SlideShare a Scribd company logo
1 of 33
The SCISSOR approach to establishing situational
awareness in Industrial Control Systems
Stefano Salsano – University of Rome “Tor Vergata”/CNIT
Christof Brandauer – Salzburg Research
Symposium on Innovative Smart Grid Cybersecurity Solutions
Vienna, 13th and 14th March, 2017
The SCISSOR Project
Security In trusted SCADA and smart-grids
Assystem Engineering and operation services (FR)
AGH University of Science and Technology of Krakow (PL)
UPMC university Pierre and Marie Curie (FR)
SixSq Sàrl (CH)
Consorzio Nazionale Interuniversitario per le Telecomunicazioni (IT)
RADIO6ENSE (IT)
Salzburg Research Forschungsgesellschaft mbH (AT)
Katholieke Universiteit Leuven (BE)
SEA Società Elettrica di Favignana S.p.a. (IT)
3
SCISSOR in a nutshell
A highly scalable ICS/SCADA security monitoring framework
• Integration of a wide range of heterogeneous sensors
• A dynamically adaptable, distributed data aggregation framework
• Advanced detection and correlation models as extensions to a conventional SIEM
• Exploitation of modern cloud-computing concepts
4
Architecture
55
The Favignana Test-bed
6
Installation in Favignana
Inside the Cabin
7
Installation in Favignana
Inside the Cabin
88
Smart Camera
4G Router
Public IP
VPN
Gateway
RFID
Antennas
VPN
Client
RFID
Reader
Network
TAP
SEA
HiperLAN
Cabin
Switch
SCADA
device
SCISSOR testbed
RFID
Sensors
SEA SCADA
Supervisory
Enhanced
SIEM
Threat
detection
modules
Cloud in a boxVPN
Client
Decision &
Analysis Layer
Assystem
SCADA
Supervisory
Assystem
SCADA
PLCs
Datacenter
Cloud
99
SCISSOR testbed
kafka
flume
SIEM
HMI
Bayesian networks
Robust statisticzookeeper
logstash
Paris SCADA
Lab Environment
Favignana
Smart Grid
Cameras
Environment
sensors
Network
monitoring
SCADADevelopers’
console
10
Situational awareness is established in a scalable manner in near real-time
by correlating events coming from very heterogeneous sensors
Situational awareness
1111
Authorized access
1. Door open: somebody inside
2. Badge detection: the system recognizes
the technician
3. The technician turns on the light
4. The technician opens a cabinet
5. The technician get close the exit door and
turns-off the light; the system records the
exit
1212
Un-authorized access and tampering
1. Open door: somebody inside
2. No badge detection: the person is not authorized
and may be classified as intruder
3. The intruder turns on the light for a short time:
maybe uses a torch
4. The intruder opens a cabinet
5. The temperature inside the cabinet increases:
possible manumission
6. The intruder opens the door and exits.
13
Events can be correlated in the SIEM correlation engine
(Decision and analysis layer)
Situational awareness
Events can be “pre-processed” and aggregated to achieve scalability
(local correlation in the Control and coordination layer)
14
Thank you. Questions?
Contacts
Stefano Salsano
University of Rome Tor Vergata / CNIT
stefano.salsano@uniroma2.it
Christof Brandauer
Salzburg Research, Austria
christof.brandauer@salzburgresearch.at
This presentation on slideshare
https://www.slideshare.net/stefanosalsano/the-scissor-approach-to-establishing-situational-
awareness-in-industrial-control-systems
15
The SCISSOR project has received funding from the European Union’s Horizon 2020
research and innovation programme under grant agreement No. 644425 (Research
and Innovation Action).
The information given is the author’s view and does not necessarily represent the view
of the European Commission (EC). No liability is accepted for any use that may be
made of the information contained.
Additional information
17
SCISSOR partners details (1/3)
PRESENTATION OF THE SCISSOR PARTNERS
Partner name & country Partner Type Key roles and technical skills in the project
Assystem AEOS, France Large company - Project coordination
- Data protection
- Id based cryptography
- Identity management & AC
- SCADA systems
- Human-Machine Interface
- Test platform.
AGH University of Science
and Technology of Krakow,
Poland
Academy - Video surveillance & pattern recognition
- Security and cryptography
- Agent-based SCADA & system monitoring
UPMC University Pierre
and Marie Curie, France
Academy - SIEM design
- Decision and probability theory(Dynamic
Bayesian Networks)
- Graphical models
- Scalable big data analytics
18
Partner name & country Partner Type Key roles and technical skills in the project
SixSq Sàrl, Swiss SME - Software integration and testing expertise
- Cloud expertise and technologies
- Automated cloud deployment
- Systems architecture and design
Consorzio Nazionale
Interuniversitario per le
Telecomunicazioni (CNIT),
Italy
Research center - Technical Project coordination
- Overall system architecture
- Traffic Monitoring and stream analytics
- Platform-independent API for monitoring
- Attribute-based encryption
- Smart grid engineering
- HMI usability design and assessment
Radio6ense, Italy SME - Pervasive sensor tags
