50
Coupled Petri Nets for Computer Network Risk Analysis (Application to Process Control Networks) Matt Henry, Ryan Layer, David Zaret 1

Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Coupled Petri Nets for Computer Network Risk Analysis(Application to Process Control Networks)

Matt Henry, Ryan Layer, David Zaret

1

Page 2: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Estimate the risk associated with a “cyber” attack launched against a particular network.

Risk f(Lbth, Cbth)

Lbth: Likelihood that bad things will happen

Cbth: Consequences of those bad things if they happen

This is an old problem

2

Motivation

Page 3: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Define a set of attack goals

Figure out how hard the goals are to achieve

3

“Traditional” Attack Modeling

Source:

M. S. Pallos, Attack Trees: It's a Jungle out there, The Business Forum:

http://www.bizforum.org/whitepapers/candle-4.htm

Page 4: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

No presumed goal; only constraints and objectives

Figure out how much of the network the attacker can own

Given access to network resources, identify potential operational impact

4

Horse, then Cart

CNA Petri Net

Process Petri Net

> >

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

......

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

...... PCS Petri Net

Inducible Process Failure Modes:1. Small qty gaseous ammonia discharge to dilution drum1A. Large qty gaseous ammonia discharge to dilution drum2. Automated fill task disabled2A. Large qty liquid ammonia discharge to dilution drum3. Tank Overfill4. High-pressure gaseous ammonia discharge from

damaged plumbing5. High-pressure liquid ammonia discharge from

damaged plumbing6. Low-pressure gaseous ammonia discharge from

damaged plumbing

Risk Assessment

Enterprise

Network

Operational Impact

Target Operation

> >

AttackerPCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Actuator m

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

PCS Functionality

Page 5: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

This approach is gaining attention in the community. Several research groups have been developing access-based risk assessment techniques.

To name a few …

MIT-LL: NetSPA (Ingols et al.)

Mitre: RiskMAP (Kertzner et al.)

CMU: Stochastic Games (Lye and Wing)

UIUC: Differential Games (Alpcan and Basar)

5

We’re not alone

Page 6: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Our Approach is based on State Reachability

Coupled models for Risk Analysis

Attack Model: Network Resource Accessibility

Process Control System Model: Functionality and Authority

Process Model: Process Failure Modes and Consequences

6

CNA Petri Net

Process Petri Net

> >

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

......

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

...... PCS Petri Net

Inducible Process Failure Modes:1. Small qty gaseous ammonia discharge to dilution drum1A. Large qty gaseous ammonia discharge to dilution drum2. Automated fill task disabled2A. Large qty liquid ammonia discharge to dilution drum3. Tank Overfill4. High-pressure gaseous ammonia discharge from

damaged plumbing5. High-pressure liquid ammonia discharge from

damaged plumbing6. Low-pressure gaseous ammonia discharge from

damaged plumbing

Risk Assessment

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Actuator m

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

PCS Functionality

We want to eliminate parametric estimation requirements (no attempts to SWAG “probability

of success”) to see how far we can get based on what we know: that exploits launched

against known vulnerabilities eventually succeed.

Page 7: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Attack Model

7

PSTN

Maintenance

Server

Corporate

LAN

Given some initial access and a network configuration, the attack model is constructed as a Petri net that represents an attack on the network.

Page 8: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Attack Model

8

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

......

Exploitation of host vulnerabilities permits escalation of privilege and access on the network, represented as state dynamics on the Petri net.

PSTN

Maintenance

Server

Corporate

LAN

Page 9: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

PCS Model

PSTN

Maintenance

Server

Corporate

LAN

Adapted from:

(1) K. Stouffer, J. Falco, and K. Scarfone. Guide to Industrial

Control Systems (ICS) Security, National Institute of Standards

and Technology, U.S. Department of Commerce, 2008.

(2) N. Balasubramanian, C-T. Chang, and Y-F. Wang, Petri-Net

Models for Risk Analysis of Hazardous Liquid Loading

Operations. Industrial and Engineering Chemical Research, Vol.

41, pp. 4823-4836, 2002.

Relates PCS host attributes (applications, resident data, instrument and actuator I/O, and control authority ) to PCS functionality (state estimation, control, operator interaction) .

9

Page 10: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

PCS Model

PSTN

Maintenance

Server

Corporate

LAN

Adapted from:

(1) K. Stouffer, J. Falco, and K. Scarfone. Guide to Industrial

Control Systems (ICS) Security, National Institute of Standards

and Technology, U.S. Department of Commerce, 2008.

