Securing Machines: Detecting attacks in Industrial...

41
#CyberCamp18 Securing Machines: Detecting attacks in Industrial Environments Mikel Iturbe Urretxa Mondragon Unibertsitatea iturbe.info

Transcript of Securing Machines: Detecting attacks in Industrial...

Page 1: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

S e c u r i n g M a c h i n e s : D e t e c t i n g a t t a c k s

i n I n d u s t r i a l E n v i r o n m e n t s

Mikel Iturbe Urretxa

Mondragon Unibertsitatea

iturbe.info

Page 2: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

1. Whoami

2. Industrial Environments

3. Research in Attack Detection

4. How to train for research in this field

Índice

Page 3: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Mikel Iturbe Urretxa

▪ Lecturer/Researcher at the Data Analysis and

Cybersecurity research group at Mondragon

Unibertsitatea > danz.eus

▪ Member of EuskalHack, the Basque information

security association

$ whoami

Page 4: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ What do I do

▪ PhD in Industrial Intrusion Detection.

• Best student work award in JNIC 2018

▪ Mainly industrial security R&D both through or through contracts with industry:

• CounterCraft, MSIGrupo, OpenCloudFactory, Orona Group…

▪ Also some data analysis (also in industrial settings)

$ whoami

Page 5: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

What I will talk about today:

“An overview of the of some industrial attack detection approaches, based on

my personal experience from the field in the last years.”

Page 6: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

Industrial Environments

Page 7: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

Industrial?

7

CC-BY-SA 3.0 Kreuzschnabel, Schmimi1848, Wolkenkratzer, Brian Cantoni, Hermann Luyken, Beroesz

Page 8: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

So, what’s in a name?

8

© 2016 Little Bobby All Rights Reserved

Page 9: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

How does an Industrial Network look like?

9

Page 10: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

How does an Industrial Network look like?

10

CC-BY 2.0 Robert Kevin Moore @ Flickr

Page 11: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

How does an Industrial Network look like?

11

CC-BY-SA 4.0 hddgomez@Wikicommons

Page 12: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Trans-Siberian pipeline explosion (1982)

▪ Source unconfirmed (myth?)

▪ Two main hypotheses:

• Operator mistake

• Malicious and leaked software caused the explosion

And, if things go wrong?

12

Page 13: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Maroochy Water Breach (2004)

▪ 142 pumping stations

▪ Ex-employee attacks system with stolen equipment

▪ >1m liters of sewage waters were spilled with no control

And, if things go wrong?

13

Page 14: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Stuxnet (2010)

▪ Designed to disrupt Iran’s nuclear

program

▪ Exploited 4 zero-days

▪ Sabotaged uranium centrifuges by

spinning them faster

• While the operator knew nothing was

wrong…

And if things go wrong?

14

Page 15: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ German Steel Mill Incident

(2014)

▪ Not much known (who,where…)

▪ Spear-Phishing > IT network > OT

network

▪ A blast furnace could not be shut down

properly. “Massive” losses.

And if things go wrong?

15

Page 16: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ December 2015 Ukrainan blackout

▪ ~230.000 people lost electricity for some hours

▪ 30 substations switched off

▪ Spearphising > IT network > OT network

And if things go wrong?

16

Page 17: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

So, how do we protect them?

17

Page 18: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

So, how do we protect them?

18

Page 19: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

ICS IT

Main objective Control of physical equipment Data processing and transfer

Failure severity High Low

Round-trip times 250μs-20ms 50ms+

Determinism High Low

Data composition Small packets of periodic and

aperiodic traffic

Large, aperiodic packets

Operating environments Harsh, often hostile (EM noise,

dust…)

Clean

System lifetime Some tens of years Some years

Node complexity Low High

Differences between ICS and IT

19

Page 20: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ There are many differences between IT and ICS

▪ We can´t just install antiviruses everywhere

▪ How can we monitor ICSs to detect attacks in them?

▪ Anomaly Detection FTW!

