SlideShare a Scribd company logo
Danielle Gonzalez ✦ Fawaz Alhenaki ✦ Mehdi Mirakhorli
An Empirical Study based on Disclosed Software Vulnerabilities
Architectural Security Weaknesses
in Industrial Control Systems (ICS)
IEEE International Conference on Software Architecture (ICSA)
Hamburg, Germany March 2019
2
What Are Industrial Control Systems (ICS)?
ICS often support critical infrastructure:
• Manufacturing
• Oil & Gas Production
• Chemical Processing
• Electrical Power Grids
• Transportation
• More!
Architecture of Industrial Control Systems (ICS)
Human Machine Interface (HMI)
Engineering
Workstations
Data Historian Supervisory Control & Data
Acquisition (SCADA) Server
Switched Telephone,
Leased Line or Power Line
Based Communication
Radio, microwave,
or cellular
Satellite
Wide area network
Communication
Routers
Control Center
PLC
Field Site 1
RTU
Field Site 2
Wan Card
Modem
IED
Field Site 3
Modem
3
The PLCs, RTUS etc.
communicate with the
SCADA server using
industrial communication
protocols (Fieldbus)
2
HMIs are used by Humans to
configure the plant, troubleshoot
problems, run/stop/update
programs, and recover from failures
3
The Data Historian logs daily operational
data used for analysis & diagnosis
4
Programmable Logic
Controllers (PLCs) & Remote
Terminal Units (RTUs)
connect to sensors & actuators
1
4
Security of Industrial Control Systems
ICS often support critical infrastructure:
• Manufacturing
• Oil & Gas Production
• Chemical Processing
• Electrical Power Grids
• Transportation
• More!
Implications
1. Security is a key concern
2. Attacks can affect national
safety & economics
3. Cannot be easily taken offline
for updates or patches
IEEE
Attacks to ICS infrastructures have exponentially
increased from a few to hundreds per year
Stouffer, Keith, Joe Falco, and Karen Scarfone. "Guide to industrial control systems (ICS) security." NIST special publication 800.82 (2011): 16-16.
Yang, Wen, and Qianchuan Zhao. "Cyber security issues of critical components for industrial control system." Proceedings of 2014 IEEE Chinese Guidance,
Navigation and Control Conference. IEEE, 2014.

Recommended for you

RF_NEC
RF_NECRF_NEC
RF_NEC

The Radiflow-NEC solution uses two-factor authentication and firewall rules enforced by Radiflow routers to securely limit industrial control system access during remote or on-site maintenance to specific devices and commands. NEC's physical security solutions combine with Radiflow's ruggedized routers to authenticate technicians' identities and continuously monitor their locations, only granting access to the devices and areas necessary to perform maintenance tasks. Any violations of the rules are instantly blocked and alerts are sent to the control center along with network traffic logs and video footage.

1678 1683
1678 16831678 1683
1678 1683

This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.

Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System

This document summarizes an embedded web server based interactive data acquisition and control system. The system uses an ARM9 processor running RTLinux to both acquire data from sensors and control industrial devices. It allows remote monitoring and control via a web browser. The ARM9 handles data acquisition, control functions, and an embedded web server simultaneously. Analog sensor signals are converted to digital with an ADC and stored in external memory. The web server portion allows clients to access the stored data and send control instructions via HTML pages. This embedded single-board solution provides reliable real-time data acquisition and remote control capabilities with low resource usage.

