SlideShare a Scribd company logo
1 of 34
A A K A N K S H A D H I D H I
4 t h S E M E S T E R E L E C T R O N I C S D E S I G N
UNDER THE GUIDENCE OF -
MR.RAVI SHANKAR(SAIL) AND MR.YASHPAL GOGIA(NIELIT)
SESSION : 2014-
2015
NEED OF THE PROJECT
 Steel Authority of India(SAIL) has its own
private network connecting different
production units located at
Durgapur,Bokaro,Bhilai etc and corporate
offices at Delhi, Kolkata .
 Some of the links in the private Network are
also connected to open and larger network
such as INTERNET to communicate with
suppliers and customers .
 Therefore the internal network of SAIL is
private as well as public network.
PRIVATE NETWORK
DURGAPUR BHILAIROURKELAIISCO BOKARO
SUPLLIERS
CONSUMERS
OUTSIDE
WORLD
CORPORATE
OFFICE
(DELHI)
CORPORATE
OFFICE
(KOLKATA)
INTERNET
ORDERS
D
I
R
E
C
T
S
D
I
R
E
C
T
S
PRODUCTION UNITS
NEED OF THE PROJECT
 Since the private network of SAIL is indirectly connected to
public network through internet.
 Therefore PLC’s working on plants are also indirectly
connected to the outside world.
 PLC’s are connected to an OPC server and OPC Servers are
based on COM/DCOM Technology.Therefore it is not possible
to route it through Firewall.
 Since the data cannot be accessed from OPC server through
firewall and removing the firewall makes the plant network
insecure and prone to viruses like STUXNET.
 Additionally it is not possible to communicate from a platform
other than Windows like Linux.
OPC
CLIENT
(CORPORATE
OFFICE)
WINDOWS
PC
FIREWALL
WINDOWS
PC
DCOM
DCOM
OPC
(DATA SERVER)
PLC
HMI DCS
FIREWALL IS A SYATEM THAT
SECURES THE NETWORK
SHEILDING IT FROM
AUTHORIZED USERS
What is OPC
 OLE for process control(OPC) is a software
interface technology used to facilitate the transfer
of data between industrial control system,
Human machine Interfaces(HMI) and enterprise
system such as Historical databases.
 . OPC is based on Microsoft Distributed
component Object Model technology. And DCOM
doesn’t allows data to be accessed through
Firewall.
How OPC WORKS
 An OPC Server is a Software
application that typically gathers
information from devices(such
as PLC,DCS or SCADA
controllers) using these device’s
native protocols(such as
MODBUS,PROFIBUS).
 The server then provides access
to data via COM Objects and
method calls, allowing multiple
OPC clients to indirectly read
and write to the field Device via
OPC servers
What is COM/DCOM
 COM is a Binary interface standard for
software components introduced by
Microsoft in 1993.
 It is a set of binary standard and
network standard that allows any
software to communicate with each
other regardless of the operating
system, hardware and programming
language.
DCOM
 DCOM is a Model as COM but is
specially designed for distributed
application.
 DCOM is a proprietary Microsoft
technology for communication among
software components Distributed across
Networked Computers.
 It tries to hide the difference between
invoking Local(on the same computer)
and remote interfaces(on two different
computers)
What is COM/DCOM
 Each DCOM object has multiple
interface.
 When application access an Object they
receive an indirect pointer to interface
Functions(such as read, write control to
plc etc).
 Pointer has information on the location of
an Object.
 After receiving pointer ,the calling
application doesn’t need to know where
the object is or how it does its job since
the pointer directs the calling application
to it.
WHAT IS STUXNET VIRUS
 STUXNET is a computer worm that was
discovered in June 2010.
 It was first speculated in September 2010 by
researcher Ralph Langner.
 It targeted Iranian nuclear facilities including
Busnehr Nuclear Power plant or the Natanz
Nuclear Facility.
 The Virus may have shut down 1000 centrifuges,
gas pipelines.
 It has an array of capabilities to turn off pressure
inside nuclear reactor or switch off gas pipelines
etc.
HOW STUXNET ATTACKS PLC
 STUXNET functions by targeting
machines using the Microsoft windows
operating system and Network, then
seeking out Siemens step7 software.
 The worm then propagates across the
Network, scanning for Siemens step7
software on computers controlling a
PLC.
 In the absence of PLC & SCADA
software,stuxnet becomes dormant
inside the computer.
How STUXNET ATTACKS PLC
CONTINUED….
 If the PLC or SCADA software is found
STUXNET introduces the infected commands to
the PLC and Siemens step7 software, modifying
the codes and giving unexpected commands to
the PLC.
 It returns a loop of normal operation values to the
system operators operating PLC while
introducing unexpected commands to the PLC.
 It periodically modifies the frequency from low to
high and vice-versa thus affecting the normal
operation of connected motors and centrifuges
causing them to shut down and leading to
permanent damage of the machine
SOLUTION
 Thus the use of OPC connectivity in Control systems
and servers leads to DCOM based Protocol
attacks(Such as STUXNET).
 Therefore in my project I will migrating OPC
Applications from DCOM based Architecture to
potentially more secure .NET Based Architecture or
Service Oriented Architecture in which communication
will be through Firewalls.
 Web services are an implementation of Service
Oriented Architecture(SOA).
 Web Services require the communication protocol to
work through firewall.
What is SOA
 Service-oriented architecture (SOA) is an
evolution of distributed computing based on
the request/reply design pattern.
 Service-oriented architecture (SOA) is an
approach used to create
an architecture based upon the use of
services.
 Services (such as Web services) carry out
some small function, such as producing data,
validating a customer, or providing simple
What is SOA(Service Oriented Architecture)
 Service-oriented architecture (SOA) is an
evolution of distributed computing based on the
request/reply design pattern
 In Service Oriented Architecture we have a two