- Sensor data gathering and filtering
- Mobile data acquisition devices
PRESENTATION OF THE SCISSOR PARTNERS
SCISSOR partners details (2/3)
19
PRESENTATION OF THE SCISSOR PARTNERS
Partner name & country Partner Type Key roles and technical skills in the project
Salzburg Research
Forschungsgesellschaft
mbH, Austria
Research center - Control framework
- Monitoring agents design
- Semantic modelling of events
- Security policies
Katholieke Universiteit
Leuven, Belgium
Academy - Detection of abnormal values in
multivariate, high-dimensional, data sets
- Robust dimensionality reduction
Società Elettrica
Favignana, Italy
Power plant and
smart grid
provider
- Requirements
- Integration with the existing SCADA
- Roll out of the real world trial
SCISSOR partners details (3/3)
20
Wireless passive Sensor Network (PSN) for Environment Monitoring
MONITORING LAYER
Water/Humidity
+ RSSI
temperature
light
NUVLA Box
RFID
reader
LAN
Cable
Electrical
Equipment
stack
Antenna 1 Antenna 2
Events
• Authorized and un-
authorized access
• Equipment overload
• Flooding and Fire
• Human Interaction
with devices
• Device Tampering
camera
21
radioBOARD: Layout
MONITORING LAYER: ENVIRONMENT SENSORS
The board may be configured for different applications and
placements by connecting or disconnecting electrical traces
67mm
28mm
Electromagnetic
Coupler with tuning
elements
Expander: external
sensors + optional
Battery/solar cell
Energy Harvester
with tuning elements
2222
Access
Flooding Humidity and light
Temperature (Harness overload)
Manumission
Events & Sensors
TEST BED: ENVIRONMENT SENSORS
23
Device Placements
reader and antennas
TEST BED: ENVIRONMENT SENSORS
reader
antenna
24
Device Placements
access and light
Light sensor
Door-open
sensor
TEST BED: ENVIRONMENT SENSORS
25
Device Placement
temperature
Transformer overload
(PT-1000)
Cabinet temperature
TEST BED: ENVIRONMENT SENSORS
26
Device Placement
manual tampering
TEST BED: ENVIRONMENT SENSORS
27
SCADA logs
Demo steps
DEMO - INTEGRATION
• Logs were collected from a simulated electrical network SCADA system
• these logs are sent by beats to the Edge Agent
• classical log parser
• transformation and publishing to SMI
@datasource:[/opt/zmq-bash-push]: ./play_scada.sh &
28
Environmental sensors
Demo steps
DEMO - INTEGRATION
• sensor data was measured by the Radio6ense prototype installed in Favignana
• sent to the Edge Agent via ZeroMQ
• parsing of native sensor output
• transformation and publishing to SMI
• dynamic reconfiguration of the Edge Agent filtering
• drop / forward RSSI data
@datasource:[/opt/zmq-bash-push]: ./play_envfile.sh &
29
Network monitoring
Demo steps
DEMO - INTEGRATION
• live integration of a distributed streamon instance
• streamon probe is configured to detect Modbus device scans
• replay of such a previously recorded device scan
• detection by streamon probe, emission of alerts towards to Edge Agent via ZeroMQ
• parsing of the native streamon output
• transformation and publishing to SMI
@streamon:[/home/vagrant/Streamon]: ./start.sh config/modbus_device_scan.xml
@streamon:[/home/vagrant/Streamon]: tcpreplay -i eth1 config/traces/device_scan.pcap
1456245861397357097 00000001 E1 LOW "Modbus Device Scanning Suspected" ip_src=127.0.0.30 ip_dst=127.0.0.5 rate=2.147463 dst_port=502
1456245866421830452 00000001 E2 HIGH "Modbus Device Scanning Detected" ip_src=127.0.0.30 ip_dst=127.0.0.15 rate=3.121049 dst_port=502
1456245866421874608 00000001 E2 HIGH "Modbus Device Scanning Detected" ip_src=127.0.0.30 ip_dst=127.0.0.12 rate=3.526514 dst_port=502
1456245866432175844 00000001 E2 HIGH "Modbus Device Scanning Detected" ip_src=127.0.0.30 ip_dst=127.0.0.17 rate=3.931980 dst_port=502
30
Smart camera
Demo steps
DEMO - INTEGRATION
• Events were produced by a Smart Camera
• analysis of a video presented in the morning session
• these events are sent to the Edge Agent via ZeroMQ
• original timing is preserved
• parsing of the native sensor output
• transformation and publishing to SMI
@datasource:[/opt/zmq-bash-push]: ./play_camfile.sh &
31
SCISSOR's SIEM : Prelude
SIEM Design & Development
Routers
Switches
Mail
Servers
OS
Servers
Snort IDS
Firewalls
Prelude-LML
Prelude-Manager
Prelude-Correlator
Databases
Administration
Console
Apache + Prewikka
IDMEF
Alerts
IDMEF
Alerts
IDMEF
Alerts
Logs
Logs
Logs
Logs
Logs
HTTPS
Other IDS
IDMEF
Alerts
TLS
TLS
TLS
TLS
32
SCADA platform in the Assystem testbed
A Use Case for SCISSOR validation
ASSYSTEM ADVANCED SCADA PLATFORM
A virtualized process
Complex scenarios handling
Direct occurrences of process events
Systemic approach
A generic SCADA based system
PLC based control
Use of industrial protocols
Typical SCADA HMI
Logs generation: process monitoring,
supervision/PLC software, operating systems
Historian
Reporting
Report
33
Distributed Cloud Platform
CLOUD PLATFORM AND INTEGRATION
Seamless integration of a traditional
Datacenter Cloud platform and a
“Cloud-in-a-box” platform

