David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.

Slides:



Advertisements
Similar presentations
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Guide to Network Defense and Countermeasures Second Edition
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
A Survey on Interfaces to Network Security
Joel Maloff Phone.com February, 2012.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Introduction to Honeypot, Botnet, and Security Measurement
Market Analysis Decision Group.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
1 Secure Ad-Hoc Network Eunjin Jung
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
Www. engineersportal.in. OUTLINES Network & Network Security Need of Network Security Methods of Network Security Firewall Firewall’s Works Firewall’s.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
1 A Network Security Monitor Paper By: Heberlein et. al. Presentation By: Eric Hawkins.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Computer Security By Duncan Hall.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Confidential Rapid Troubleshooting for Data, VoIP, and Video VoIP Performance Manager.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Myongji University HMCL
Network Security Analysis Name : Waleed Al-Rumaih ID :
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Network Attacks Dylan Small.
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
I have many checklists: how do I get started with cyber security?
Internet of Things Vulnerabilities
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
Presentation transcript:

David Grochocki et al

 Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just a click away

Survey Various Threats Identify Common Attack Techniques Decompose the data to form a Attack Tree Identify the required information which would detech the attacks Model an IDS

 Communication between NAN and Gateway (DCU) – Mostly or sometimes  Communication between Gateway (DCU) and Utility company – 3G, Edge, WiMax.  NAN Mesh offers reliability and robustness  But.,  Complicates Security Monitoring Solution  Few smart meter vendors distribute meters which can report to the utility company directly through user’s home internet.

 Access to a communication infrastructure other than Internet  Access to millions of low computation devices  Access to sensitive customer information  High visibility and Impact  Financial Value of Consumption data

 5 Attack motivations  30 Unique attack techniques  Relevant ones to AMI are alone considered

Survey Various Threats Identify Common Attack Techniques Decompose the data to form a Attack Tree Identify the required information which would detech the attacks Model an IDS

 DDoS attack  Stealing Customer Information  Remote Disconnection

 Why?  Results in data outage for many Meters  How?  Install malware on meter or remote network exploit  Co-ordinate DDoS among compromised meters  Flood DCU with large packets

 Why?  Eavesdropping, Social Engineering  How?  Stealing encryption keys of the smart meter by physically tampering or bruteforcing the cryptosystem  Capture AMI traffic  Decrypt to obtain clear text information

 Why?  Distrupt Business, Inflict loss  How?  Installing malware on the DCU through physical tampering or by exploiting a network vulnerability  Identify the meters with corresponding address information  Use that information to disconnect targeted users

Survey Various Threats Identify Common Attack Techniques Decompose the data to form a Attack Tree Identify the required information which would detech the attacks Model an IDS

 System Information  CPU Usage, Battery Level, Firmware Intergrity, Clock Synchronisation  Network Information  NAN Collision rate, Packet loss  Policy Information  Authorized AMI devices, Authorized Updates, Address Mappings, Authorized services

Survey Various Threats Identify Common Attack Techniques Decompose the data to form a Attack Tree Identify the required information which would detech the attacks Model an IDS

 Centralized IDS Model Utility Company IDS DCU

 Can detect attacks against Utility network  But, will miss attacks against smart meters

DCU Meter + IDS Meter Meter + IDS

 Will have access to meter specific information  But.,  Attacks on DCU cannot be detected  Functioning both as a meter and IDS can be resource intensive  Keys of all other meters have to be stored in Meter + IDS devices to inspect data  Not a good idea to store some one’s decryption key on some one else’s meter

DCU Meter IDS Meter IDS

 More processing power  Less number of IDS sensors required  So less number of places where keys are stored  But still, Attacks on DCU are not detected

DCU Meter IDS Meter IDS Utility Company IDS

 Either Centralized + Embedded or Centralized + Dedicated sensors  Can detect both attacks at both (DCS and NAN) ends

 According to the architecure discussed in this paper, DCU is the device which is more likely to have a Public IP address  Smart meter vendors or third parties may soon start integrating or GSM/3G into smart meters  But, why?

 Banner Grabbing!  SHODAN – Exponse Online Devices  Ipv4 computer search engine  Webcams, Routers, Power Plants, iPhones, Wind Turbines, Refrigerators, VoIP Phones