20
Cyber Security of SCADA Systems TEAM: ANTHONY GEDWILLO (EE) JAMES PARROTT (CPRE) DAVID RYAN (CPRE) CLIENT: DR. GOVINDARASU, IOWA STATE UNIVERSITY

Cyber Security of SCADA Systems

  • Upload
    triage

  • View
    99

  • Download
    6

Embed Size (px)

DESCRIPTION

Cyber Security of SCADA Systems. Team: Anthony Gedwillo (EE) James Parrott (CPrE) David Ryan (CPrE) Client: Dr. Govindarasu, Iowa State University. What is a SCADA System?. SCADA stands for “Supervisory Control and Data Acquisition” - PowerPoint PPT Presentation

Citation preview

Page 1: Cyber Security of SCADA Systems

Cyber Security of SCADA Systems

TEAM:ANTHONY GEDWILLO (EE)JAMES PARROTT (CPRE)DAVID RYAN (CPRE)

CLIENT:DR. GOVINDARASU, IOWA STATE UNIVERSITY

Page 2: Cyber Security of SCADA Systems

What is a SCADA System?• SCADA stands for “Supervisory

Control and Data Acquisition”

• SCADA systems control our nation’s vital infrastructure, including Power Transmission and Distribution, Oil , Gas, and Water

• SCADA Systems act as the brain and nerves for the systems they control. They sense, process (think), and send commands

Page 3: Cyber Security of SCADA Systems

Problem Statement• Supervisory control and data

acquisition (SCADA) systems are vital parts of our nation’s infrastructure, and the security of these systems is a top priority. However, there is a shortage of adequate research environments for modeling and testing SCADA systems.

Page 4: Cyber Security of SCADA Systems

Our Solution

Page 5: Cyber Security of SCADA Systems

Test Bed FunctionalitySCADA

System with Poor Security

Improvement Cycle

SCADA System with

Improved Security

System Configuration

and Improvement

Vulnerability AssessmentAttack Scenario

Page 6: Cyber Security of SCADA Systems

Concept Diagram

Page 7: Cyber Security of SCADA Systems

Operating Environment/Intended Usage

• Coover Hall – Room 3042

• Demonstrations

• Research

Page 8: Cyber Security of SCADA Systems

Functional Requirements-Virtualization

• Create a virtualized platform that allows network stack inspection.

• Create virtualized machines for RTUs and Relays

• Virtualized system should be scalable to provide more realistic scenarios

Page 9: Cyber Security of SCADA Systems

Functional Requirements-Cyber Security

• Vulnerability assessment / Report

• Cyber attack implementation

• Denial of Service• Invalid Data• Information Theft

Page 10: Cyber Security of SCADA Systems

Functional Requirements-Power System Integration

• Integrate DIgSILENT PowerFactory into current test bed

• Configure DIgSILENT for real time power flow simulation

Page 11: Cyber Security of SCADA Systems

Non-Functional Requirements• Minimal configuration on virtual

image deployment

• Images should have backups to prevent loss

• Attack scenarios can be demonstrated without requiring detailed information on attack functionality

• Power flow system should be easily interpreted

Page 12: Cyber Security of SCADA Systems

Implemented Design - Virtualization

Page 13: Cyber Security of SCADA Systems

Implememted Design – Power Flow

Google Earth

Page 14: Cyber Security of SCADA Systems

Cyber Security Vulnerability Assessment

• Validate the system

• Document running services

• Document well-known software vulnerabilities

• Search for implementation vulnerabilities

• Attack Implementation

• Produce Report

Page 15: Cyber Security of SCADA Systems

Attack Implementation• Man in the Middle attacks

• Intercept and drop command packets

• Ettercap Issues

• Modified packet sniffer

• Intercept and return fake confirmation

• Denial of Service attacks

Page 16: Cyber Security of SCADA Systems

Virtualization /Power Flow / Cyber Security Testing

Page 17: Cyber Security of SCADA Systems

Current Test Bed Status

Page 18: Cyber Security of SCADA Systems

Questions?

Page 19: Cyber Security of SCADA Systems

Technical Approach Consideration and Results

• Virtual hypervisor software selection• VmWare Server• VmWare ESX• Citrix XenServer• Microsoft HyperV

• Relay Virtualization software selection• Delphin-Informatika IEC 61850 Simulator• SISCO AX-S4 MMS• SystemCORP IEC61850 DLL• Matrikon OPC Server

Page 20: Cyber Security of SCADA Systems

Technical Approach Consideration and Results

• Power system simulation software selection• Siemens Spectrum Power TG (DTS)• DIgSILENT PowerFactory• Power World

• Cyber attack/security software selection• Nessus Security Scanner• Various open-source tools