More Related Content

What's hot

Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areasAmulya Anu
 
Border security
Border securityBorder security
Border securityFarah Naaz
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guideSigfox
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-winsAakashkumar276
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingAnita D'Amico
 

What's hot (8)

Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
Border security
Border securityBorder security
Border security
 
ArtOS Long EN
ArtOS Long ENArtOS Long EN
ArtOS Long EN
 
Cloud managed networking
Cloud managed networkingCloud managed networking
Cloud managed networking
 
wins ABHIppt - Copy
wins ABHIppt - Copywins ABHIppt - Copy
wins ABHIppt - Copy
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-wins
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security Sensemaking
 

Viewers also liked

Tuning VIM performance for unikernels
Tuning VIM performance for unikernelsTuning VIM performance for unikernels
Tuning VIM performance for unikernelsStefano Salsano
 
The Next Generation of AI and Deep Learning - GTC17
The Next Generation of AI and Deep Learning - GTC17The Next Generation of AI and Deep Learning - GTC17
The Next Generation of AI and Deep Learning - GTC17NVIDIA
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHubSpot
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...HubSpot
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessHubSpot
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoHubSpot
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...HubSpot
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?HubSpot
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonHubSpot
 
Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...
Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...
Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...Nagios
 
Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...
Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...
Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...Stefano Salsano
 
Input for Cloud and mobile
Input for Cloud and mobileInput for Cloud and mobile
Input for Cloud and mobileStefano Salsano
 
Implications of the Local Context in Global Distance Education by Rye and Sto...
Implications of the Local Context in Global Distance Education by Rye and Sto...Implications of the Local Context in Global Distance Education by Rye and Sto...
Implications of the Local Context in Global Distance Education by Rye and Sto...Maria Lorena Guray
 
Marine boilers
Marine boilersMarine boilers
Marine boilersUMCadets
 

Viewers also liked (17)

Tuning VIM performance for unikernels
Tuning VIM performance for unikernelsTuning VIM performance for unikernels
Tuning VIM performance for unikernels
 
The Next Generation of AI and Deep Learning - GTC17
The Next Generation of AI and Deep Learning - GTC17The Next Generation of AI and Deep Learning - GTC17
The Next Generation of AI and Deep Learning - GTC17
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's Buyer
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your Business
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot Tokyo
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-Thon
 
Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...
Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...
Nagios Conference 2014 - Fernando Covatti - Nagios in Power Transmission Util...
 
Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...
Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...
Superfluid NFV: VMs and Virtual Infrastructure Managers speed-up for instanta...
 
Input for Cloud and mobile
Input for Cloud and mobileInput for Cloud and mobile
Input for Cloud and mobile
 
THERMAL ENGINEERING -2
THERMAL ENGINEERING -2 THERMAL ENGINEERING -2
THERMAL ENGINEERING -2
 
Implications of the Local Context in Global Distance Education by Rye and Sto...
Implications of the Local Context in Global Distance Education by Rye and Sto...Implications of the Local Context in Global Distance Education by Rye and Sto...
Implications of the Local Context in Global Distance Education by Rye and Sto...
 
Calibration Philippines
Calibration PhilippinesCalibration Philippines
Calibration Philippines
 
Hoja producto sat
Hoja producto satHoja producto sat
Hoja producto sat
 
Marine boilers
Marine boilersMarine boilers
Marine boilers
 

Similar to Situational Awareness in ICS with SCISSOR

Ureason jules oudmans
Ureason jules oudmansUreason jules oudmans
Ureason jules oudmansBigDataExpo
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Disha Bedi
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012Charith Perera
 
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET Journal
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection BotIRJET Journal
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningVEDLIoT Project
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)Francesco Flammini
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
 
Wireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionWireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionIJMERJOURNAL
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain IoT Project
 
Real time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelessReal time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelesseSAT Publishing House
 
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfBORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfsunadstar
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 

Similar to Situational Awareness in ICS with SCISSOR (20)

ioT_SDN
ioT_SDN ioT_SDN
ioT_SDN
 
Ureason jules oudmans
Ureason jules oudmansUreason jules oudmans
Ureason jules oudmans
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
A05510105
A05510105A05510105
A05510105
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
 
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
 
thesis
thesisthesis
thesis
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...
 
Wireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionWireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive Detection
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overview
 
Real time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelessReal time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wireless
 
ZONeSEC_newsletter_issue_6
ZONeSEC_newsletter_issue_6ZONeSEC_newsletter_issue_6
ZONeSEC_newsletter_issue_6
 
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfBORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 

More from Stefano Salsano

Dataplane programming with eBPF: architecture and tools
Dataplane programming with eBPF: architecture and toolsDataplane programming with eBPF: architecture and tools
Dataplane programming with eBPF: architecture and toolsStefano Salsano
 
SRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 councilSRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 councilStefano Salsano
 
Ieee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorialIeee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorialStefano Salsano
 
Testbeds IntErconnections with L2 overlays - SRv6 for SFC
Testbeds IntErconnections with L2 overlays - SRv6 for SFCTestbeds IntErconnections with L2 overlays - SRv6 for SFC
Testbeds IntErconnections with L2 overlays - SRv6 for SFCStefano Salsano
 
Energy-efficient Path Allocation Heuristic for Service Function Chaining
Energy-efficient Path Allocation Heuristic for Service Function ChainingEnergy-efficient Path Allocation Heuristic for Service Function Chaining
Energy-efficient Path Allocation Heuristic for Service Function ChainingStefano Salsano
 
Extending OpenVIM R3 to support Unikernels (and Xen)
Extending OpenVIM R3 to support Unikernels (and Xen)Extending OpenVIM R3 to support Unikernels (and Xen)
Extending OpenVIM R3 to support Unikernels (and Xen)Stefano Salsano
 
RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...
RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...
RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...Stefano Salsano
 
Superfluid networking for 5G: vision and state of the art
Superfluid networking for 5G: vision and state of the artSuperfluid networking for 5G: vision and state of the art
Superfluid networking for 5G: vision and state of the artStefano Salsano
 
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Stefano Salsano
 
Extending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support UnikernelsExtending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support UnikernelsStefano Salsano
 
Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...
Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...
Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...Stefano Salsano
 
Deploying of Unikernels in the NFV Infrastructure
Deploying of Unikernels in the NFV InfrastructureDeploying of Unikernels in the NFV Infrastructure
Deploying of Unikernels in the NFV InfrastructureStefano Salsano
 
