Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain

Slides:



Advertisements
Similar presentations
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Toward Open Source Intrusion Tolerant SCADA Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania.
Applying Wireless in Legacy Systems
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Annarita Giani, UC Berkeley Bruno Sinopoli & Aakash Shah, Carnegie Mellon University Gabor Karsai & Jon Wiley, Vanderbilt University TRUST 2008 Autumn.
Tcipg.org 1 An Alert Buffer Overflow Attack in DNP3 Controlled SCADA Systems Objectives/Problem Investigate a simple but effective attack to block legitimated.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
SCADA and Telemetry Presented By:.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
SCADA FOR WATER DISTRIBUTION IC DEPT. GECGn SEC28.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Lec4: TCP/IP, Network management model, Agent architectures
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Goals The DNP3 protocol is widely used in electrical power systems as a means of communicating observed sensor state information back to a control center.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Basic Edge Core switch Training for Summit Communication.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
MADEIRA Valencia report V. Stankova, C. Lacasta, V. Linhart Ljubljana meeting February 2009.
Cyber Security of SCADA Systems Testbed Development May1013 Group Members: Ben Kregel Justin Fitzpatrick Michael Higdon Rafi Adnan Adviser: Dr. Manimaran.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Multiway Noticeboard with User Configure Features Using IOT & PC
AT Commands Supports AT commands
DELLSOFT Technologies Pvt. Ltd.
We enable Digitalization Thomas Hahn CERN Openlab, March 2016
Agenda Control systems defined
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
SHORT CIRCUIT MONITORING BY USING PLC & SCADA
Networking Devices.
SCADA DATA ACQUISTION MODULE
Securing the Network Perimeter with ISA 2004
DT80 range Modbus capability
Operating Systems (CS 340 D)
Cyber Physical Attack Detection
How SCADA Systems Work?.
Linux Operating System Architecture
Introduction to Networks
Cyber Security of SCADA Systems
Security in Networking
Universal Serial Bus Specification 1.0
DNP3 Overview What is DNP3? DNP3 Architecture Basics
SCADA Communication and Architecture Principles
Firewalls Routers, Switches, Hubs VPNs
NERC Cyber Security Standard
Substation Automation System
Moxa Embedded Solution on IEC 61850
Resilient Information Architecture Platform for Smart Grid
GMA Gas detection system
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Applying Policy-Based Intrusion Detection to SCADA Networks
Universal Serial Bus (USB)
Industrial Control Cross 11, Tapovan Enclave Nala pani Road, Dehradun : ,
Protection Mechanisms in Security Management
Cyber Security For Civil Engineering
Process Dynamics and Control:
Anatomy of Industrial Cyber Attacks
Presentation transcript:

Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain SCADA Security Products 28th February 2017 CDAC Mumbai

SCADA Security Products Sr. No. Product Name Category Features Suitable user agencies / customers Hardware & Software Requirements 1. Bump in the Wire (BiTW) Device Industrial control communication system security It can Secure the communication between RTU and MTU using SecKey-D (CDAC's Patient pending) protocol & Flexi-DNPSec Protocol Power Grid (Electric Substations) Power Generating Stations Distribution Agencies ARM Board Serial RS-232 Port 2. Vajram Tool Industrial control system security It can detect malicious polled response from the grid and the command manipulation Power Generation Stations Octave Psat Linux GTK 2 GiB RAM 20 GiB H/D 64 bit architecture

SCADA Architecture

Need of CDAC Products SCADA Vulnerabilities: Architectural vulnerabilities Security Policy vulnerabilities Software vulnerabilities Communication Protocol vulnerabilities Distributed Network Protocol ver 3 – DNP3 Lack of mechanisms for authentication, authorization and encryption Headers at different layers of the protocol can be manipulated for intrusions

Need of CDAC Products Cyber-Attack Incidents: March 1997: Worcester Air Traffic Communications Attack January 2000: Maroochy Shire Sewage Spill 2000 and 1982: Gas Pipelines in Russia/Soviet Union January 2003: Davis-Besse Ohio Nuclear Power Plant and the Slammer Worm August 2003: Northeast Power Blackout August 2005: Automobile plants and the Zotob Worm July 2010: Stuxnet attack at Iranian nuclear power plant July 2012: Northern grid failure in India (we can’t deny such a possibility)

SCADA Security Architecture BiTW Implementation DNP3 Packet DNP3 Packet Encrypted Traffic Encrypted Traffic

Need for SCADA Simulator (Vajram) Testing of developed security solutions directly on real power system is not feasible Bridges the Cyber-Physical divide by bringing in the Physical system inside the Cyber domain A grid is too complex to be set up with analog scaled down models Test environment using bulk power system components and control software is costly

SCADA Simulator Systems View Grid elements (bus, line, generators, loads, transformers) Power System and Analysis Tool (PSAT) can simulate electrical grid Takes a Matlab/Octave file as input It consist of initial configuration of grid elements constituting the system This is used for power flow analysis of the system under purview Outputs power-flow results for buses and lines

SCADA Simulator SCADA View MTU, RTUs, Sensors Grid is populated by multiple RTUs Each RTU is connected to a number of grid elements Grid elements are defined as structures The RTU conveys commands to grid elements RTU also transfers the data from grid elements to MTU Communication Protocol Protocol adaptor Mapping of packet elements to respective grid elements

Uses of Vajram Three uses of Power System simulator Traffic generator Comparator What-if analysis The security solution with Comparator and What-If modules is named as 'Vajram'

Traffic Generator

Vajram

Thank You