Software that communicate with each other i.e.
Service Provider ,Service Registry and Service
Consumer software
SERVICE
REGISTRY
SERVICE
CONSUMER
SERVICE
PROVIDER
OPC SERVER
(DATA SERVER)
CORPORATE OFFICE
(DATA CLIENT)
FIREWALL
PLC
GATEWA
Y
COMMUNICATION
THROUGH FIREWALL IN
What is SOA(Service Oriented
Architecture)
 Service Provider-Service Provider is the
owner of web services. It holds the
implementation of web services application
and makes it accessible via web.
 Service Consumer- Service consumer
represents a human or a software agent that
intends to make use of some service to
achieve certain goal.
 Service Registry-Service registry is a
searchable registry providing service
descriptions.
HOW SOA works
 Service Provider publishes its service
description in a certain directory called
Service Registry.
 Service Registry implements a set of
mechanism to facilitate service providers to
publish their service description. It also
enables service clients to enable services
and get the binding information.
 Service Consumer software make queries
against this service registry to find out what
services are available and how to
communicate with the provider
SERVICE REGISTRY
SERVICE
CONSUMERSERVICE
PROVIDER
PUBLISHES
FIND
BIND
INVOKE
SERVICE ORIENTED ARCHITECTURE
How SOA works
 Service is a well defined function that does
not depend upon the state of other services.
 Consumer software needs to know how to
call a service and what to expect in response.
 SOA is a solution for making to software
communicate with each other.
 Web services is an implementation of service
oriented architecture.
How SOA works
 Service Description is written in special
language called web service description
language(WSDL).
 Service Description has to be placed in a
service repository in this industry
accepted language .
 Service provider communicate to service
registry using SOAP protocol.
 SOAP is a Industry standard protocol to
communicate to the service registry.
SERVICE REGISTRY
()
SERVICE
CONSUMERSERVICE
PROVIDER
SOA
P
SOA
P
SOA
P
WSDL
SOA
P
XML
SERVICE REQUEST
SERVICE REQUEST
XML
XML
XML
SERVICE ORIENTED ARCHITECTURE
Service Registry
facilitate service
providers to publish
their service
description
Service
registry also
enables
Service
consumers to
find services
and get the
binding
information
How SOA works
 Service consumer also performs queries
against service registry using to find out how
to communicate with a services and what
services are available using SOAP protocol.
 Consumer formulates its message that is to
be send to the provider software based on
service description using tag based language
XML.
 The response generated by the service
provider in XML language is also based on
the specification defined in service
description using WSDL.
WHAT IS XML
 XML stands for Extensible mark up
language.
 XML provides structure to the data.
 XML is used for storing and
transporting data.
Introduction to Web services
 Web services may be deployed at
different organization across the
internet which requires the
communication protocol to work
through firewalls.
 Interaction with Web services that sit
behind firewalls requires messaging
model(SOAP) to be combined with
HTTP.
Web services continued…
 Web service is defined as a software
system designed to support
interoperable machine to machine
interaction over a Network. It has an
interface described in machine
processable format(specifically WSDL).
 A web service is a unit of application
logic providing data and services to other
applications. Application access web
services via web protocols and data
formats such as Http,xml,soap with no
need to worry about How each service is
implemented
Interaction Between service provider,
service consumer and service registry
 Service Publication-Service publication is
to make the service available in the registry
so that service client can find it.
 Service Lookup- Service lookup is to
query the registry for certain type of service
and then retrieve the service description.
 Service Binding- Service Binding is to
locate contact and invoke service based on
the binding information in the service
Description
Service Provider Architecture
 Service Provider contain two Entry
point socket.
 Entry point socket1-From Entry point
socket1 it publish its service to the
service registry.
 Entry point socket 2- It used for
binding service provider and service
consumer .
 Service provider also had several
exposed interfaces for data
access(like read ,write and control).
ENTRY
POINT1
(SOCKE
T)1
ENTRY
POINT
(SOCKET
2)
TO PUBLISH
SERVICE
TO BIND
SERVICE
INTERFACE1
INTERFACE2
INTERFACE3
READ
WRITE
CONTROL
S
E
R
V
I
C
E
SERVICE
REGISTRY
SERVICE
CONSUMER
SERVICE PROVIDER
ARCHITECTURE
DESIGN
PUBLISH
FIND
P
R
O
V
I
D
E
R
Service Registry Architecture
 Service Registry also had two Entry point socket.
 Entry point socket1- It is used for continue listening for
published services from service provider.
 Entry point socket 2- It used by service consumer to find
published services.
 Service Registry has several exposed interfaces to add,
update and delete Published services.
 Service Registry database used to store published service
metadata information(binding , endpoint address etc).
 Service registry Database schema defines the structure of
database.
SERVICE
REGISTRY
DATABASE
SERVICE
DATABASE
SCHEMA
EXPOSED
INTERFACE
ADD
REMOVE
UPDATE
REGISTRY
INTERFACE
REGISTRY
SERVICE
Consumer
Interface
Consumer
service
Maintenance
Screen
Registry
Maintenance
ENTRY
POINT 1
ENTRY
POINT 2
SERVICE
REGISTRY
ARCHITECTURE
FIND
SERVIC
E
PROVIDER
INTERFACE
PROVIDER
SERVICE
PUBLIS
H
SERVIC
E
SERVICE REGISTRY
SERVICE
CONSUMERSERVICE
PROVIDER
PUBLISHES
FIND
BIND
INVOKE
SERVICE ORIENTED ARCHITECTURE
Extensions
 Service Oriented Architecture
Gateway is not limited only for OPC
client and servers.
 It can be used for any control system
application by placing that application
in place of OPC clients and servers.

