Title: 563'3 Critical Infrastructure Protection
1563.3 Critical Infrastructure Protection
- Carl A. Gunter
- University of Illinois
- Fall 2007
2Outline
- Complex systems
- Threats to critical infrastructure
- The power grid
- Secure Intelligent Electronic Devices (SIEDs)
3Outline
- Complex systems
- Threats to critical infrastructure
- The power grid
- Secure Intelligent Electronic Devices (SIEDs)
4Examples of Systems
- Transportation
- Financial
- Energy
- Human health
- Agricultural health
- Communication
- Cities and fixed infrastructure
5Presidential Decision Directive 63
- Critical infrastructures are those physical and
cyber-based systems essential to the minimum
operations of the economy and government. They
include, but are not limited to,
telecommunications, energy, banking and finance,
transportation, water systems and emergency
services, both governmental and private.
PDD 63 98
6Interdependence
- Many of the nation's critical infrastructures
have historically been physically and logically
separate systems that had little interdependence.
As a result of advances in information
technology and the necessity of improved
efficiency, however, these infrastructures have
become increasingly automated and interlinked. - These same advances have created new
vulnerabilities to equipment failure, human
error, weather and other natural causes, and
physical and cyber attacks. Addressing these
vulnerabilities will necessarily require
flexible, evolutionary approaches that span both
the public and private sectors, and protect both
domestic and international security.
7(No Transcript)
8Dependency on Network-Based Systems
- Key conclusions form NAIC report
- Dependency on network-based systems is pervasive
across all sectors. Critical components of our
national infrastructure rely on a variety of
network-based systems. - Each critical sector surveyed identified
dependency on one or two sectors. - The answer to the question are we ranking our
critical infrastructures as to their
vulnerability to cyber attacks is multi-faceted.
The degree that any sector is vulnerable is
dependent upon a number of characteristics type
of attack, scope of impact, time of attack,
duration of outage. - Sound business continuity practices, as well as
information technology and cyber security best
practices, provide some protection.
NIAC 04
9Outline
- Complex systems
- Threats to critical infrastructure
- The power grid
- Secure Intelligent Electronic Devices (SIEDs)
10For Want of a Nail
For want of a nail the shoe was lost.For want of
a shoe the horse was lost.For want of a horse
the rider was lost.For want of a rider the
battle was lost.For want of a battle the kingdom
was lost.And all for the want of a horseshoe
nail.
11Identifying Vulnerabilities
- Secure the mechanisms of the Internet
- Improve security and reliability of key
protocols IP, DNS, BGP. - Routing address verification, management.
- Management
- Foster trusted DCS and SCADA systems.
- Reduce and remediate software vulnerabilities
- Understand infrastructure interdependency and
improve physical security of cyber systems and
telecommunications
National Strategy to Secure Cyberspace 03
12Impact Assessment
NIAC 04
13Attacks on the Internet
- Mar 99 Melissa Virus
- infected 1.2 million machines and cost 80M
- Feb 00 DoS attack
- shut down Yahoo, Amazon, ETrade, eBay, CNN.com
- Yahoo costs alone estimated at 116K
- Jul 01 Code Red and Sep 01 Nimda
- Code Red infected 359K computers in less than 14
hours - Estimated 3B lost world-wide because of these
two worms
CSTB 03 IT for Counterterrorism
14Executive Order
- The information technology revolution has changed
the way business is transacted, government
operates, and national defense is conducted. - Those three functions now depend on an
interdependent network of critical information
infrastructures. - The protection program authorized by this order
shall consist of continuous efforts to secure
information systems for critical infrastructure,
including emergency preparedness communications,
and the physical assets that support such
systems. - Protection of these systems is essential to the
telecommunications, energy, financial services,
manufacturing, water, transportation, health
care, and emergency services sectors.
Executive Order on Critical Infrastructure
Protection 2001
15Research Plans
- Many groups have proposed agendas for research
related to CIP - Case study 2004 National Critical Infrastructure
Protection RD Plan by DHS - Three strategic goals
- National Common Operating Picture (NCOP)
- Next-Generation architecture with designed-in
security - Resilient, self-diagnosing, self-healing systems
- Eight themes to contribute to the strategic goals
16(No Transcript)
17(No Transcript)
18(No Transcript)
19Outline
- Complex systems
- Threats to critical infrastructure
- The power grid
- Secure Intelligent Electronic Devices (SIEDs)
20Basic Structure of the Electric Grid
21Objectives of Operation
- Balance power generation and demand continuously
- Balance reactive power supply and demand to
maintain scheduled voltages - Monitor flows over transmission lines and other
facilities to ensure that thermal (heating)
limits are not exceeded - Keep the system in a stable condition
22Objectives of Operation (Cont)
- Operate the system so that it remains in a
reliable condition even if a contingency occurs,
such as the loss of a key generator or
transmission facility (the N-1 criterion) - Plan, design, and maintain the system to operate
reliably - Prepare for emergencies
23Interconnectivity
Edison Electric Institute 03
24The 2003 Blackout
- Started August 14 around 4pm and lasted about 4
days - 50 million people were affected
- Total costs were estimated at more than 5 billion
US dollars - Computer failures involved but not sole cause
25Control Systems, Computers, and Digital Networks
- Control systems are replacing electro-mechanical
devices with networked computers - Improved flexibility, reduced cost
- Trend in power distribution network Advanced
Meter Infrastructure (AMI) - Trend in power substations Intelligent
Electronic Devices (IEDs) and Supervisory Control
and Data Acquisition (SCADA)
26IntelliGrid Environments
27Outline
- Complex systems
- Threats to critical infrastructure
- The power grid
- Secure Intelligent Electronic Devices (SIEDs)
28Networked Computers in Aircraft
- Current design isolates aircraft and provides two
semi-isolated subsystems, one for control and one
for entertainment - Next generation will link entertainment network
to Internet - Future link the control system to the enterprise
network.
