environment for research
● Let’s not break the bank
Ok! Let’s start then
Ok! Let’s start then
Ok! Let’s start then
● Realistic environment for research
● Let’s not break the bank
● Let’s not get ourselves killed
Simulation: DVCP
● Damn Vulnerable Chemical Process
– Presented by Krotofil and Larsen
– Two variants
● Tennessee-Eastman (TE)
● Vinyl Acetate Monomer (VAM)
– Developed over Matlab & Simulink
● Process in C
● Control/Execution in Simulink
DVCP-TE
Attacking chemical processes
● Necessary to have wide domain knowledge
– Knowledge of the process and its control
● Main types of attacks
– Equipment damage (break stuff...)
– Economic damage (make it expensive...)
Equipment attacks
● Pipe damage (Clogging, water hammer)
● Reactor damage. (kabooom)
DVCP-TE
Economic attacks
● Produce product of inferior quality (huge
impact)
● Increase cost of operation
● More stealthy than equipment attacks
Demo: Attacks
Countermeasures
● Monitoring variable values
● Signal noise analysis for replay attacks
● Predictive approaches
● Non-predictive approaches
Multivariate Statistical Proc. Control
● Previously used for fault detection/quality
control
● By using PCA, it transforms the original variable
space into a new subspace
● Two statistics are computed, D and Q and
these are monitored
● Once an anomaly is detected, by using
contribution plots we diagnose its cause
Teodora Kourti. Process analysis and abnormal situation detection: from theory to practice
Control Systems, IEEE, IEEE, 2002, 22, 10-25
Example
Mikel Iturbe, José Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria. On the Feasibility of Distinguishing
Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), IEEE,
2016, 155-160
Example
Row 1 Row 2 Row 3 Row 4
0
2
4
6
8
10
12
Column 1
Column 2
Column 3
Example
Example: Detection
Example: Diagnosis
Doing now
● I first wrote MSPC over Apache Spark
– Replicating functionalities from existing Matlab
toolbox
– Yeah, you know, “Big Data”
● Rewriting it in pure Python
● Finishing a Modbus bridge for DVCP-TE
Conclusions
● ICS and IT security are different
– Specially when exploiting systems
● Current protection approaches disregard process
dynamics
– I think this will change
● There are PoC for intrusion detection at the
process level
● This field requires a multidisciplinary point of view
Still much to do!!!!!!!
● This field is still underdeveloped when
compared to other sec fields
● Much to do, much to learn. Not many resources
though, :-/
– Formal training: control theory, chemical
engineering, academic papers.
– Con talks (Marina Krotofil, Jason Larsen...)
Eskerrik asko
● mikel@hamahiru.org
● miturbe@mondragon.edu
● Twitter: @azken_tximinoa
● https://iturbe.info

More Related Content

Similar to Quimicefa for hackers: Attacking (and trying to defend) chemical processes

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsMarina Krotofil
 
Monitoring - deeper dive
Monitoring  - deeper diveMonitoring  - deeper dive
Monitoring - deeper diveRobert Kubiś
 
First SCADA LAB International Workshop
First SCADA LAB International WorkshopFirst SCADA LAB International Workshop
First SCADA LAB International WorkshopScadaLab Project
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel LinaresTI Safe
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systemsJaap van Ekris
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Byres Security Inc.
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systemsJaap van Ekris
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)shanshicn
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxMahendraShukla27
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systemsJaap van Ekris
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsC4Media
 
Embedded Basics
Embedded Basics Embedded Basics
Embedded Basics Electro 8
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systemsJaap van Ekris
 
CS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevCS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevMarina Krotofil
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos, Inc.
 
Functional safety by FMEA/FTA
Functional safety by FMEA/FTAFunctional safety by FMEA/FTA
Functional safety by FMEA/FTAmehmor
 

Similar to Quimicefa for hackers: Attacking (and trying to defend) chemical processes (20)

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsics
 
Monitoring - deeper dive
Monitoring  - deeper diveMonitoring  - deeper dive
Monitoring - deeper dive
 
First SCADA LAB International Workshop
First SCADA LAB International WorkshopFirst SCADA LAB International Workshop
First SCADA LAB International Workshop
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient Systems
 
MKAD_black_V2
MKAD_black_V2MKAD_black_V2
MKAD_black_V2
 
Embedded Basics
Embedded Basics Embedded Basics
Embedded Basics
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
 
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
 
CS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevCS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsev
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
Functional safety by FMEA/FTA
Functional safety by FMEA/FTAFunctional safety by FMEA/FTA
Functional safety by FMEA/FTA
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Quimicefa for hackers: Attacking (and trying to defend) chemical processes