So, how do we protect them?

20

Page 21: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

Research in Attack Detection

Page 22: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

Jurassic or BS times (before Stuxnet)

22

Page 23: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ ICS attack detection is a niche research field

▪ Most approaches are based on migrations of IT

counterparts (e.g. signature-based IDSs)

▪ Good practices and standard equipment existing today

simply did not exist.

• Whitelisting, Industrial FWs, network segmentation

Jurassic or BS times (before Stuxnet)

23

Page 24: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Zhu and Sastry published a review of (the then) current

proposals on intrusion detection of SCADA

□ Some terms start appearing, and how they can be useful for ICS-specific

attack detection

• Model-based detectrion, specification-based detection

Jurassic or BS times (before Stuxnet)

24

Zhu, Bonnie, and Shankar Sastry. "SCADA-specific intrusion detection/prevention systems: a survey and taxonomy."

Proceedings of the 1st Workshop on Secure Control Systems (SCS). Vol. 11. 2010.

Page 25: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Interest from the research community grows exponentially

▪ Publication rate goes higher

▪ More workshops and conferences are created

▪ Two main approaches:

• Network level detection and field level detection

▪ And I started my PhD…

After Stuxnet

25

Page 26: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Flow-level anomaly detection

Detection at the network level

26

Iturbe, Mikel, et al. "Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting."

VISIGRAPP (2: IVAPP). 2016.

Page 27: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Why field level?

▪ Data is already there!

▪ We want to know how the process is behaving, not (just) the network

▪ Most approaches based on physical models

• There are some issues…

More recently: Detection at the field level

27

Page 28: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Diagnosing attacks

Field-level approaches

28

Iturbe, Mikel, et al. "On the feasibility of distinguishing between process disturbances and intrusions in process control

systems using multivariate statistical process control."

2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE, 2016.

Page 29: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Diagnosing attacks

Field-level approaches

29

Iturbe, Mikel, et al. "On the feasibility of distinguishing between process disturbances and intrusions in process control

systems using multivariate statistical process control."

2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE, 2016.

Page 30: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Diagnosing attacks

Field-level approaches

30

Iturbe, Mikel, et al. "On the feasibility of distinguishing between process disturbances and intrusions in process control

systems using multivariate statistical process control."

2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE, 2016.

Page 31: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Detecting stealthy attacks with PASAD

Field-level approaches

31

Aoudi, Wissam, Mikel Iturbe, and Magnus Almgren.

"Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems."

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018.

Page 32: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Detecting stealthy attacks with PASAD

Field-level approaches

32

Aoudi, Wissam, Mikel Iturbe, and Magnus Almgren.

"Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems."

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018.

Page 33: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ ML-based solutions will gain prominency

▪ More approaches based on field readings

▪ Posible integration with network-level approaches

▪ Software Defined Networking will have a large impact in the

field

Future tendencies

33

Page 34: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

So you wanna start doing research in ICS attack

detection?

Page 35: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Books

Training

35

Page 36: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Books

Training

36

Page 37: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Github

• https://github.com/hslatman/awesome-

industrial-control-system-security

Training

37

Page 38: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Virtuaplant

▪ https://github.com/jseidl/virtuaplant

Training

38

Page 39: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Tennessee-Eastman process

• https://github.com/satejnik/DVCP-TE

Training

39

Krotofil, Marina, and Jason Larsen. "Rocking the pocket book: Hacking chemical plants for competition and extortion."

DEF CON 23 (2015).

Page 40: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

▪ Securing ICS is strategic, but it has some particularities

▪ ML/AI based attack detection in ICS is a very active research

field

▪ Learning ICS security takes time and a change in mentality,

but it is definitely doable.

Conclusions

40

Page 41: Securing Machines: Detecting attacks in Industrial ...iturbe.info/assets/pdf/iturbe2018cybercamp_slides.pdf · #CyberCamp18 Zhu and Sastry published a review of (the then) current

#CyberCamp18

GRACIAS