21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 1. INTRODUCTION 11<br />

1. Slammer worm shuts down the Ohio Davis-Besse nuclear power station.<br />

2. Digital infiltration <strong>and</strong> compromise of a Harrisburg Pennsylvania water utility net-<br />

work.<br />

3. A schoolboy switches trams from tracks <strong>and</strong> derails them in Lodz, Pol<strong>and</strong>.<br />

4. Insider attack on a sewage system in Maroochyshire, Australia.<br />

5. CIA Agent Tom Donohue’s report of extortion attempts against utilities outside the<br />

USA in 2008.<br />

6. Stuxnet discovered <strong>and</strong> reverse engineered.<br />

You will note that the motivations of these attackers range from an undirected worm,<br />

to stealing computational time, revenge, extortion, <strong>and</strong> sabotage. In other words, pro-<br />

gressing from accidental to profitable, <strong>and</strong> finally directed sabotage probably by a nation<br />

state.<br />

There is another case of interest which is not an industrial security incident, but is highly<br />

relevant. The Aurora research [22] showed that generators could be caused to decouple<br />

themselves <strong>and</strong> become inoperable due to remote comm<strong>and</strong>s.<br />

Motivated by all of these factors the re-perimeterisation of these devices was identified as<br />

a national priority in the USA (<strong>and</strong> other countries), <strong>and</strong> NERC CIP-5 [16] is trying to<br />

accomplish this today. By re-perimeterisation, we mean creating an electronic security<br />

perimeter using firewalls, <strong>and</strong> in combination with logical <strong>and</strong> physical network segre-<br />

gation. In the long run these devices will need to function in the presence of hostile<br />

network traffic, but in the short run they need to be brought inside the electronic security<br />

perimeter.<br />

Implementing authentication in all these devices is a complex supply chain problem that<br />

might take ten years or more to resolve. This is simply because of the operational life<br />

cycle of these devices, which can range from 2-20 years. Given such a scenario the right<br />

approach is to start authenticating at the perimeter, until such a time as these devices are<br />

functional in the hostile environment of the global internet, as well as the harsh physical<br />

conditions many of them are built to withst<strong>and</strong>.<br />

1.2.1 Incidents<br />

This section is devoted to computer security incidents of industrial control systems. A brief<br />

walk through industrial security incidents serves to motivate the work below, describes<br />

the context in which industrial control system security operates, <strong>and</strong> show us a range of<br />

motives <strong>and</strong> methods for compromise of these systems. It also serves to counter act the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!