SlideShare a Scribd company logo
Standards 
Certification 
Education & Training 
Publishing 
Conferences & Exhibits 
ICS Performance Lab 
Jim Gilsinn 
Kenexis Security
Jim Gilsinn - Bio 
• Senior Investigator, Kenexis Security 
• ISA-99 Committee (ISA/IEC 62443 Standards) 
– Co-Chair, ISA99 Committee 
– Co-Chair, ISA99 WG2, Security Program 
• 23 years engineering experience 
– Last 13 doing ICS networks and cyber security 
• MSEE specializing in control theory 
2
INTRO TO ICS NETWORK 
PERFORMANCE 
3
Industrial Network Types & Metrics: 
Publish/Subscribe 
• Publish/subscribe or peer-to-peer communications 
• Main performance metric: Cyclic frequency 
variability/jitter 
• Real-time EtherNet/IP™ uses publish/subscribe 
– Requested/Accepted Packet Interval (RPI/API) 
– Measured Packet Interval (MPI) 
4
Industrial Network Types & Metrics: 
Publish/Subscribe 
• Difference between 
TPub_Com_Init & 
TSub_Com_Init is network 
roundtrip delay 
• TPub_Com_Init, TSub_Com_Init 
not important 
• Variability in TPub much 
more important 
• Theoretically, TPub 
doesn’t need to match 
TSub 
– In production systems, 
they are the same 
Subscriber Publisher 
TPub_Com_Init 
TPub_1 
TPub_2 
TPub_N-1 
TPub_N 
TSub_Com_Init 
TSub_M 
. 
. 
. 
5
Performance Testing Methodology: 
Performance Metrics 
• Command/response or master/slave communications 
• Main performance metric: Latency 
• Large numbers of protocols use this 
– Most (All?) PC-based server/client protocols – HTTP(S), (S)FTP, 
etc. 
– Most industrial protocols – Modbus/TCP, Profinet, Ethercat, etc. 
6
Industrial Network Types & Metrics: 
Command/Response 
• Difference between 
TCom_Delay & TRes is 
network roundtrip 
delay 
• Latency in TCom & 
TRes important 
Commander Responder 
TRes_1 
TRes_2 
TCom_Delay_1 
TCom_1 
TCom_Delay_2 
TCom_2 
7
Isolating Traffic Streams 
• Isolating traffic streams can be tricky 
• 10’s – 100’s of traffic streams in production environment 
• Your Wireshark Fu must be strong! 
• Usually requires additional post-processing 
• Multiple streams can exist between same devices 
8
Isolating Traffic Streams 
• Traffic pairs 
– Source IP/MAC address 
– Destination IP/MAC address 
– Source TCP/UDP port 
– Destination TCP/UDP port 
• Publish/Subscribe 
– Communication stream ID 
– Sequence number (optional) 
• Command/Response 
– Command message/field 
– Response message/field 
– Message ID (optional) 
9
Test Time vs. Packet Interval 
Measured Packet Interval (ms) ~62 sec test 
Mean MPI = 2ms 
Min ~ 1.2 
Max ~ 2.9 
Test Time (s) 
10
Time Plot for Command/Response 
Regular Pattern to Delayed Packets 
Regular Pattern of Minimal Delayed Packets 
11
Command/Response Timing Plots 
• Quick succession of command/response packets 
• Minimal delay in command/response sequence 
• Apparently large delay in a single packet 
• Example: Rockwell tag reads 
Delay Until Next Time Sequence 
Quick Succession Read Commands 
12
BUILDING AN ICS LAB 
13
Building an ICS Lab 
• Goals 
– Develop a portable lab 
– Capable of demonstrating ICS security 
– Use real ICS equipment to analyze ICS protocol performance 
• Purpose 
– Training 
– Demonstration 
– Potential Sales 
14
Control System 
• Equipment 
– PLC 
– Digital & Analog I/O 
– Industrial PC 
– Layer 2+ network switch 
• Protocols 
– EtherNet/IP 
– Modbus/TCP 
• PLC  I/O  Lighted Buttons 
• Buttons have isolated light from NO/NC switch action 
• Ladder logic to light button on push 
15
Performance & Security Testing 
• Denial of service testing 
• Performance analysis 
• Control lights separate from button pushes 
• Spoof button push signals 
• Issue Run/Stop commands to controller 
• Test IP reassignment via industrial protocols 
• Demonstrate pivoting 
16
Questions 
• Contact Me 
– Jim Gilsinn 
– 301-706-9985 or 614-323-2254 
– jim.gilsinn@kenexis.com 
– Twitter – @JimGilsinn 
– LinkedIn – http://www.linkedin.com/in/jimgilsinn/ 
– SlideShare – http://www.slideshare.net/gilsinnj 
17

More Related Content

What's hot

What's hot (20)

Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)
 
Protecting Your DNP3 Networks
Protecting Your DNP3 NetworksProtecting Your DNP3 Networks
Protecting Your DNP3 Networks
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 security
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My Lab
 

Similar to ICS Performance Lab

Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
Gordon Haff
 

Similar to ICS Performance Lab (20)

2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case Studies
 
Embedded
EmbeddedEmbedded
Embedded
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
 
Smart Networks for the Industrial Internet of Things
Smart Networks for the Industrial Internet of ThingsSmart Networks for the Industrial Internet of Things
Smart Networks for the Industrial Internet of Things
 
OPAL-RT Seminar on HYPERSIM
OPAL-RT Seminar on HYPERSIMOPAL-RT Seminar on HYPERSIM
OPAL-RT Seminar on HYPERSIM
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
 