(2) N. Balasubramanian, C-T. Chang, and Y-F. Wang, Petri-Net

Models for Risk Analysis of Hazardous Liquid Loading

Operations. Industrial and Engineering Chemical Research, Vol.

41, pp. 4823-4836, 2002.

10

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Actuator m

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

PCS Functionality

Access to network resources permits co-option of control authority through exploitation of PCS functionality.

Page 11: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Process Model

11

Relates process states (state of valves, pump state) to system states (line pressures and temperatures)

Permits ready identification of failure modes (process error states)

Facilitates analysis of failure mode effects due to system states associated with process error states

Source: N. Balasubramanian, C-T. Chang, and Y-F. Wang,

Petri-Net Models for Risk Analysis of Hazardous Liquid

Loading Operations. Industrial and Engineering Chemical

Research, Vol. 41, pp. 4823-4836, 2002.

Page 12: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Process Model

12

Source: N. Balasubramanian, C-T. Chang, and Y-F. Wang,

Petri-Net Models for Risk Analysis of Hazardous Liquid

Loading Operations. Industrial and Engineering Chemical

Research, Vol. 41, pp. 4823-4836, 2002.

Co-opted process control induces process failure modes and associated operational consequences.

Page 13: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Coupled Models for Risk Analysis

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

......

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

......

13

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Actuator m

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

PCS Functionality

Escalation

Attack

Consequences

Page 14: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Coupled Models for Risk Analysis

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

......

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

......

14

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Actuator m

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

PCS Functionality

Escalation

Attack

Consequences

Single reachability computation provides basis for risk measure.

Page 15: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Specifying the Coupled Model: Escalation

Privilege Levels

User

Root

Host Specification

Host Environment

Operating System

Non-PCS Applications

15

Privilege Levels

User

Root

Host Specification

Host Environment

Operating System

Non-PCS Applications

Privilege Levels

User

Root

Host Specification

Host Environment

Operating System

Non-PCS Applications

Hosts are specified by places

indicating a particular OS and

installed applications.

Exploits are specified by host

property pre-conditions and post-

conditions.

Page 16: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Specifying the Coupled Model: AttackPCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Privilege Levels

User

Root

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Host Hp Specification

Actuator m

Host Environment

Operating System

Non-PCS Applications

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

16

PCS Functionality

Page 17: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Specifying the Coupled Model: AttackPCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Privilege Levels

User

Root

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Host Hp Specification

Actuator m

Host Environment

Operating System

Non-PCS Applications

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

17

PCS Functionality

PCS host functionality is specified by applications,

data, control authority and I/O.

Functionality co-option attacks are specified by

PCS functionality access pre-conditions and

functionality co-option post-conditions.

Page 18: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Specifying the Coupled Model: AttackPCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Privilege Levels

User

Root

Host Hp Specification

Host Environment

Operating System

Non-PCS Applications

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

Privilege Levels

User

Root

Host Hp’ Specification

Host Environment

Operating System

Non-PCS Applications

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

OI Configuration Data

18

PCS Functionality

PCS Functionality

Page 19: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Specifying the Coupled Model: Consequences

Process Failure Modes

FM 1 (Valve x closes during process step y)

FM k (Valve x closes in response to observed conditions)

FM K (Valve x closes at an indeterminate time)

FM 1 w/ Operator Deception

FM k w/ Operator Deception

FM K w/ Operator Deception

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display ManipulationHost p

19

Process attacks are specified by PCS

functionality co-option pre-conditions and

consequence post-conditions.

Page 20: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

State Reachability

Risk Assessment

Risk Management

Model-Based Analysis

20

Page 21: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

places represent conditions (resources, access)

tokens represent satisfied conditions (resource exists, attacker has access)

transitions represent events (atomic attack steps)

input places are the event’s preconditions

output places are the event’s postconditions

a transition is enabled when its input places are marked

an enabled transition can fire, removing input tokens and adding output tokens

21

Petri Nets for Attack Modeling

host0 host1

host0user

root

link to host1

sshd

user

root

sshd

link to host0

host1

sshd bof

Page 22: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

places represent conditions (resources, access)

tokens represent satisfied conditions (resource exists, attacker has access)

transitions represent events (atomic attack steps)

input places are the event’s preconditions

output places are the event’s postconditions

a transition is enabled when its input places are marked

an enabled transition can fire, removing input tokens and adding output tokens

22

Petri Nets for Attack Modeling

host0 host1

host0user

root

link to host1

sshd

user

root

sshd

link to host0

host1

sshd bof

host0 host1

host0user

root

sshd

user

root

sshd

link to host0

host1

sshd bof

link to host1

Page 23: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Build a tree of all markings reachable from some initial marking:

Finding the reachable set is NP-hard!

