Practical SIEM Tools for SCADA Environment
Total Page:16
File Type:pdf, Size:1020Kb
Iowa State University Capstones, Theses and Creative Components Dissertations Fall 2018 Practical SIEM tools for SCADA environment Steven Perez Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/creativecomponents Part of the Power and Energy Commons Recommended Citation Perez, Steven, "Practical SIEM tools for SCADA environment" (2018). Creative Components. 93. https://lib.dr.iastate.edu/creativecomponents/93 This Creative Component is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Creative Components by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Practical SIEM tools for SCADA environment By Steven Perez MASTER OF SCIENCE Program of Study Committee: Manimaran Govindarasu, Major Professor Iowa State University Ames, IA 2018 TABLE OF CONTENTS LIST OF FIGURES ....................................................................................................... iii ABSTRACT....................................................................................................................iv CHAPTER 1 INTRODUCTION ......................................................................................1 1.1 What is SIEM? .........................................................................................................1 1.2 Capabilities and challenges of SIEM solutions…………………………………………2 CHAPTER 2 SECURITY ONION....................................................................................3 2.1 What is Security Onion? ...........................................................................................3 2.2 Security Onion Tools.................................................................................................4 CHAPTER 3 IMPLEMENTATION...................................................................................5 3.1 Topology....................................................................................................................5 3.2 Installing Security Onion.............................................................................................6 CHAPTER 4 DNP3 AND INTRUSION DETECTION………………………….……………8 4.1 DNP3 Protocol............................................................................................................8 4.2 Intrusion Detection......................................................................................................9 4.3 Snort..........................................................................................................................10 4.3.1 Writing Snort Rules in Sguil ........................................................................11 4.3.2 How a Rules is created................................................................................11 4.3.2 Attacks In SCADA……………………… ......................................................11 CHAPTER 5 EXPERIMENT AND EVALUATION………………………………………….12 CHAPTER 6 CONCLUSION...........................................................................................15 REFERENCES............................................................. ..................................................16 ii LIST OF FIGURES Figure 1 SIEM typical functions.......................................................................................2 Figure 2 Experiment Topology.........................................................................................6 Figure 3 Kibana Dashboard.............................................................................................7 Figure 4 Squert View.......................................................................................................8 Figure 5 DNP Packet Structure........................................................................................9 Figure 6 Function Code……….......................................................................................10 Figure 7 Sguil Window...................................................................................................11 Figure 8 Snort rule.........................................................................................................13 Figure 9 Wireshark…………….......................................................................................13 Figure 10 Control Code for Tripping..............................................................................14 Figure 11 Nmap alert in Sguil........................................................................................17 Figure 12 Unauthorized Trip alert in Sguil.....................................................................13 Figure 13 Unauthorized Trip alert in Kibana..................................................................13 Figure 14 Unauthorized Trip alert in Squert...................................................................14 Figure 15 Anomaly Trip alert in Squert……...................................................................13 Figure 16 Unauthorized Trip alert in Kibana..................................................................13 Figure 17 Timing of Rules..............................................................................................13 Figure 18 Anomaly Trip alert in Squert..........................................................................14 iii Abstract Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) are increasingly under attack in recent years. Every year we developed more secure architectures. Security Information and Event Management (SIEM) systems are getting widely popular nowadays for different sectors of the industry but few for ICS/SCADA systems. We are lacking monitoring and alerting systems in the Power Grid. In today world business in different sectors of the industry use common defenses such as firewalls, two factor authentication, egress filtering and others to try to prevent attackers from getting into the network. While these defenses provide some security for known attacks other kinds of attacks are not detected. Anomaly behavior is difficult to detect and the previous defenses are not helping once an attacker is inside the network. Typical SCADA systems lack monitoring systems in the OT network as is not part of the IT network. This paper provides an easy way to step up a monitoring and alerting system for substation in the OT network. Security onion is a free open source software that is deployed as a NIDS (Network Intrusion Detection System) on the OT network. The experiment was conducted using the Power Grid Lab in Iowa State using Siemens Relays. In this paper, we provide a solution that incorporates a SIEM solution using well known free open source tools on the Security Onion Linux Distribution for monitoring and logging. We first understand why a SIEM solution is a good choice to be implemented in a ICS. Its advantages and capabilities and other cases where a SIEM solution have proved to help security. Later we also provide with a three-layer detection system for intrusion for Substations based on anomaly and signature detection using Snort as well as implementation, evaluation and results. iv CHAPTER 1 INTRODUCTION 1.1 What is SIEM? SIEM products are the merging of two different approaches of security; SIM (Security Information Management) and SEM (Security Event Management). One key advantage of SIEM products from traditional log management software is the ability of alerting and event correlation. Some of the reasons why SIEM products were developed are because of Compliance, Insider Treats, Incidents are Costly, Complex Problems needs multifaceted solution and Hard to measure cost and benefit. As with any new solution SIEM also has some challenges to address. False positives are very typical and can take a lot of time to search an analyze using resources. Lack of cooperation from the organization itself can prove costly when logging data. ICS systems are more prone to cyber-attacks since some of their communication protocols were not created with security in mind. DNP3 is one of the protocols more widely using in today SCADA systems. More detail information about DNP3 will be discussed in detail later. SIEM solutions gives the user the power to analyze the traffic and look for event in real time. Figure 1 show some of the typical features of a SIEM solution. Our solution later discuss on this paper will grab the main functions and adding intrusion detection to the mix to have a complete model. 1 Figure 1 SIEM typical functions SIEM solutions at its core provides with: 1. Event and Log Collection 2. Event and Flow Correlation 3. Reporting and Alerting 4. Log Management Some of the benefits the SIEM provides provide are: 1. Centralized Analysis and reporting 2. Detection of Attacks 3. Real time Monitoring of the network 4. Fast incident handling 1.2 Capabilities and Challenges of SIEM solutions Security Management is an important critical issue in the IT industry. SIEM has provided much needed capabilities to help provided automated reporting for compliance and centralized reporting. In one paper [1], it mentions behavior profiling which is when abnormal conditions are well defined, it can lead to define rules for a set of conditions. 2 Another capability is data and user monitoring, application monitoring and analytics. SIEM solutions have also face challenges. One of these challenges that the system cannot pick up or detect an