SlideShare a Scribd company logo
Blaž Ivanc
blaz.ivanc@determinanta.si
Guest Lecture at the Defense Studies
InformationTechnology and National Security
17 January 2017
 A critical infrastructure contains information systems as well as industrial
control systems (ICS).The latter include:
 Supervisory control and data acquisition systems (SCADA): The systems are
referred to as the central nervous system of a wide-area control network.
 Distributed control systems: they are part of system control on one integral
location.
 Programmable logic controllers (PLC): they are used in the control of specific
applications, most frequently in machine control in the production process.
 Control elements are a key part of one or several control sub-systems:
 Remote Terminal Unit (RTU), Master Terminal Unit, Human-Machine
Interface, Intelligent Electronic Device, control servers and other control
information infrastructure are also classified in this group.
 Understanding the system prior to the attack enables the attackers to
implement more complex attack.
 After the attacker has broken into the critical infrastructure network, the
following threats are common: response injection, command injection,
and denial of service.
 The known weakness of communication protocols in ICS is the absence of the
appropriate authentication, which enables false data injection and false response
packets.
 The absence of verifying the integrity of measurement data in sensors enables
response injection and consequently inappropriate responses in relation to the actual
situation.
 Deception attacks
▪ The attacks with the goal of deception can be found in the industrial control systems
as a change in the parameter values and can, as a result, impact on the behaviour
of components, e.g. switches, controllers, and actuators.
▪ Deception attacks vs. replay attacks
 False data injection attack
▪ Attacker can inject random or target false data.
▪ Stealth attack.
▪ Identifying the network models can enable the attacker to implement simple attacks
that are yet hard to detect.
 Network traversal attack
▪ Attack penetrates the network layers and enables the attacker the path to the key
elements of industrial control systems by exploiting the trust relationship among
the network hosts.
Node Description
G-0 Cyber-attacks in critical infrastructure
G-1 Reconnaissance and attack development
G-2 The attack on industrial control systems
G-3 Getting acquainted with the field data
G-4 Development of offensive computer-network operation in the mirrored
environment.
G-5 Direct compromising of the industrial control systems
G-6 Attack on the system integrator level
G-7 Acquiring documentation and program files
G-8 Computer network analyses
G-9 Attacks on a field level
G-10 Exploiting the weakness of routine procedures
G-11 Embedding backdoor in IT systems
G-12 Data manipulation
G-13 Capturing data flow traffic
G-14 Data flow emission
G-15 Traffic processing
G-16 Program change in programmable logic controller
G-17 Manipulation on sensor level
G-18 Compromising communication paths
G-19 Remote manipulation through additional users
G-20 Local manipulation of the process database
G-21 Adding communication paths
G-22 Embedding of the MitM attack mechanism
 The target can often be the system integrator of the industrial control
system in the critical infrastructure.This raises the following questions:
 Can the operator of the critical infrastructure prevent concrete information attacks that
exploit the system integrator as an entry point?
 Can the operator of the critical infrastructure prevent a security incident resulting from
compromising technology on the level of the manufacturer?
 Has the operator of the critical infrastructure considered information attacks
originating from compromising higher structures (systems integrator, technology
producer) while performing risk assessment and was the operator able to provide
concrete security countermeasures?
 System supply chain is the appropriate point for compromising,
especially in terms of structures that can represent more demanding
attack techniques or merely exploit its situation in the required access to
the application with simple offensive methods.
 Key features of novel cyber-attacks
 The attacks are focused on compromising data integrity with the aim of causing
consequences in the physical space
 The attacks reveal new offensive information techniques
 The malicious code dropper can exploit at least one of the unknown software
vulnerabilities with the purpose of expanding or raising the privileges
 Autonomous generating of the system specific payload
 Attack scenario - Stuxnet
 Attack scenario includes the spreading of malicious code and compromising of
programmable logic controllers.
▪ Stuxnet was discovered in June 2010.The targets of the attack were the facilities for enrichment
of uranium in Iran.
 The malicious code Stuxnet has spread inside the target in several ways.
▪ Malicious code dropper exploited also the unknown vulnerabilities.
 Purpose of the attack was to reprogram the industrial control systems by changing the
PLC code.
▪ The final system targets of the attack were control system, engineering system and the selected
programmable logic controllers.
 Changes in the operation of programmable logic controllers (PLC) are achieved by
replacing the DLL file.
▪ The key for the target payload was in PLC rootkit.
 Characteristics of the Enhanced Structural Model:
 segmental distribution of the model structure
▪ S-1 (Dropper), S-2 (Payload), S-3 (Structure of malicious code spreading)
 demonstration of countermeasures
▪ C-1 (Network-isolated systems), C-2 (Control over the events in computer resources),
C-3 (Network system for intrusion detection), C-4 (Authentication security mechanisms)
 use of labels for exploiting vulnerability
 use of labels for attack vectors
▪ v1 (Weak Authetication), v2 (DLL Hijacking),
v3 (MitM)
 use of additional nodes
▪ Conditional subordination node
G-2 = P-1 OR (G-5 AND G-6)
▪ Housing node
 Critical infrastructure operators are advised to establish cyber defense departments which
will review security issues in terms of threat agents.
 Sophisticated critical infrastructure attack analyses show that attacks executing a discrete covert
channel are a relatively evenly distributed combination of a physical and a cyber attack supported by
extensive intelligence efforts.
 According to the findings more security measures should be introduced in Slovenia
immediately:
 Mandatory introduction and monitoring of the implementation of security standards for industrial
control systems.
 It is necessary to determine the level of independence of the critical infrastructure operator in terms
of physical process management through industrial-control systems.
 It would be wise to establish a small, highly competent organization for cyber security and CIP. In
Slovenia, this would ensure a secure supply of individual system components, assessment of
adequate security mechanisms, forcing the local know-how to pursue constant development and
monitor the progress of technology related areas.
Questions?
Contact
blaz.ivanc@determinanta.si
https://si.linkedin.com/in/blazivanc