23

t1 t2

t3

p1 p2 p3

2

{ 1 0 0 }

{ 0 1 0 }

{ 0 0 2 }

{ 0 1 1 }

{ 0 0 3 } { 0 2 0 }

{ 0 1 2 } { 0 1 2 }

t1

t2

t3

t2 t3

t2t3

{ 0 0 4 } { 0 2 1 }

t2 t3

The state space is, in general, countably infinite.

Even when finite, it is at least O(2N) big.

Page 24: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

24

Practical Alternative: Coverability

t1 t2

t3

p1 p2 p3

2

{ 1 0 0 }

{ 0 1 0 }

{ 0 0 2 }

{ 0 1 1 }

t1

t2

t3

{ 0 1 ω }

{ 0 1 0 }

{ 0 1 1 }

Look for cases of strict monotonicity in

the reachability tree:

m m’ and m m’

Accelerate the marking

The sequence {t2, t3} can fire from m’,

so all places p such that

m(p) < m’(p) are unbounded<

{ 0 1 ω }

{ 0 0 ω } { 0 2 ω }

t2 t3ω = ω + c = ω - c

{ 0 1 ω }

{ 0 2 ω }

{ 0 ω ω }

{ 0 ω ω }

{ 0 ω ω } { 0 ω ω }

t2t3

{ 0 ω ω } { 0 ω ω }

t2 t3

Source: R. Karp and R. Miller, “Parallel program schemata,” Journal of

Computer and System Sciences, vol. 3, pp. 147–195, 1969.

Page 25: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

In the Coverability Set CS, one or more of the Process Failure Modes mi

will be marked.

Each of these Process Failure Modes has associated Material Consequences ci.

Our metric:

Risk = max{ci|mi CS}

Defining and Evaluating Risk Metrics

25

Process Failure Modes

FM 1 (Valve x closes during process step y)

FM k (Valve x closes in response to observed conditions)

FM K (Valve x closes at an indeterminate time)

FM 1 w/ Operator Deception

FM k w/ Operator Deception

FM K w/ Operator Deception

Page 26: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Trace-back for Risk Management

26

Process Failure Modes

FM 1 (Valve x closes during process step y)

FM k (Valve x closes in response to observed conditions)

FM K (Valve x closes at an indeterminate time)

FM 1 w/ Operator Deception

FM k w/ Operator Deception

FM K w/ Operator Deception

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Privilege Levels

User

Root

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Host Hp Specification

Actuator m

Host Environment

Operating System

Non-PCS Applications

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

Identify and Evaluate the

Value of preventing first-order

transitions that lead to

Process Failure Modes

Identify and Evaluate the Value

of preventing higher order

transitions that lead to

preconditions of high-value first-

order transitions

Page 27: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Trace-back for Risk Management

27

Process Failure Modes

FM 1 (Valve x closes during process step y)

FM k (Valve x closes in response to observed conditions)

FM K (Valve x closes at an indeterminate time)

FM 1 w/ Operator Deception

FM k w/ Operator Deception

FM K w/ Operator Deception

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

A transition t is a “first-order”

transition if at least one of its

post-conditions is a process

failure mode, m, and it is enabled

in at least one marking in the

coverability set.

Let T1 denote the set of first-order

transitions

The subset S1 T1 is assigned a

value derived from the set of

consequences avoided if the

transitions are rendered inactive:

1t'mSt'Tt'tmSt|cV i

11

i

1

iS1

Page 28: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Trace-back for Risk Management

28

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Privilege Levels

User

Root

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Host Hp Specification

Actuator m

Host Environment

Operating System

Non-PCS Applications

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

A transition t is a “second-order”

transition if at least one of its post-

conditions is a precondition for a

first-order transition, t T1, and it is

enabled in at least one marking in the

coverability set.