rtlinux rtosembedded web serverembedded arm9 processor
5
Examining Architectural Security Weaknesses in ICS
Dataset:
988 Security Advisories mined from the Industrial Control System
Cyber Emergency Response Team (ICS-CERT) repositories
RQ 1: Which ICS Components are Most Vulnerable?
RQ 2: What Percentage of ICS Vulnerabilities had Architectural Root Causes?
RQ 3: What are the Most Common Architectural Weaknesses in ICS?
RQ 4: Which Architectural Tactics are Most Often Compromised in ICS?
Research Questions:
6
Industrial Control System Advisories (ICSA)
ICS vendors maintain advisories to report
security issues in their products
Advisory (ICSA-16-336-06)
OVERVIEW:
Alexey Osipov and Ilya Karpov of Positive Technologies have identified
vulnerabilities in Rockwell Automation’s Allen-Bradley MicroLogix 1100 and
1400 programmable logic controller (PLC) systems. Rockwell Automation has
produced new firmware versions to mitigate some of the vulnerabilities.
AFFECTED PRODUCTS:
1763-L16AWA, Series A and B, Version 14.000 and prior versions;
1763-L16BBB, Series A and B, Version 14.000 and prior versions;
[...]
IMPACT:
Successful exploitation of these vulnerabilities may allow a remote attacker to
gain unauthorized access to affected devices, as well as impact the availability
of affected devices.
VULNERABILITY CHARACTERIZATION:
CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION (CWE-319)
User credentials are sent to the web server in clear text, which may allow an
attacker to discover the credentials if they are able to observe traffic between
the web browser and the server.
EXPLOITABILITY:
These vulnerabilities could be exploited remotely.
[…]
Root
Cause
Common
Weakness
Enumeration
(CWE)
ICS-CERT collects these and
assigns them an ICSA identifier
7
Identifying Vulnerable Components
A manual review process was used to identify ICS products and alternative names/abbreviations
Resources reviewed:
• Architectural documents of existing ICS products
• Reseach papers
• ICS application standards
17 components identified
§ 7 “common”
§ 10 “optional/variants”
8
Component Specification
CommonComponents
Engineering
workstation
Reliable software designed for configuration, maintenance
and diagnostics of the control system applications and
equipment.
Data Historian
(HIST)
A system for logging all data in an ICS environment, this
data might be uses for analysis later.
Human-machine
Interface (HMI)
User interface that allows engineers and operators to
interact with the controller.
Intelligent
Electronic Device
A smart industrial device capable of acquiring data,
communicating with other devices, and automating
industrial processes.
Programmable
Logic Controllers
(PLC)
A solid-state control system often used in assembly lines,
or robotic devices, or activities that require high reliability
control, ease of programming and process fault diagnosis.
RTU (Remote
Terminal Unit)
Used to communicate with remote field equipment. PLCs
with radio communication capabilities are also used in
place of RTUs.
Supervisory
control software
(SCADA)
A system performing control functions used to control
dispersed assets using centralized data acquisition and
supervisory control.
Common
Industrial
Protocol (CIP)
Provides a set of services & messages for control, security,
synchronization, configuration, information that can be
integrated into networks.
Device Type
Manager
A driver-like software that provides an interface for device
configurations, maintenance, diagnostics &
troubleshooting.
Component Specification
CommonComponents
Engineering
workstation
Reliable software designed for configuration, maintenance
and diagnostics of the control system applications and
equipment.
Data Historian
(HIST)
A system for logging all data in an ICS environment, this
data might be uses for analysis later.
Human-machine
Interface (HMI)
User interface that allows engineers and operators to
interact with the controller.
Intelligent
Electronic Device
A smart industrial device capable of acquiring data,
communicating with other devices, and automating
industrial processes.
Programmable
Logic Controllers
(PLC)
A solid-state control system often used in assembly lines,
or robotic devices, or activities that require high reliability
control, ease of programming and process fault diagnosis.
RTU (Remote
Terminal Unit)
Used to communicate with remote field equipment. PLCs
with radio communication capabilities are also used in
place of RTUs.
Supervisory
control software
(SCADA)
A system performing control functions used to control
dispersed assets using centralized data acquisition and
supervisory control.
Common
Industrial
Protocol (CIP)
Provides a set of services & messages for control, security,
synchronization, configuration, information that can be
integrated into networks.
Device Type
Manager
A driver-like software that provides an interface for device
configurations, maintenance, diagnostics &
troubleshooting.
Distributed
Control Systems
(DCS)
SACAD variant, microprocessor based units distributed
functionally & geographically over the plant, situated near
area where control or data gathering functions being
performed.
Distributed
Network Protocol
a widely used protocol in electricity and/or water and
waste water treatment plants with three layers (data link,
Terminal Unit)
with radio communication capabilities are also used in
place of RTUs.
Supervisory
control software
(SCADA)
A system performing control functions used to control
dispersed assets using centralized data acquisition and
supervisory control.
Variation
Common
Industrial
Protocol (CIP)
Provides a set of services & messages for control, security,
synchronization, configuration, information that can be
integrated into networks.
Device Type
Manager
A driver-like software that provides an interface for device
configurations, maintenance, diagnostics &
troubleshooting.
Distributed
Control Systems
(DCS)
SACAD variant, microprocessor based units distributed
functionally & geographically over the plant, situated near
area where control or data gathering functions being
performed.
Distributed
Network Protocol
(DNP3)
a widely used protocol in electricity and/or water and
waste water treatment plants with three layers (data link,
application, and transport layer).
Fieldbus
A digital, serial, multi-drop, two-way data bus between
field equipment,. sensors, transducers, actuators, control
room devices.
Modbus
The de facto ICS communications protocol that uses serial
communications with PLCs.
Object Linking &
Embedding
(OLE) for Process
Control (OPC)
A set of open standards developed to promote
interoperability between disparate field devices,
automation/control, and business systems.
PAC
a "mashup" between a PC and a PLC in that it typically
offers the benefits of both in a single package.
Process Control
System (PCS)
SCADA variant, typically rack-mounted, processes sensor
input, executes control algorithms, and computes actuator
outputs.
Real time OS Operating System
Common Components
Optional / Variant ComponentsICS Components Used in This Study