More Related Content

What's hot

Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
harshitakhandelwal26
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
Mona Rajput
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
Bob Marcus
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
Er. Arpit Sharma
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
Kalyani Government Engineering College
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Jayanthi Kannan MK
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
Nikhil Patteri
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
SHAAMILIVARSAGV
 
Module - 2 IOT PPT_ 18CS81.pdf
Module - 2 IOT PPT_ 18CS81.pdfModule - 2 IOT PPT_ 18CS81.pdf
Module - 2 IOT PPT_ 18CS81.pdf
Manjunath Rajgopal
 
1320 IoT Trend and Disaster and Risk Management
1320 IoT Trend and Disaster and Risk Management1320 IoT Trend and Disaster and Risk Management
1320 IoT Trend and Disaster and Risk Management
Global Risk Forum GRFDavos
 
IoT_Intro.pptx
IoT_Intro.pptxIoT_Intro.pptx
IoT_Intro.pptx
Amar Nath Dsilva
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
Lancope, Inc.
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Ankur Pipara
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
R-Style Lab
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Dr Karthikeyan Periasamy
 

What's hot (20)

Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Module - 2 IOT PPT_ 18CS81.pdf
Module - 2 IOT PPT_ 18CS81.pdfModule - 2 IOT PPT_ 18CS81.pdf
Module - 2 IOT PPT_ 18CS81.pdf
 
1320 IoT Trend and Disaster and Risk Management
1320 IoT Trend and Disaster and Risk Management1320 IoT Trend and Disaster and Risk Management
1320 IoT Trend and Disaster and Risk Management
 
IoT_Intro.pptx
IoT_Intro.pptxIoT_Intro.pptx
IoT_Intro.pptx
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to Critical infrastructure Protection and Cyber Attack Modeling

3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
nicfs
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
CSCJournals
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
ijceronline
 
D03302030036
D03302030036D03302030036
D03302030036
theijes
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
Modification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical reviewModification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical review
CSITiaesprime
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
maribethy2y
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
IJNSA Journal
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
SyvilMaeTapinit
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
Alireza Ghahrood
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
Ameer Sameer
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
IJERA Editor
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
IJERA Editor
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
International Journal of Engineering Inventions www.ijeijournal.com
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
IRJET Journal
 
CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
SantiagoBrito20
 

Similar to Critical infrastructure Protection and Cyber Attack Modeling (20)

3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
D03302030036
D03302030036D03302030036
D03302030036
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Modification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical reviewModification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical review
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 