Let T2 denote the set of second-order

transitions

The subset S2 T2 is assigned a

value derived from the set of

consequences avoided if the

transitions are rendered inactive:

2'StStS'S

pStStVV

11

12

TS 12221122

122211SS

tt

tt

Page 29: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Demonstration: PCS

29

Internet

Engineering

Workstation

Historian HMI

MTU

PLC

RTU

Maintenance

Server

Corp NetXP

Web Browser

MS Office

XP

Web Browser

MS Office

FTP

ODBC

XP

FTP

XP

Remote Password

XP

FTP

MS Server

Firewall rulesBLOCK inbound connections from Internet to PCSALLOW outbound from PCS to InternetALLOW ODBC and FTP allowed from Corp to PCS

PSTN

Page 30: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Base Case

30

Internet

Engineering

Workstation

Historian HMI

MTU

PLC

RTU

Maintenance

Server

Corp NetXP

Web Browser

MS Office

XP

Web Browser

MS Office

FTP

ODBC

XP

FTP

XP

Remote Password

XP

FTP

MS Server

Initial ConditionsInternet: Root AccessDial-up: Root Access

Coverability Set (Reachable Adversary Control)Historian: user, rootHMI: userMaintenance: user, rootMTU: user, rootEngineering: user, rootCorp: user, root

PSTN

Page 31: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Trace-back: First-Order Transitions

31

PCS Manipulation

Operator Spoofing

Control Code Manipulation

Operator Display Manipulation

Manipulate System State Estimation

Process Failure Modes

FM 1: V11 Fails Open During Automated Process

FM 2: V12 Fails Open During Manual Process

FM 3: Liquid Level Sensor Fails

FM 4: V3 Fails Closed

FM 5: V9 Fails Closed

FM 6: Refrig System Failure

FM 1A: V11 Fails Open with Deception

FM 2A: V12 Fails Open with Deception

Page 32: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Trace-back: Second-Order Transitions

32

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

MTU

PCS Manipulation

Operator Spoofing

Control Code Manipulation

Operator Display Manipulation

Manipulate System State Estimation

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

Workstationvia FTP

Page 33: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

PSTN

Network Separation

33

Corp NetXP

Web Browser

MS Office

Engineering

WorkstationXP

Web Browser

MS Office

FTP

Historian

ODBC

XP

Maintenance

Server

FTP

XP

Remote Password

MTU

IED

RTU

XP

FTP

HMI

MS Server

Firewall rulesBLOCK all connections from Internet to/from PCS, Historian, EngineeringALLOW FTP to/from Corp to EngineeringALLOW FTP to/from Engineering to PCSALLOW ODBC from Corp to HistorianALLOW ODBC from Engineering to HistorianALLOW Modbus from PCS to Historian

Internet

Page 34: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

PSTN

Network Separation

34

Corp NetXP

Web Browser

MS Office

Engineering

WorkstationXP

Web Browser

MS Office

FTP

Historian

ODBC

XP

MTU

IED

RTU

XP

FTP

HMI

MS Server

Initial ConditionsInternet: Root AccessDial-up: Root Access

Coverability Set (Reachable Adversary Control)Historian: user, rootHMI: userMaintenance: user, rootMTU: user, rootEngineering: user, rootCorp: user, root

Internet

Maintenance

Server

FTP

XP

Remote Password

Page 35: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

PSTN

Network Separation

35

Corp NetXP

Web Browser

MS Office

Engineering

WorkstationXP

Web Browser

MS Office

FTP

Historian

ODBC

XP

MTU

IED

RTU

XP

FTP

HMI

MS Server

Initial ConditionsInternet: Root AccessDial-up: Root Access

Coverability Set (Reachable Adversary Control)Historian: user, rootHMI: userMaintenance: user, rootMTU: user, rootEngineering: user, rootCorp: user, root

Internet

Maintenance

Server

FTP

XP

Remote Password

Same as

Base Case!

Page 36: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Separation and Patch

36

Internet

Corp NetXP

Web Browser

MS Office

Engineering

WorkstationXP

Web Browser

MS Office

FTP

Historian

ODBC

XP

Maintenance

Server

FTP

XP

Remote Password

MTU

IED

RTU

XP

FTP

HMI

MS Server

Firewall rulesBLOCK all connections from Internet to/from PCS, Historian, EngineeringBLOCK FTP to/from Engineering to PCSALLOW FTP to/from Corp to EngineeringALLOW ODBC from Corp to HistorianALLOW ODBC from Engineering to HistorianALLOW Modbus from PCS to Historian

Page 37: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Separation and Patch