Generalized Virtual Networking, an enabler for Service Centric Networking and...
Generalized Virtual Networking, an enabler for Service Centric Networking and...Generalized Virtual Networking, an enabler for Service Centric Networking and...
Generalized Virtual Networking, an enabler for Service Centric Networking and...Stefano Salsano
 
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14Stefano Salsano
 

More from Stefano Salsano (15)

Dataplane programming with eBPF: architecture and tools
Dataplane programming with eBPF: architecture and toolsDataplane programming with eBPF: architecture and tools
Dataplane programming with eBPF: architecture and tools
 
SRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 councilSRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 council
 
Ieee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorialIeee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorial
 
hpsr-2020-srv6-tutorial
hpsr-2020-srv6-tutorialhpsr-2020-srv6-tutorial
hpsr-2020-srv6-tutorial
 
Testbeds IntErconnections with L2 overlays - SRv6 for SFC
Testbeds IntErconnections with L2 overlays - SRv6 for SFCTestbeds IntErconnections with L2 overlays - SRv6 for SFC
Testbeds IntErconnections with L2 overlays - SRv6 for SFC
 
Energy-efficient Path Allocation Heuristic for Service Function Chaining
Energy-efficient Path Allocation Heuristic for Service Function ChainingEnergy-efficient Path Allocation Heuristic for Service Function Chaining
Energy-efficient Path Allocation Heuristic for Service Function Chaining
 
Extending OpenVIM R3 to support Unikernels (and Xen)
Extending OpenVIM R3 to support Unikernels (and Xen)Extending OpenVIM R3 to support Unikernels (and Xen)
Extending OpenVIM R3 to support Unikernels (and Xen)
 
RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...
RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...
RDCL 3D, a Model Agnostic Web Framework for the Design and Composition of NFV...
 
Superfluid networking for 5G: vision and state of the art
Superfluid networking for 5G: vision and state of the artSuperfluid networking for 5G: vision and state of the art
Superfluid networking for 5G: vision and state of the art
 
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
 
Extending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support UnikernelsExtending ETSI VNF descriptors and OpenVIM to support Unikernels
Extending ETSI VNF descriptors and OpenVIM to support Unikernels
 
Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...
Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...
Superfluid Orchestration of heterogeneous Reusable Functional Blocks for 5G n...
 
Deploying of Unikernels in the NFV Infrastructure
Deploying of Unikernels in the NFV InfrastructureDeploying of Unikernels in the NFV Infrastructure
Deploying of Unikernels in the NFV Infrastructure
 
Generalized Virtual Networking, an enabler for Service Centric Networking and...
Generalized Virtual Networking, an enabler for Service Centric Networking and...Generalized Virtual Networking, an enabler for Service Centric Networking and...
Generalized Virtual Networking, an enabler for Service Centric Networking and...
 