Recommended for you

Supervisory control and data acquisition
Supervisory control and data acquisitionSupervisory control and data acquisition
Supervisory control and data acquisition

This document provides an overview of SCADA (Supervisory Control and Data Acquisition) systems. It describes the basic hardware and software architecture of SCADA, including distributed databases, data servers, PLCs, and control programs in the field. The document also outlines key SCADA functionality such as access control, HMI, trending, alarm handling, logging, archiving, report generation, and automation capabilities. SCADA systems are typically used in industrial processes and facilities to monitor and control equipment and processes.

Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System

A Distributed Control System (DCS) integrates multiple process controllers and PLCs to monitor and control distributed equipment remotely. There are several types of DCS including Smart DCS and SixTrak IPm. When choosing a DCS system, factors like reliability, compatibility, graphical interface, processing speed, cost and ease of use must be considered. DCS systems have advantages like robustness, flexibility and security but also disadvantages like component costs and difficulty of programming and maintenance. Major DCS manufacturers include Honeywell, ABB and Siemens. In Saudi Arabia, DCS systems are used by companies like Saudi Aramco, power plants and factories.

SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology

SCADA systems are one of the most important part of industrial operations. Before SCADA, plant personnel had to monitor and control industrial process via selector switches, pushbuttons and dials for analog signals. As manufacturing grew and sites became more remote, relays and timers were used to assist supervision. With the onset of technology and advent of network based protocols, these systems became more reliable, fast and it became easy to troubleshoot problems. Indeed progress also brings vulnerabilities, which was no new for SCADA. The IP protocols brought threat to the security of these systems. The devastation that cyber predators on SCADA can inflict, could be illustrated by the Stuxnet virus attack. This paper discusses what SCADA systems are, their uses, protocols being used by these systems, vulnerabilities and ways to combat those vulnerabilities. It focusses on the use of Blockchain Technology as a step in security of such systems. Diksha Chhonkar | Garima Pandey "SCADA Systems: Vulnerabilities and Blockchain Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31586.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31586/scada-systems-vulnerabilities-and-blockchain-technology/diksha-chhonkar