37

Internet

Corp NetXP

Web Browser

MS Office

Engineering

WorkstationXP

Web Browser

MS Office

FTP

Historian

ODBC

XP

Maintenance

Server

FTP

XP

Remote Password

MTU

IED

RTU

XP

FTP

HMI

MS Server

Initial ConditionsInternet: Root AccessDial-up: Root Access

Coverability Set (Reachable Adversary Control)Historian: user, rootHMI: noneMaintenance: noneMTU: noneEngineering: user, rootCorp: user, root

Page 38: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Mission Impact

38

Coverability Set (Base Case) Historian: user, rootHMI: userMaintenance: user, rootMTU: user, rootEngineering: user, rootCorp: user, root

Coverability Set (with DMZs)Historian: user, rootHMI: userMaintenance: user, rootMTU: user, rootEngineering: user, rootCorp: user, root

Coverability Set (with DMZs and Patch)Historian: user, rootHMI: noneMaintenance: noneMTU: noneEngineering: user, rootCorp: user, root

Inducible Process Failure Modes:1. Small qty gaseous ammonia discharge to dilution drum1A. Large qty gaseous ammonia discharge to dilution drum2. Automated fill task disabled2A. Large qty liquid ammonia discharge to dilution drum3. Tank Overfill4. High-pressure gaseous ammonia discharge from

damaged plumbing5. High-pressure liquid ammonia discharge from

damaged plumbing6. Low-pressure gaseous ammonia discharge from

damaged plumbing

Inducible Process Failure Modes:None

Page 39: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Conclusions

39

Highly conservative approach • Provides an upper bound on “known” risk• Implicit assumption that the IDS/IPS has failed

Difficult to scale without simplifying assumption (monotonicity)• Not bad, this is common and reasonable assumption• Can practically deal with network of up to O(10k) hosts

• Good complement to our current work

Page 40: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Current and Future Work

40

Scalability

Metrics

Active Defense

Page 41: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Questions

41

Page 42: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Backup

42

Page 43: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Input: exploits and network attributes

each exploit has a set of pre- and post-conditions

network attributes includes host properties and connectivity

Automated Petri Net Generation

43

local buffer

over flow

Host 1:

Host 1:user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

Host 2:

sshd

attack

Host 1:

Host N:

local buffer

over flow

Host 2:

Host 2:

local buffer

over flow

Host N:

Host N:

user priv

root priv

sshd

link to 1

link to N

link to 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

Host 1:

sshd

attack

Host N:

Host 1:

sshd

attack

Host 2:

Host N:

sshd

attack

Host N:

Host 2:

Attack

Petri net......

local buffer

over flow

Host 1:

Host 1

user priv

root priv

sshd

link to 1

link to N

...

link to 2

sshd

attack

Host 1:

local buffer

over flow

Host 2:

local buffer

over flow

Host N:

Host N

user priv

root priv

sshd

link to 1

link to N

link to 2

Host 2

user priv

root priv

sshd

link to 1

link to N

link to 2

sshd

attack

Host 2:

sshd

attack

Host N:

Source

Petri net......

Page 44: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

PCS Model

PSTN

Maintenance

Server

Corporate

LAN

Adapted from:

(1) K. Stouffer, J. Falco, and K. Scarfone. Guide to Industrial

Control Systems (ICS) Security, National Institute of Standards

and Technology, U.S. Department of Commerce, 2008.

(2) N. Balasubramanian, C-T. Chang, and Y-F. Wang, Petri-Net

Models for Risk Analysis of Hazardous Liquid Loading

Operations. Industrial and Engineering Chemical Research, Vol.

41, pp. 4823-4836, 2002.

Remote Manual Control of

• V1-V3, V9-V12

• Compressor

• Refrigeration System

Automation of

• Compressor Prime Process

• Tank Fill Process

• Compressor Shut-down Process

44

Page 45: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

PCS Model

PSTN

Maintenance

Server

Corporate

LAN

Adapted from:

(1) K. Stouffer, J. Falco, and K. Scarfone. Guide to Industrial

Control Systems (ICS) Security, National Institute of Standards

and Technology, U.S. Department of Commerce, 2008.

(2) N. Balasubramanian, C-T. Chang, and Y-F. Wang, Petri-Net

Models for Risk Analysis of Hazardous Liquid Loading

Operations. Industrial and Engineering Chemical Research, Vol.

41, pp. 4823-4836, 2002.

