Challenges in Protecting Critical National Infrastructure from Cyber Attacks Singapore University of Technology and Design Aditya P Mathur September 27,

Slides:



Advertisements
Similar presentations
SCADA Security, DNS Phishing
Advertisements

Challenges in Ensuring the Security of Cyber Physical Systems Singapore University of Technology and Design Aditya P Mathur January 12, 2013 Birla Institute.
Cyber Physical Systems: Security and Safety
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
February 21, 2008 Center for Hybrid and Embedded Software Systems Cyber-Physical Systems (CPS): Orchestrating networked.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems Organizers: NC State University & UNC Chapel Hill.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
February 11, 2010 Center for Hybrid and Embedded Software Systems Cyber-Physical Systems (CPS): Orchestrating networked.
ITIS 6200/8200: Principles of Information Security and Privacy Dr. Weichao Wang.
SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2.
SMART OBJECTS Greg Berryman Erin Cavanaugh Mary Beth Mathias Matt Tryniecki.
Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology.
Cyber Threats/Security and System Security of Power Sector Workshop on Crisis & Disaster Management of Power Sector P.K.Agarwal, AGM Power System Operation.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
A sophisticated Malware Arpit Singh CPSC 420
Parsons: Design – Build - Protect Securing Critical Infrastructure Phil Lacombe.
CYBER - PHYSICAL SECURITY
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Contribution of Computing to Society Contribution of Computing to Society n Medicine: telemedicine, medical informatics, bioinformatics, diagnosis and.
Security and Privacy for Implantable Medical Devices Presented by : Dilip Simha.C.R.
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Dr. Fei Hu { Department of Electrical and Computer Engineering University of Alabama Tuscaloosa, Alabama Introduction to.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Initializing….
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
NIST Cyber-Physical Systems Public Working Group: Draft CPS Framework
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
1 Healthcare and Cyber Security 2015: Is India Ready? Nitish Chandan Int. B.Tech CSE + LL.B Hons. Cyber Law (UPES, Dehradun) Founder & Technical Writer.
Required and Elective Courses in Power Area. Required Power Courses u ECE 320/321 Energy Systems I/Energy Systems I lab: Covers single-phase AC measurements,
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cyber Physical Systems: Security and Safety Zia Saquib, PhD Centre for Development of Advanced TIFR, May 6, 2016.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
Myongji University HMCL
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
Data and Security Workshop Digital Transformation and Security Challenges Prof. Daniel Kofman Co-founder and Director of LINCS CEO of ICT4V International.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Industrial Control Systems.
ANSI – ESOs meeting Washington February 2017
Week 1 Lecture 1 – Challenges in Security of Cyber Physical Systems
How Secure Is Our Power Grid?
Agenda Control systems defined
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
How SCADA Systems Work?.
Report by: Katiuscia Zedda
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Broad Emerging Themes in CPS/IoT
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
Applying Policy-Based Intrusion Detection to SCADA Networks
Cyber Security For Civil Engineering
Anatomy of Industrial Cyber Attacks
Presentation transcript:

Challenges in Protecting Critical National Infrastructure from Cyber Attacks Singapore University of Technology and Design Aditya P Mathur September 27, Amity University, India

Attacks : Tehama colusa canal, Willows, CA, USA2007: Tehama colusa canal, Willows, CA, USA; damaged computer to divert water from the Sacremento river 2006: Harrisburg water filtering plant2006: Harrisburg water filtering plant, Harrisburg, USA, intruder planted malware that could affect plant’s water treatment operations. 2001: Queensland Australia, 2001: Queensland Australia, 264,000 gallons of sewage released in rivers and parks. 2012: North Pole Toys: Aimed at a toy manufacturing company 2008: Stuxnet: Aimed at the Iranian nuclear enrichment plant

Questions of interest 3 What is a Cyber Physical System (CPS)? What are the key challenges in securing CPS? Are there any fundamental design principles that ought to be used when designing or upgrading a CPS?

CPS: An abstract view 4 Plant Monitoring and Control [SCADA, PLC, HMI, etc.] system Data and control

CPS: Examples 5 Water treatment and distribution Healthcare: Pacemaker, defibrillator, insulin pump, etc. Energy: Power generation, distribution, smart metering Transportation: Driverless cars, networked traffic systems, etc.

Laboratory CPS: At SUTD 6

CPS: Systems View 7 Physical System Control System SensorActuator y: system output u:control input x: system state Estimation and control : Network x k+1 =Ax k +Bu k y k =Cx k +v k

CPS Network-based Attacks 8 Physical System Sensor Control System Actuator y’ not y: Sensor compromised u’ not u controller compromised Network jammed Controller compromised

Existing Techniques 9 Authentication Digital signatures Access control Intrusion detection Prevention

Attacks on CPS: Challenge 1 10 How to detect? How to control given that data corruption is detected? Physical System Sensor Control System Actuator y’ not y: Sensor compromised

Attacks on CPS-Challenge 2 11 Controller compromised How to safeguard the physical system? Physical System Sensor Control System Actuator u’ not u controller compromised

Attacks on CPS-Challenge 3 12 Control channel compromised How to safeguard the physical system? Physical System Sensor Control System Actuator u’ not u controller channel compromised

Design Principles: Just a few for now Include an orthogonal protection system using Intelligent Checkers [Sabaliauskaite-Mathur, CSP2013]. 13 Use a failure based design method to identify critical components that ought to be protected against cyber attacks.

Questions? 14

References [Sample] Secure Control: Towards Survivable Cyber-Physical Systems. Alvaro A. Ca ́rdenas Saurabh Amin Shankar Sastry, The 28th International Conference on Distributed Computing Systems Workshop, IEEE Common Cybersecurity Vulnerabilities in Industrial Control Systems. US Department of Homeland Security. May Cyber-Physical Systems Security for Smart Grid. White Paper. Manimaran Govindarasu, Adam Hann, and Peter Sauer. February Improving the Security and Privacy of Implantable Medical Devices, William H. Maisel and Tadayoshi Kohno, New England Journal of Medicine 362(13): , April Guide to Industrial Control Systems (ICS) Security. Keith Stouffer, Joe Falco, and Karen Scarfone. NIST June 2011.