21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2<br />

Methodology<br />

In this chapter we discuss our rules of engagement, <strong>and</strong> why they are necessary. We also<br />

explain in more detail how this data has been collected <strong>and</strong> synthesised from multiple<br />

sources. It is necessary to underst<strong>and</strong> the role of devices <strong>and</strong> systems in the industrial<br />

system architecture, to underst<strong>and</strong> the relevance of the project. Here we describe the types<br />

of devices <strong>and</strong> the purpose they serve in such systems. Finally, we detail the information<br />

we have gathered, how we collected it, how we use it to derive other information, <strong>and</strong> the<br />

obstacles to such tasks. We also present some broad quantitative results such as numbers<br />

of devices <strong>and</strong> systems found with each query. More quantitative results are presented in<br />

Chapter 3.<br />

Currently it is believed that industrial control <strong>and</strong> process control systems are not, <strong>and</strong><br />

should not be, connected to the internet. These are large distributed systems <strong>and</strong> the<br />

knowledge of all their devices <strong>and</strong> configuration is often tribal. Such knowledge is spread<br />

throughout organisations with changing employees, <strong>and</strong> that knowledge can leave the<br />

business when certain employees leave, sometimes with expensive consequences such as<br />

in the case of Terry Childs [20], who turned out to be the sole holder of authentication<br />

tokens for a San Francisco communications network.<br />

This is then a primary c<strong>and</strong>idate for an asset management approach, where we continually<br />

scan <strong>and</strong> track devices connecting to a network, <strong>and</strong> also scan from outside to maintain our<br />

compliance. This keeps the configuration information <strong>and</strong> device inventory in collective<br />

h<strong>and</strong>s, <strong>and</strong> derivable from the network itself. The barrier here then is that one should<br />

not scan a live network for devices directly since a ping sweep can have such disastrous<br />

consequences. How then, are industrial computer security professionals, system engineers,<br />

auditors, <strong>and</strong> regulators to progress?<br />

Ideally, we would employ passive network traffic analysis techniques to map <strong>and</strong> identify<br />

all communications as they pass. Unfortunately, this is not possible with an academic<br />

study unless a corporate or state sponsor steps forward to provide an example network<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!