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
 

Recently uploaded

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 

Recently uploaded (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 

Situational Awareness in ICS with SCISSOR

  • 1. The SCISSOR approach to establishing situational awareness in Industrial Control Systems Stefano Salsano – University of Rome “Tor Vergata”/CNIT Christof Brandauer – Salzburg Research Symposium on Innovative Smart Grid Cybersecurity Solutions Vienna, 13th and 14th March, 2017
  • 2. The SCISSOR Project Security In trusted SCADA and smart-grids Assystem Engineering and operation services (FR) AGH University of Science and Technology of Krakow (PL) UPMC university Pierre and Marie Curie (FR) SixSq Sàrl (CH) Consorzio Nazionale Interuniversitario per le Telecomunicazioni (IT) RADIO6ENSE (IT) Salzburg Research Forschungsgesellschaft mbH (AT) Katholieke Universiteit Leuven (BE) SEA Società Elettrica di Favignana S.p.a. (IT)
  • 3. 3 SCISSOR in a nutshell A highly scalable ICS/SCADA security monitoring framework • Integration of a wide range of heterogeneous sensors • A dynamically adaptable, distributed data aggregation framework • Advanced detection and correlation models as extensions to a conventional SIEM • Exploitation of modern cloud-computing concepts
  • 8. 88 Smart Camera 4G Router Public IP VPN Gateway RFID Antennas VPN Client RFID Reader Network TAP SEA HiperLAN Cabin Switch SCADA device SCISSOR testbed RFID Sensors SEA SCADA Supervisory Enhanced SIEM Threat detection modules Cloud in a boxVPN Client Decision & Analysis Layer Assystem SCADA Supervisory Assystem SCADA PLCs Datacenter Cloud
  • 9. 99 SCISSOR testbed kafka flume SIEM HMI Bayesian networks Robust statisticzookeeper logstash Paris SCADA Lab Environment Favignana Smart Grid Cameras Environment sensors Network monitoring SCADADevelopers’ console
  • 10. 10 Situational awareness is established in a scalable manner in near real-time by correlating events coming from very heterogeneous sensors Situational awareness
  • 11. 1111 Authorized access 1. Door open: somebody inside 2. Badge detection: the system recognizes the technician 3. The technician turns on the light 4. The technician opens a cabinet 5. The technician get close the exit door and turns-off the light; the system records the exit
  • 12. 1212 Un-authorized access and tampering 1. Open door: somebody inside 2. No badge detection: the person is not authorized and may be classified as intruder 3. The intruder turns on the light for a short time: maybe uses a torch 4. The intruder opens a cabinet 5. The temperature inside the cabinet increases: possible manumission 6. The intruder opens the door and exits.
  • 13. 13 Events can be correlated in the SIEM correlation engine (Decision and analysis layer) Situational awareness Events can be “pre-processed” and aggregated to achieve scalability (local correlation in the Control and coordination layer)
  • 14. 14 Thank you. Questions? Contacts Stefano Salsano University of Rome Tor Vergata / CNIT stefano.salsano@uniroma2.it Christof Brandauer Salzburg Research, Austria christof.brandauer@salzburgresearch.at This presentation on slideshare https://www.slideshare.net/stefanosalsano/the-scissor-approach-to-establishing-situational- awareness-in-industrial-control-systems
  • 15. 15 The SCISSOR project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 644425 (Research and Innovation Action). The information given is the author’s view and does not necessarily represent the view of the European Commission (EC). No liability is accepted for any use that may be made of the information contained.
  • 17. 17 SCISSOR partners details (1/3) PRESENTATION OF THE SCISSOR PARTNERS Partner name & country Partner Type Key roles and technical skills in the project Assystem AEOS, France Large company - Project coordination - Data protection - Id based cryptography - Identity management & AC - SCADA systems - Human-Machine Interface - Test platform. AGH University of Science and Technology of Krakow, Poland Academy - Video surveillance & pattern recognition - Security and cryptography - Agent-based SCADA & system monitoring UPMC University Pierre and Marie Curie, France Academy - SIEM design - Decision and probability theory(Dynamic Bayesian Networks) - Graphical models - Scalable big data analytics
  • 18. 18 Partner name & country Partner Type Key roles and technical skills in the project SixSq Sàrl, Swiss SME - Software integration and testing expertise - Cloud expertise and technologies - Automated cloud deployment - Systems architecture and design Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT), Italy Research center - Technical Project coordination - Overall system architecture - Traffic Monitoring and stream analytics - Platform-independent API for monitoring - Attribute-based encryption - Smart grid engineering - HMI usability design and assessment Radio6ense, Italy SME - Pervasive sensor tags - Sensor data gathering and filtering - Mobile data acquisition devices PRESENTATION OF THE SCISSOR PARTNERS SCISSOR partners details (2/3)