Link labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesLink labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slides
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Grid middleware is easy to install, configure, secure, debug and manage acros...
Grid middleware is easy to install, configure, secure, debug and manage acros...Grid middleware is easy to install, configure, secure, debug and manage acros...
Grid middleware is easy to install, configure, secure, debug and manage acros...
 
iot-component-dimensioning
iot-component-dimensioningiot-component-dimensioning
iot-component-dimensioning
 
Tutorial: Maximizing Performance and Network Utility with a Science DMZ
Tutorial: Maximizing Performance and Network Utility with a Science DMZTutorial: Maximizing Performance and Network Utility with a Science DMZ
Tutorial: Maximizing Performance and Network Utility with a Science DMZ
 
Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges Ahead
 
UGM 2015: X1149 workshop
UGM 2015: X1149 workshopUGM 2015: X1149 workshop
UGM 2015: X1149 workshop
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling tools
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Global C4IR-1 Masterclass Bowyer - McLaren 2017
Global C4IR-1 Masterclass Bowyer - McLaren 2017Global C4IR-1 Masterclass Bowyer - McLaren 2017
Global C4IR-1 Masterclass Bowyer - McLaren 2017
 

More from Jim Gilsinn

Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
 

More from Jim Gilsinn (11)

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

ICS Performance Lab

  • 1. Standards Certification Education & Training Publishing Conferences & Exhibits ICS Performance Lab Jim Gilsinn Kenexis Security
  • 2. Jim Gilsinn - Bio • Senior Investigator, Kenexis Security • ISA-99 Committee (ISA/IEC 62443 Standards) – Co-Chair, ISA99 Committee – Co-Chair, ISA99 WG2, Security Program • 23 years engineering experience – Last 13 doing ICS networks and cyber security • MSEE specializing in control theory 2
  • 3. INTRO TO ICS NETWORK PERFORMANCE 3
  • 4. Industrial Network Types & Metrics: Publish/Subscribe • Publish/subscribe or peer-to-peer communications • Main performance metric: Cyclic frequency variability/jitter • Real-time EtherNet/IP™ uses publish/subscribe – Requested/Accepted Packet Interval (RPI/API) – Measured Packet Interval (MPI) 4
  • 5. Industrial Network Types & Metrics: Publish/Subscribe • Difference between TPub_Com_Init & TSub_Com_Init is network roundtrip delay • TPub_Com_Init, TSub_Com_Init not important • Variability in TPub much more important • Theoretically, TPub doesn’t need to match TSub – In production systems, they are the same Subscriber Publisher TPub_Com_Init TPub_1 TPub_2 TPub_N-1 TPub_N TSub_Com_Init TSub_M . . . 5
  • 6. Performance Testing Methodology: Performance Metrics • Command/response or master/slave communications • Main performance metric: Latency • Large numbers of protocols use this – Most (All?) PC-based server/client protocols – HTTP(S), (S)FTP, etc. – Most industrial protocols – Modbus/TCP, Profinet, Ethercat, etc. 6
  • 7. Industrial Network Types & Metrics: Command/Response • Difference between TCom_Delay & TRes is network roundtrip delay • Latency in TCom & TRes important Commander Responder TRes_1 TRes_2 TCom_Delay_1 TCom_1 TCom_Delay_2 TCom_2 7
  • 8. Isolating Traffic Streams • Isolating traffic streams can be tricky • 10’s – 100’s of traffic streams in production environment • Your Wireshark Fu must be strong! • Usually requires additional post-processing • Multiple streams can exist between same devices 8
  • 9. Isolating Traffic Streams • Traffic pairs – Source IP/MAC address – Destination IP/MAC address – Source TCP/UDP port – Destination TCP/UDP port • Publish/Subscribe – Communication stream ID – Sequence number (optional) • Command/Response – Command message/field – Response message/field – Message ID (optional) 9
  • 10. Test Time vs. Packet Interval Measured Packet Interval (ms) ~62 sec test Mean MPI = 2ms Min ~ 1.2 Max ~ 2.9 Test Time (s) 10
  • 11. Time Plot for Command/Response Regular Pattern to Delayed Packets Regular Pattern of Minimal Delayed Packets 11
  • 12. Command/Response Timing Plots • Quick succession of command/response packets • Minimal delay in command/response sequence • Apparently large delay in a single packet • Example: Rockwell tag reads Delay Until Next Time Sequence Quick Succession Read Commands 12
  • 13. BUILDING AN ICS LAB 13
  • 14. Building an ICS Lab • Goals – Develop a portable lab – Capable of demonstrating ICS security – Use real ICS equipment to analyze ICS protocol performance • Purpose – Training – Demonstration – Potential Sales 14
  • 15. Control System • Equipment – PLC – Digital & Analog I/O – Industrial PC – Layer 2+ network switch • Protocols – EtherNet/IP – Modbus/TCP • PLC  I/O  Lighted Buttons • Buttons have isolated light from NO/NC switch action • Ladder logic to light button on push 15
  • 16. Performance & Security Testing • Denial of service testing • Performance analysis • Control lights separate from button pushes • Spoof button push signals • Issue Run/Stop commands to controller • Test IP reassignment via industrial protocols • Demonstrate pivoting 16
  • 17. Questions • Contact Me – Jim Gilsinn – 301-706-9985 or 614-323-2254 – jim.gilsinn@kenexis.com – Twitter – @JimGilsinn – LinkedIn – http://www.linkedin.com/in/jimgilsinn/ – SlideShare – http://www.slideshare.net/gilsinnj 17