More Related Content

Similar to Presentation1REVIEW

SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentalsabhi1112
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architectureYisal Khan
 
Unit 3-SOA Technologies
Unit 3-SOA TechnologiesUnit 3-SOA Technologies
Unit 3-SOA Technologiesssuser3a47cb
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacksiosrjce
 
WebService-Java
WebService-JavaWebService-Java
WebService-Javahalwal
 
Web programming
Web programmingWeb programming
Web programmingsowfi
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxssuser403d87
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architectureAmit rai Raaz
 
Service Oriented Architecture Updated Luqman
Service Oriented Architecture Updated  LuqmanService Oriented Architecture Updated  Luqman
Service Oriented Architecture Updated Luqmanguesteb791b
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecturerahmed_sct
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservicesGagandeep Singh
 

Similar to Presentation1REVIEW (20)

SOA & WCF
SOA & WCFSOA & WCF
SOA & WCF
 
SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentals
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
Unit 3-SOA Technologies
Unit 3-SOA TechnologiesUnit 3-SOA Technologies
Unit 3-SOA Technologies
 
Overview of web services
Overview of web servicesOverview of web services
Overview of web services
 
6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF
 
Java web services
Java web servicesJava web services
Java web services
 
F017353539
F017353539F017353539
F017353539
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
 
WebService-Java
WebService-JavaWebService-Java
WebService-Java
 
Web programming
Web programmingWeb programming
Web programming
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
 
Web services
Web servicesWeb services
Web services
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architecture
 
Service Oriented Architecture Updated Luqman
Service Oriented Architecture Updated  LuqmanService Oriented Architecture Updated  Luqman
Service Oriented Architecture Updated Luqman
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecture
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservices
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 