Critical infrastructure Protection and Cyber Attack Modeling

  • 1. Blaž Ivanc blaz.ivanc@determinanta.si Guest Lecture at the Defense Studies InformationTechnology and National Security 17 January 2017
  • 2.  A critical infrastructure contains information systems as well as industrial control systems (ICS).The latter include:  Supervisory control and data acquisition systems (SCADA): The systems are referred to as the central nervous system of a wide-area control network.  Distributed control systems: they are part of system control on one integral location.  Programmable logic controllers (PLC): they are used in the control of specific applications, most frequently in machine control in the production process.  Control elements are a key part of one or several control sub-systems:  Remote Terminal Unit (RTU), Master Terminal Unit, Human-Machine Interface, Intelligent Electronic Device, control servers and other control information infrastructure are also classified in this group.
  • 3.  Understanding the system prior to the attack enables the attackers to implement more complex attack.  After the attacker has broken into the critical infrastructure network, the following threats are common: response injection, command injection, and denial of service.  The known weakness of communication protocols in ICS is the absence of the appropriate authentication, which enables false data injection and false response packets.  The absence of verifying the integrity of measurement data in sensors enables response injection and consequently inappropriate responses in relation to the actual situation.
  • 4.  Deception attacks ▪ The attacks with the goal of deception can be found in the industrial control systems as a change in the parameter values and can, as a result, impact on the behaviour of components, e.g. switches, controllers, and actuators. ▪ Deception attacks vs. replay attacks  False data injection attack ▪ Attacker can inject random or target false data. ▪ Stealth attack. ▪ Identifying the network models can enable the attacker to implement simple attacks that are yet hard to detect.  Network traversal attack ▪ Attack penetrates the network layers and enables the attacker the path to the key elements of industrial control systems by exploiting the trust relationship among the network hosts.
  • 5.
  • 6. Node Description G-0 Cyber-attacks in critical infrastructure G-1 Reconnaissance and attack development G-2 The attack on industrial control systems G-3 Getting acquainted with the field data G-4 Development of offensive computer-network operation in the mirrored environment. G-5 Direct compromising of the industrial control systems G-6 Attack on the system integrator level G-7 Acquiring documentation and program files G-8 Computer network analyses G-9 Attacks on a field level G-10 Exploiting the weakness of routine procedures G-11 Embedding backdoor in IT systems G-12 Data manipulation G-13 Capturing data flow traffic G-14 Data flow emission G-15 Traffic processing G-16 Program change in programmable logic controller G-17 Manipulation on sensor level G-18 Compromising communication paths G-19 Remote manipulation through additional users G-20 Local manipulation of the process database G-21 Adding communication paths G-22 Embedding of the MitM attack mechanism
  • 7.  The target can often be the system integrator of the industrial control system in the critical infrastructure.This raises the following questions:  Can the operator of the critical infrastructure prevent concrete information attacks that exploit the system integrator as an entry point?  Can the operator of the critical infrastructure prevent a security incident resulting from compromising technology on the level of the manufacturer?  Has the operator of the critical infrastructure considered information attacks originating from compromising higher structures (systems integrator, technology producer) while performing risk assessment and was the operator able to provide concrete security countermeasures?  System supply chain is the appropriate point for compromising, especially in terms of structures that can represent more demanding attack techniques or merely exploit its situation in the required access to the application with simple offensive methods.
  • 8.  Key features of novel cyber-attacks  The attacks are focused on compromising data integrity with the aim of causing consequences in the physical space  The attacks reveal new offensive information techniques  The malicious code dropper can exploit at least one of the unknown software vulnerabilities with the purpose of expanding or raising the privileges  Autonomous generating of the system specific payload
  • 9.  Attack scenario - Stuxnet  Attack scenario includes the spreading of malicious code and compromising of programmable logic controllers. ▪ Stuxnet was discovered in June 2010.The targets of the attack were the facilities for enrichment of uranium in Iran.  The malicious code Stuxnet has spread inside the target in several ways. ▪ Malicious code dropper exploited also the unknown vulnerabilities.  Purpose of the attack was to reprogram the industrial control systems by changing the PLC code. ▪ The final system targets of the attack were control system, engineering system and the selected programmable logic controllers.  Changes in the operation of programmable logic controllers (PLC) are achieved by replacing the DLL file. ▪ The key for the target payload was in PLC rootkit.
  • 10.  Characteristics of the Enhanced Structural Model:  segmental distribution of the model structure ▪ S-1 (Dropper), S-2 (Payload), S-3 (Structure of malicious code spreading)  demonstration of countermeasures ▪ C-1 (Network-isolated systems), C-2 (Control over the events in computer resources), C-3 (Network system for intrusion detection), C-4 (Authentication security mechanisms)  use of labels for exploiting vulnerability  use of labels for attack vectors ▪ v1 (Weak Authetication), v2 (DLL Hijacking), v3 (MitM)  use of additional nodes ▪ Conditional subordination node G-2 = P-1 OR (G-5 AND G-6) ▪ Housing node
  • 11.  Critical infrastructure operators are advised to establish cyber defense departments which will review security issues in terms of threat agents.  Sophisticated critical infrastructure attack analyses show that attacks executing a discrete covert channel are a relatively evenly distributed combination of a physical and a cyber attack supported by extensive intelligence efforts.  According to the findings more security measures should be introduced in Slovenia immediately:  Mandatory introduction and monitoring of the implementation of security standards for industrial control systems.  It is necessary to determine the level of independence of the critical infrastructure operator in terms of physical process management through industrial-control systems.  It would be wise to establish a small, highly competent organization for cyber security and CIP. In Slovenia, this would ensure a secure supply of individual system components, assessment of adequate security mechanisms, forcing the local know-how to pursue constant development and monitor the progress of technology related areas.