  • 19. 19 PRESENTATION OF THE SCISSOR PARTNERS Partner name & country Partner Type Key roles and technical skills in the project Salzburg Research Forschungsgesellschaft mbH, Austria Research center - Control framework - Monitoring agents design - Semantic modelling of events - Security policies Katholieke Universiteit Leuven, Belgium Academy - Detection of abnormal values in multivariate, high-dimensional, data sets - Robust dimensionality reduction Società Elettrica Favignana, Italy Power plant and smart grid provider - Requirements - Integration with the existing SCADA - Roll out of the real world trial SCISSOR partners details (3/3)
  • 20. 20 Wireless passive Sensor Network (PSN) for Environment Monitoring MONITORING LAYER Water/Humidity + RSSI temperature light NUVLA Box RFID reader LAN Cable Electrical Equipment stack Antenna 1 Antenna 2 Events • Authorized and un- authorized access • Equipment overload • Flooding and Fire • Human Interaction with devices • Device Tampering camera
  • 21. 21 radioBOARD: Layout MONITORING LAYER: ENVIRONMENT SENSORS The board may be configured for different applications and placements by connecting or disconnecting electrical traces 67mm 28mm Electromagnetic Coupler with tuning elements Expander: external sensors + optional Battery/solar cell Energy Harvester with tuning elements
  • 22. 2222 Access Flooding Humidity and light Temperature (Harness overload) Manumission Events & Sensors TEST BED: ENVIRONMENT SENSORS
  • 23. 23 Device Placements reader and antennas TEST BED: ENVIRONMENT SENSORS reader antenna
  • 24. 24 Device Placements access and light Light sensor Door-open sensor TEST BED: ENVIRONMENT SENSORS
  • 26. 26 Device Placement manual tampering TEST BED: ENVIRONMENT SENSORS
  • 27. 27 SCADA logs Demo steps DEMO - INTEGRATION • Logs were collected from a simulated electrical network SCADA system • these logs are sent by beats to the Edge Agent • classical log parser • transformation and publishing to SMI @datasource:[/opt/zmq-bash-push]: ./play_scada.sh &
  • 28. 28 Environmental sensors Demo steps DEMO - INTEGRATION • sensor data was measured by the Radio6ense prototype installed in Favignana • sent to the Edge Agent via ZeroMQ • parsing of native sensor output • transformation and publishing to SMI • dynamic reconfiguration of the Edge Agent filtering • drop / forward RSSI data @datasource:[/opt/zmq-bash-push]: ./play_envfile.sh &
  • 29. 29 Network monitoring Demo steps DEMO - INTEGRATION • live integration of a distributed streamon instance • streamon probe is configured to detect Modbus device scans • replay of such a previously recorded device scan • detection by streamon probe, emission of alerts towards to Edge Agent via ZeroMQ • parsing of the native streamon output • transformation and publishing to SMI @streamon:[/home/vagrant/Streamon]: ./start.sh config/modbus_device_scan.xml @streamon:[/home/vagrant/Streamon]: tcpreplay -i eth1 config/traces/device_scan.pcap 1456245861397357097 00000001 E1 LOW "Modbus Device Scanning Suspected" ip_src=127.0.0.30 ip_dst=127.0.0.5 rate=2.147463 dst_port=502 1456245866421830452 00000001 E2 HIGH "Modbus Device Scanning Detected" ip_src=127.0.0.30 ip_dst=127.0.0.15 rate=3.121049 dst_port=502 1456245866421874608 00000001 E2 HIGH "Modbus Device Scanning Detected" ip_src=127.0.0.30 ip_dst=127.0.0.12 rate=3.526514 dst_port=502 1456245866432175844 00000001 E2 HIGH "Modbus Device Scanning Detected" ip_src=127.0.0.30 ip_dst=127.0.0.17 rate=3.931980 dst_port=502
  • 30. 30 Smart camera Demo steps DEMO - INTEGRATION • Events were produced by a Smart Camera • analysis of a video presented in the morning session • these events are sent to the Edge Agent via ZeroMQ • original timing is preserved • parsing of the native sensor output • transformation and publishing to SMI @datasource:[/opt/zmq-bash-push]: ./play_camfile.sh &
  • 31. 31 SCISSOR's SIEM : Prelude SIEM Design & Development Routers Switches Mail Servers OS Servers Snort IDS Firewalls Prelude-LML Prelude-Manager Prelude-Correlator Databases Administration Console Apache + Prewikka IDMEF Alerts IDMEF Alerts IDMEF Alerts Logs Logs Logs Logs Logs HTTPS Other IDS IDMEF Alerts TLS TLS TLS TLS
  • 32. 32 SCADA platform in the Assystem testbed A Use Case for SCISSOR validation ASSYSTEM ADVANCED SCADA PLATFORM A virtualized process Complex scenarios handling Direct occurrences of process events Systemic approach A generic SCADA based system PLC based control Use of industrial protocols Typical SCADA HMI Logs generation: process monitoring, supervision/PLC software, operating systems Historian Reporting Report
  • 33. 33 Distributed Cloud Platform CLOUD PLATFORM AND INTEGRATION Seamless integration of a traditional Datacenter Cloud platform and a “Cloud-in-a-box” platform