Presentation1REVIEW

  • 1. A A K A N K S H A D H I D H I 4 t h S E M E S T E R E L E C T R O N I C S D E S I G N UNDER THE GUIDENCE OF - MR.RAVI SHANKAR(SAIL) AND MR.YASHPAL GOGIA(NIELIT) SESSION : 2014- 2015
  • 2. NEED OF THE PROJECT  Steel Authority of India(SAIL) has its own private network connecting different production units located at Durgapur,Bokaro,Bhilai etc and corporate offices at Delhi, Kolkata .  Some of the links in the private Network are also connected to open and larger network such as INTERNET to communicate with suppliers and customers .  Therefore the internal network of SAIL is private as well as public network.
  • 3. PRIVATE NETWORK DURGAPUR BHILAIROURKELAIISCO BOKARO SUPLLIERS CONSUMERS OUTSIDE WORLD CORPORATE OFFICE (DELHI) CORPORATE OFFICE (KOLKATA) INTERNET ORDERS D I R E C T S D I R E C T S PRODUCTION UNITS
  • 4. NEED OF THE PROJECT  Since the private network of SAIL is indirectly connected to public network through internet.  Therefore PLC’s working on plants are also indirectly connected to the outside world.  PLC’s are connected to an OPC server and OPC Servers are based on COM/DCOM Technology.Therefore it is not possible to route it through Firewall.  Since the data cannot be accessed from OPC server through firewall and removing the firewall makes the plant network insecure and prone to viruses like STUXNET.  Additionally it is not possible to communicate from a platform other than Windows like Linux.
  • 5. OPC CLIENT (CORPORATE OFFICE) WINDOWS PC FIREWALL WINDOWS PC DCOM DCOM OPC (DATA SERVER) PLC HMI DCS FIREWALL IS A SYATEM THAT SECURES THE NETWORK SHEILDING IT FROM AUTHORIZED USERS
  • 6. What is OPC  OLE for process control(OPC) is a software interface technology used to facilitate the transfer of data between industrial control system, Human machine Interfaces(HMI) and enterprise system such as Historical databases.  . OPC is based on Microsoft Distributed component Object Model technology. And DCOM doesn’t allows data to be accessed through Firewall.
  • 7. How OPC WORKS  An OPC Server is a Software application that typically gathers information from devices(such as PLC,DCS or SCADA controllers) using these device’s native protocols(such as MODBUS,PROFIBUS).  The server then provides access to data via COM Objects and method calls, allowing multiple OPC clients to indirectly read and write to the field Device via OPC servers
  • 8. What is COM/DCOM  COM is a Binary interface standard for software components introduced by Microsoft in 1993.  It is a set of binary standard and network standard that allows any software to communicate with each other regardless of the operating system, hardware and programming language.
  • 9. DCOM  DCOM is a Model as COM but is specially designed for distributed application.  DCOM is a proprietary Microsoft technology for communication among software components Distributed across Networked Computers.  It tries to hide the difference between invoking Local(on the same computer) and remote interfaces(on two different computers)
  • 10. What is COM/DCOM  Each DCOM object has multiple interface.  When application access an Object they receive an indirect pointer to interface Functions(such as read, write control to plc etc).  Pointer has information on the location of an Object.  After receiving pointer ,the calling application doesn’t need to know where the object is or how it does its job since the pointer directs the calling application to it.
  • 11. WHAT IS STUXNET VIRUS  STUXNET is a computer worm that was discovered in June 2010.  It was first speculated in September 2010 by researcher Ralph Langner.  It targeted Iranian nuclear facilities including Busnehr Nuclear Power plant or the Natanz Nuclear Facility.  The Virus may have shut down 1000 centrifuges, gas pipelines.  It has an array of capabilities to turn off pressure inside nuclear reactor or switch off gas pipelines etc.
  • 12. HOW STUXNET ATTACKS PLC  STUXNET functions by targeting machines using the Microsoft windows operating system and Network, then seeking out Siemens step7 software.  The worm then propagates across the Network, scanning for Siemens step7 software on computers controlling a PLC.  In the absence of PLC & SCADA software,stuxnet becomes dormant inside the computer.
  • 13. How STUXNET ATTACKS PLC CONTINUED….  If the PLC or SCADA software is found STUXNET introduces the infected commands to the PLC and Siemens step7 software, modifying the codes and giving unexpected commands to the PLC.  It returns a loop of normal operation values to the system operators operating PLC while introducing unexpected commands to the PLC.  It periodically modifies the frequency from low to high and vice-versa thus affecting the normal operation of connected motors and centrifuges causing them to shut down and leading to permanent damage of the machine
  • 14. SOLUTION  Thus the use of OPC connectivity in Control systems and servers leads to DCOM based Protocol attacks(Such as STUXNET).  Therefore in my project I will migrating OPC Applications from DCOM based Architecture to potentially more secure .NET Based Architecture or Service Oriented Architecture in which communication will be through Firewalls.  Web services are an implementation of Service Oriented Architecture(SOA).  Web Services require the communication protocol to work through firewall.
  • 15. What is SOA  Service-oriented architecture (SOA) is an evolution of distributed computing based on the request/reply design pattern.  Service-oriented architecture (SOA) is an approach used to create an architecture based upon the use of services.  Services (such as Web services) carry out some small function, such as producing data, validating a customer, or providing simple