  • 1. Quimicefa for hackers: Attacking (and trying to defend) chemical processes Mikel Iturbe
  • 2. $ whoami ● Mikel Iturbe – Researcher at the Intelligent Systems for Industrial Systems (ISIS SISI) Group of Mondragon Unibertsitatea. – Work mainly in ICS Security ● Intrusion (Anomaly) detection – Among other things ● Data analysis
  • 3. What I’ll talk about ● Intro to ICS/PCS/SCADA/IN/Industrial… security ● Process-level security ● Attacks on chemical plants – Demo ● Countermeasures – Example ● Conclusions
  • 4. Control Systems CC-BY-SA 3.0 Kreuzschnabel, Schmimi1848, Wolkenkratzer, Brian Cantoni, Hermann Luyken, Beroesz
  • 5. Control Systems ● ICS/IACS/IN/SCADA/DCS... © 2016 Little Bobby All Rights Reserved
  • 6. A bit of history ● Trans-Siberian pipeline explosion (1982) – Source unconfirmed (myth?) – Two hypotheses on the cause: ● Operator mistake ● Malicious and leaked software caused the explosion
  • 7. A bit of history ● Maroochy Water Breach (2004) – 142 pumping stations ● Ex-employee attacks the system with stolen equipment ● >1m liters of sewage water spilled with no control.
  • 8. A bit of history ● Stuxnet (2010) – Designed to disrupt Iran’s nuclear program – 4 zero-days – Sabotaged uranium centrifuges by spinning them faster
  • 9. A bit of history ● German Steel Mill Incident (2014) – Not much known (who,where…) – Spear-Phishing > IT network > OT network – A blast furnace could not be shut down properly. “Massive” losses.
  • 14. Ok! Let’s start then ● Realistic environment for research ● Conducting attacks with physical impact requires large domain knowledge – Process (what is this?) – Control (how it behaves?) – Objective (what do I want to achieve?)
  • 15. Ok! Lets start then ● http://www.ippe.com/Plants ● http://usedplants.com ●
  • 16. Ok! Let’s start then ● Realistic environment for research ● Let’s not break the bank
  • 19. Ok! Let’s start then ● Realistic environment for research ● Let’s not break the bank ● Let’s not get ourselves killed
  • 20. Simulation: DVCP ● Damn Vulnerable Chemical Process – Presented by Krotofil and Larsen – Two variants ● Tennessee-Eastman (TE) ● Vinyl Acetate Monomer (VAM) – Developed over Matlab & Simulink ● Process in C ● Control/Execution in Simulink
  • 22. Attacking chemical processes ● Necessary to have wide domain knowledge – Knowledge of the process and its control ● Main types of attacks – Equipment damage (break stuff...) – Economic damage (make it expensive...)
  • 23. Equipment attacks ● Pipe damage (Clogging, water hammer) ● Reactor damage. (kabooom)
  • 25. Economic attacks ● Produce product of inferior quality (huge impact) ● Increase cost of operation ● More stealthy than equipment attacks
  • 27. Countermeasures ● Monitoring variable values ● Signal noise analysis for replay attacks ● Predictive approaches ● Non-predictive approaches
  • 28. Multivariate Statistical Proc. Control ● Previously used for fault detection/quality control ● By using PCA, it transforms the original variable space into a new subspace ● Two statistics are computed, D and Q and these are monitored ● Once an anomaly is detected, by using contribution plots we diagnose its cause Teodora Kourti. Process analysis and abnormal situation detection: from theory to practice Control Systems, IEEE, IEEE, 2002, 22, 10-25
  • 29. Example Mikel Iturbe, José Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria. On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), IEEE, 2016, 155-160
  • 30. Example Row 1 Row 2 Row 3 Row 4 0 2 4 6 8 10 12 Column 1 Column 2 Column 3
  • 34. Doing now ● I first wrote MSPC over Apache Spark – Replicating functionalities from existing Matlab toolbox – Yeah, you know, “Big Data” ● Rewriting it in pure Python ● Finishing a Modbus bridge for DVCP-TE
  • 35. Conclusions ● ICS and IT security are different – Specially when exploiting systems ● Current protection approaches disregard process dynamics – I think this will change ● There are PoC for intrusion detection at the process level ● This field requires a multidisciplinary point of view
  • 36. Still much to do!!!!!!! ● This field is still underdeveloped when compared to other sec fields ● Much to do, much to learn. Not many resources though, :-/ – Formal training: control theory, chemical engineering, academic papers. – Con talks (Marina Krotofil, Jason Larsen...)
  • 37. Eskerrik asko ● mikel@hamahiru.org ● miturbe@mondragon.edu ● Twitter: @azken_tximinoa ● https://iturbe.info