Nick Multari Boeing/FAA
29Generations of Networked Computers in Aircraft
No Computers
No Computers
Computer Control
30Tradeoffs in Security and Performance
- Benefits
- Monitor airline health
- Update onboard information
- Update parts
- Drawbacks
- Enterprise network is typically attached to the
Internet so the airplane control system may have
broad exposure to attack - Design issues about connecting devices that work
in real-time to the Internet
31Networked Computers in Power Substations
Scott Mix NERC/Kema
32Power Substation Comm (Under Development)
33Secure IEDs (SIEDs)
- A SIED is an IED that has sufficient security
capabilities to be on the Internet - Some (most?) IEDs currently produced are designed
to handle some exposure - Many experts fear this exposure advocate
isolating IEDs or hiding them behind a perimeter - This latter approach has many drawbacks
- Sacrifices potential defense in depth
- Mediated access increases complexity
- Access control decisions complicated
- SIEDs provide greatest defense and flexibility
34SIED Project
- Use stock platforms Unix, Vista
- Use stock security protocols and software
whenever possible SSL, IPsec, etc. - Take account of the special demands on SIEDs
within the IEC 61850 architecture
35IEC 61850 Vision
- IEC 61850 offers an interoperation foundation for
power substations - Anticipated benefits
- Savings in configuration, setup, and maintenance
- New functions not possible with hard wires
- Reduced equipment costs by sharing
36SIED Network Design Strategy
37Core Design Challenge
No security / networking design has demonstrated
this contrasting combination of features
Authenticated Reliable Authorized Encrypted
Seconds and Megabits
Authenticated Reliable
38IEC61850 Protocol Stack
ACSI Core Services
SMV
GOOSE
MMS (ISO/IEC 9506)
Application
ISO Presentation (ISO 9576)ASN.1 (ISO/IEC
8824/8825)
Presentation
ISO Session (ISO 8327)
Session
Transport
ISO Transport (ISO/IEC 8073)Transport Class 0
ISO Adapter (RFC 1006)
TLS (RFC 2246)
TCP (RFC 793)
IP (RFC 791)ARP (RFC 826)
Network
Data Link
Logical Link Control (ISO 8802), 802-3 Ethertype
Media Access Control (ISO 8803)
39Experimental IEC61850 Protocol Stack
SMV
GOOSE
ACSI Core Services
Application
Web Services
Presentation
XML/SOAP
Transport
HTTP
TLS (RFC 2246)
IPsec
IPsec
TCP (RFC 793)
UDP
UDP
IP (RFC 791)ARP (RFC 826)
Network
IP
IP
Data Link
Logical Link Control (ISO 8802), 802-3 Ethertype
Media Access Control (ISO 8803)
40Secure and Reliable LAN Multicast
Security Hub
1. SIED sets up tunnel to MR and negotiates
session keys 2. SIED sends message to hub using
its session key 3. Hub multicasts it to intended
recipients using their session keys
Zhang Grier Gunter King
41Target Demonstration
- 100 SIEDs on a 1Gbps LAN
- lt4ms for substation multicast with typical
substation traffic - 500 Kbps and 25ms for technical support to SIEDs
under no attack - Gateway provides no protections except throttling
- Under full attack from Internet, internal
substation operations are unaffected
42Physical Architecture
43Preliminary Test Results
44Summary on SIEDs
- Control systems that exploit the Internet are
likely in the future - Secure end systems will be able to make the most
of this development - SIEDs are a potentially feasible concept for
power substations - Learn more about the SIED Project at
- http//seclab.uiuc.edu/sied
45Conclusions
- Critical infrastructure protection is challenged
by the increasing interdependence and automation
of systems - A diverse range of measures are required to
provide suitable protection - The power grid is a good case study in CIP and is
important in its own right - Secure IEDs can improve the protection level
while aiding convenience