Download Attack to the Siemens PLC with Framework

Download Attack to the Siemens PLC with Framework

An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems Taejun Choi Guangdong Bai Ryan K L Ko The University of Queensland The University of Queensland The University of Queensland Brisbane, Australia Brisbane, Australia Brisbane, Australia [email protected] [email protected] [email protected] Naipeng Dong Wenlu Zhang Shunyao Wang The University of Queensland The University of Queensland The University of Queensland Brisbane, Australia Brisbane, Australia Brisbane, Australia [email protected] [email protected] [email protected] Abstract—Industrial control systems (ICS) of critical infras- age Internet connectivity. As a result, several ICS equipment tructure are increasingly connected to the Internet for remote which were previously not designed for the threat landscape site management at scale. However, cyber attacks against ICS of the Internet are now increasingly exposed to risks of cyber – especially at the communication channels between human- machine interface (HMIs) and programmable logic controllers attacks. (PLCs) – are increasing at a rate which outstrips the rate of These risks affect business continuity requirements and may mitigation. have safety implications. Since they were not designed or In this paper, we introduce a vendor-agnostic analytics frame- deployed with Internet connectivity in the first place, legacy work which allows security researchers to analyse attacks against and deployed ICS are mostly not ready for this increasing ICS systems, even if the researchers have zero control au- tomation domain knowledge or are faced with a myriad of trend in ICS security threats. Worse, to secure the ICS heterogenous ICS systems. Unlike existing works that require equipment (e.g. programmable logic controllers (PLCs)), one expertise in domain knowledge and specialised tool usage, our would usually require additional expertise about the targets analytics framework does not require prior knowledge about ICS and specialized/bespoke systems set up before one can analyse communication protocols, PLCs, and expertise of any network or test them. Such a resource-consuming process has largely penetration testing tool. Using ‘digital twin’ scenarios comprising industry-representative HMIs, PLCs and firewalls in our test lab, hindered effective security research, especially for security our framework’s steps were demonstrated to successfully imple- researchers who lack prior knowledge about the ICS system ment a stealthy deception attack based on false data injection under analysis. attacks (FDIA). Furthermore, our framework also demonstrated To allow security testing to catch up with the rate of threats the relative ease of attack dataset collection, and the ability to to ICS, having effective frameworks for stakeholders (e.g. leverage well-known penetration testing tools. We also introduce the concept of ‘heuristic inference attacks’, asset/equipment owners) and security researchers to analyse a new family of attack types on ICS which is agnostic to and test for security vulnerabilities without the need for PLC and HMI brands/models commonly deployed in ICS. Our specific automation or configuration domain knowledge of experiments were also validated on a separate ICS dataset heterogenous equipment would be desirable. collected from a cyber-physical scenario of water utilities. Finally, An emerging research area in ICS security is threat de- we utilized time complexity theory to estimate the difficulty for the attacker to conduct the proposed packet analyses, and tection. In the case of detection approaches, there have been arXiv:2101.11866v1 [cs.CR] 28 Jan 2021 recommended countermeasures based on our findings. recurring obstacles (re)producing or obtaining attack data. For Index Terms—Industrial control system (ICS) security, critical example, research conducted by Hadziosmanovic´ et al. [1] and infrastructure, security analytics framework, Man-in-the-Middle Lan et al. [2] are examples of researchers producing attack attacks, PLC security, cybersecurity, cyber resilience, Opera- data to evaluate their suggested approaches. Nevertheless, tional Technology (OT) reproducing data based on their attack techniques may lead to additional research activities and obstacles for newcomers I. INTRODUCTION in this area. In other cases where attack datasets are shared Modern power grids, water treatment/distribution systems, among multiple institutions or researchers, the lack of knowl- and automated manufacturing systems are some of the main edge on the specific system architecture and attack scenarios in critical infrastructure sectors adopting industrial control sys- which the datasets were produced significantly limit research tems (ICS) for automation and remote plant management ca- activities and research translation potential. pabilities. In the recent decade, ICS are increasingly connected To mitigate the above gaps and provide a solution for to the Internet to achieve scale and management efficiency, as acquiring attack datasets, we propose an analytics framework. compared to traditional ICS management which do not lever- While the framework is extensible, in this paper, we will focus on the false data injection attack (FDIA) [3], [4] on ICS network packets to illustrate its capabilities. The proposed framework could be easily applied and reproduced using well- known publicly-available network security assessment tools, without any prior knowledge on the specific PLC models and ICS under analysis. We coin our testing attack type as a ‘heuristic inference attack’ – since attackers will be able to infer PLC signals com- mands through a range of heuristic-driven analysis approaches over our framework. To carry out the heuristic inference attack, the network request and response packets from the Human-Machine Interfaces (HMI) and PLCs are sorted by their periodical sending order, and then classified according to their packet lengths. The reason we have chosen packet length as a criterion for classification is out of our observation that similar-length data packets are used for the communication between HMI and PLCs. In addition, we discovered that some particular query packets from HMI have been sent periodically and the response packets from PLCs against a particular query packet have predictably similar lengths. Our proposed framework was based on these discovered traits and features Fig. 1. ICS Reference Model from ANSI/ISA-99 [5] of PLC and HMI communication. The main contributions of this research are: send obtained data from the I/O network (Level 0) to the • We propose an analytics framework to provide solutions to ease attack dataset collection. Our proposed method is managing components at the supervisory control LAN (Level a stealthy deception attack based on FDIA and it could 2) as described in [6]. The HMI, Historian database, and be conducted using well-known penetration testing tools. Engineering Workstation at Level 2 are components of the control center for monitoring and managing the OT levels. • We introduce ‘heuristic inference attacks’, a new family of attack types on ICS which is agnostic to PLC and HMI Among the four network levels, the network communica- brands/models commonly deployed in ICS. tion between Level 2 and 1 is the focus of our analysis • We estimate the difficulty for the attacker to conduct the and the exploitation target/scope of this research, since the proposed packet analysis. The time complexity theory is communication channel between Level 2 and 1 is a necessary used to support this difficulty assessment. pathway of network attack for adversaries. For Level 3, since • Some recommendations of countermeasures are proposed the approach of attacking the OT network from the IT network based on the findings of our research. has been developed by Klick et al. [7], it is out of scope of In Section II, background materials are presented and we this research. In the case of attacking Level 0, attackers are provide the design of our framework in Section III. We discuss unable to access the devices in the I/O Network or Control case studies including an explanation of the used simulation System without physical access to them. More importantly, system in Section IV. Result analyses and countermeasures are the gained data from I/O devices, such as sensors or actuators, discussed in Section V and Section VI shows related work. We are delivered to PLCs, and then passed to the control center. then conclude and propose future work in Section VII. Therefore, a malicious accessor of the OT network is able to gather the level 0 data from the reported packets. Thus, II. BACKGROUND attacking Level 0 has been implicitly included. Contrary to From a network perspective, ICS are usually distributed into previous studies which focused on communications within four levels: Corporate Network (Level 3), Supervisory Control the same network level, our approach is more reflective of LAN (Level 2), Control Network (Level 1), and I/O Network real-world risks as we focus on the communication channel (Level 0). All levels cooperate together to control industrial between HMI in Level 2 and PLCs in Level 1. processes [5]. Figure 1 shows a prevalent ICS architectures Unlike existing works that require expertise in domain stemming from the ANSI/ISA-99 reference model [5]. Level 3 knowledge and tool usage, our framework does not require of the model is part of the traditional ‘Information Technology prior knowledge about ICS communication protocols, PLCs, (IT)’ which reports process data from

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us