  • 16. What is SOA(Service Oriented Architecture)  Service-oriented architecture (SOA) is an evolution of distributed computing based on the request/reply design pattern  In Service Oriented Architecture we have a two Software that communicate with each other i.e. Service Provider ,Service Registry and Service Consumer software
  • 17. SERVICE REGISTRY SERVICE CONSUMER SERVICE PROVIDER OPC SERVER (DATA SERVER) CORPORATE OFFICE (DATA CLIENT) FIREWALL PLC GATEWA Y COMMUNICATION THROUGH FIREWALL IN
  • 18. What is SOA(Service Oriented Architecture)  Service Provider-Service Provider is the owner of web services. It holds the implementation of web services application and makes it accessible via web.  Service Consumer- Service consumer represents a human or a software agent that intends to make use of some service to achieve certain goal.  Service Registry-Service registry is a searchable registry providing service descriptions.
  • 19. HOW SOA works  Service Provider publishes its service description in a certain directory called Service Registry.  Service Registry implements a set of mechanism to facilitate service providers to publish their service description. It also enables service clients to enable services and get the binding information.  Service Consumer software make queries against this service registry to find out what services are available and how to communicate with the provider
  • 21. How SOA works  Service is a well defined function that does not depend upon the state of other services.  Consumer software needs to know how to call a service and what to expect in response.  SOA is a solution for making to software communicate with each other.  Web services is an implementation of service oriented architecture.
  • 22. How SOA works  Service Description is written in special language called web service description language(WSDL).  Service Description has to be placed in a service repository in this industry accepted language .  Service provider communicate to service registry using SOAP protocol.  SOAP is a Industry standard protocol to communicate to the service registry.
  • 23. SERVICE REGISTRY () SERVICE CONSUMERSERVICE PROVIDER SOA P SOA P SOA P WSDL SOA P XML SERVICE REQUEST SERVICE REQUEST XML XML XML SERVICE ORIENTED ARCHITECTURE Service Registry facilitate service providers to publish their service description Service registry also enables Service consumers to find services and get the binding information
  • 24. How SOA works  Service consumer also performs queries against service registry using to find out how to communicate with a services and what services are available using SOAP protocol.  Consumer formulates its message that is to be send to the provider software based on service description using tag based language XML.  The response generated by the service provider in XML language is also based on the specification defined in service description using WSDL.
  • 25. WHAT IS XML  XML stands for Extensible mark up language.  XML provides structure to the data.  XML is used for storing and transporting data.
  • 26. Introduction to Web services  Web services may be deployed at different organization across the internet which requires the communication protocol to work through firewalls.  Interaction with Web services that sit behind firewalls requires messaging model(SOAP) to be combined with HTTP.
  • 27. Web services continued…  Web service is defined as a software system designed to support interoperable machine to machine interaction over a Network. It has an interface described in machine processable format(specifically WSDL).  A web service is a unit of application logic providing data and services to other applications. Application access web services via web protocols and data formats such as Http,xml,soap with no need to worry about How each service is implemented
  • 28. Interaction Between service provider, service consumer and service registry  Service Publication-Service publication is to make the service available in the registry so that service client can find it.  Service Lookup- Service lookup is to query the registry for certain type of service and then retrieve the service description.  Service Binding- Service Binding is to locate contact and invoke service based on the binding information in the service Description
  • 29. Service Provider Architecture  Service Provider contain two Entry point socket.  Entry point socket1-From Entry point socket1 it publish its service to the service registry.  Entry point socket 2- It used for binding service provider and service consumer .  Service provider also had several exposed interfaces for data access(like read ,write and control).
  • 31. Service Registry Architecture  Service Registry also had two Entry point socket.  Entry point socket1- It is used for continue listening for published services from service provider.  Entry point socket 2- It used by service consumer to find published services.  Service Registry has several exposed interfaces to add, update and delete Published services.  Service Registry database used to store published service metadata information(binding , endpoint address etc).  Service registry Database schema defines the structure of database.
  • 34. Extensions  Service Oriented Architecture Gateway is not limited only for OPC client and servers.  It can be used for any control system application by placing that application in place of OPC clients and servers.