Hosts on TCP/TP Ethernet:

• Historian

• MTU

• HMI

• Workstations

• Maintenance Server

Field Components:

• 3 RTUs

• 2 PLCs

Communicate with MTU over radio serial link

45

Page 46: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Host Access to Process Control Coupling

46

PCS Manipulation

Manual Measurement Spoofing

Instrument n

Modified Instrument Calibration

Instrument n

Manual Instruction Spoofing

Actuator m

Modified Actuator Calibration

Actuator m

Data in Volatile Memory

State Estimate

Instruction Set

Measurement

External I/O

Instrument n

Local UI Input

Local UI Output

Actuator m

Development & Calibration

Process Control

State Estimation

PCS Applications

Operator Interaction (OI)

Domain of Control Authority

Global

Sub Process q

Data in Non-Volatile Memory

Calibration Data

PCS Application Source Code

State Estimation Parameters

Control Override Switch

Control Parameters

OI Configuration Data

State Estimation Parameter Manipulation

Process q

State Estimation App Code Manipulation

Process q

Control Parameter Manipulation

Process q

Control App Code Manipulation

Process q

Manual Operator Spoofing

Host p

Automated Operator Spoofing

Host p

Manual OI Display Manipulation

Host p

Automated OI Display Manipulation

Host p

PCS Functionality

Page 47: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Process Failure Mode Details

47

Case 1: Valve V11 Fails Open prior to executing Task 4 (Part of Automated Task) Consequence: Gaseous ammonia discharges into dilution drum Resources Required: Any one of the following

MTU root (manipulate automation software on host) Workstation root (manipulate automation software via FTP) Maintenance server super-user (manipulate automation software via FTP)

Case 1A: Valve V11 Fails Open prior to executing Task 4 AND V11 state spoofed as closed at HMI (Part of Automated Task)

Consequence: Large qty gaseous ammonia discharges into dilution drum Resources Required: [HMI root (manipulate state representation driver) OR

MTU root (manipulate state tracking software)] AND any one of the following MTU root (manipulate automation software on host) Workstation root (manipulate automation software via FTP) Maintenance server root (manipulate automation software via FTP)

Page 48: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Process Failure Mode Details

48

Case 2: Valve V12 Fails Open during execution of Task 2 (Manual operations) Consequence: Automated Fill Task (Tasks 3,4, and 5) will be disabled Resources Required: Any one of the following

HMI user Access (Issue direct instruction) MTU user access (Spoof HMI instruction)

Case 2A: Valve V12 Fails Open during execution of Task 2 (Manual operations) without being noticed at HMI

Consequence: Large quantity liquid ammonia discharge to dilution drum Resources Required:

MTU super-user access (spoof HMI instruction and manipulate state tracking software on host)

Workstation root (manipulate automation software via FTP) Maintenance server root (manipulate automation software via FTP)

Page 49: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Process Failure Mode Details

49

Case 3: Liquid Level Sensor Failure during execution of Task 4 (Part of Automated Task) • Consequence: Overfill of tank• Resources Required:

• MTU super-user (manipulate automation software on host) • Workstation super-user (manipulate automation software via FTP)• Maintenance server super-user (manipulate automation software via FTP)

Case 4: Valve V3 Fails Closed after Compressor Warm-up during execution of Task 3 (Part of Automated Task)

• Consequence: Pressure Surge at V3 induces structural pipeline failure and discharge of high-pressure gaseous ammonia from damaged plumbing

• Resources Required: • MTU super-user (manipulate automation software on host) • Workstation super-user (manipulate automation software via FTP)• Maintenance server super-user (manipulate automation software via FTP)

Page 50: Coupled Petri Nets for Computer Network Risk Analysis ...€¦ · Development & Calibration Process Control State Estimation PCS Applications Operator Interaction (OI) Domain of Control

Process Failure Mode Details

50

Case 5: Valve V9 Fails Closed during Task 4 (Part of Automated Task)• Consequence: Pressure Surge at V9 induces structural pipeline failure and discharge

of high-pressure liquid ammonia from damaged plumbing• Resources Required:

• MTU super-user (manipulate automation software on host) • Workstation super-user (manipulate automation software via FTP)• Maintenance server super-user (manipulate automation software via FTP)

Case 6: Refrigeration System Fails• Consequence: Increase in pressure on gaseous ammonia pipelines and low-pressure

gaseous ammonia discharge from damaged plumbing• Resources Required:

• MTU super-user (manipulate automation software on host) • Workstation super-user (manipulate automation software via FTP)• Maintenance server super-user (manipulate automation software via FTP)