computer securityscada systemsvulnerabilities
9
Identifying Vulnerable Components
ICS Component Terms in Dictionary
Programmable Logic
Controllers
Programmable Logic Controllers, PLC, control loop, logic
controller
Distributed Control
Systems
Distributed Control Systems, DCS, digital processor control
system, process manager
Fieldbus Fieldbus, Field Device
Supervisory Control
Software
Supervisory control software, SCADA, supervisory control
and data acquisition
Human-machine Interface
Human-machine Interface, HMI, Human Machine Interface,
Web Interface, operator
Remote Terminal Unit Remote Terminal Units, RTUs, RTU, Remote Terminal Unit
Data Historian
data historian, Operational Historian, HIST, process data
archive, historian
Sample of Component-Term Dictionary
Component-Term DictionaryText Data from Advisories
ICS Component Terms in Dictionary
Programmable Logic
Controllers
Programmable Logic Controllers, PLC, control loop, logic
controller
Distributed Control
Systems
Distributed Control Systems, DCS, digital processor control
system, process manager
Fieldbus Fieldbus, Field Device
Supervisory Control
Software
Supervisory control software, SCADA, supervisory control
and data acquisition
Human-machine Interface
Human-machine Interface, HMI, Human Machine Interface,
Web Interface, operator
Remote Terminal Unit Remote Terminal Units, RTUs, RTU, Remote Terminal Unit
Data Historian
data historian, Operational Historian, HIST, process data
archive, historian
Text Processing Script (Keyword Search)
55.06% of reports
mentioned at least 1 of the
17 components
10
RQ1: Which ICS Components are Most Vulnerable?
Real
tim
e
Variation
Common
Industrial
Protocol (CIP) 13
Device Type
Manager 14
Distributed
Control
Systems 16
DNP3
(Distributed
Network
Protocol) 39
Fieldbus 18
Modbus 31
OPC (OLE for Process
Control) 57 PAC 6
Process Control
System (PCS) 42
Common Components
Engineering
workstation 15
HIST 25
HMI 257 Intelligent
Electronic
device 3
Master
Terminal Unit
(MTU) 8Programmable Logic Controllers
(PLC) 114
RTU (Remote
Terminal Unit)
32
SCADA (Supervisory control software) 212
ICS Component # of Reports
Human-machine Interface (HMI) 257
Supervisory Control Software (SCADA) 212
Programmable Logic Controllers (PLC) 114
OLE for Process Control (OPC) 57
Process Control System (PCS) 42
Distributed Network Protocol (DNP3) 39
Remote Terminal Unit (RTU) 32
Modbus 31
Data Historian (HIST) 25
Building Automation System (BAS) 19
10 Most Vulnerable ICS Components
11
RQ2: What % of ICS Vulnerabilities had an Architectural Root Cause?
https://cwe.mitre.org/data/definitions/1008.html
Santos, J. C. S., Peruma, A., Mirakhorli, M., Galster, M. and Sejfia, A.. "Understanding
Software Vulnerabilities Related to Architectural Security Tactics: An Empirical
Investigation of Chromium, PHP and Thunderbird.". pages 69 - 78. 2017 IEEE
International Conference on Software Architecture (ICSA). 2017.
Common Architectural Weakness Enumeration
12
Identifying ICS Advisories with Architectural Root Causes
Text Data from Advisories
CAWE Mapping
https://cwe.mitre.org/data/definitions/1008.html
RQ2: What % of ICS Vulnerabilities had an Architectural Root Cause?
62.86% (540) of ICS Advisories were
associated with 1 or more architectural
weakness (CAWE)
IDs in the text
were mapped to
the IDs in the
CAWE catalog

Recommended for you

DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions

Industrial control systems like SCADA are critical to national infrastructure but pose security challenges. They control crucial systems like pipelines and electrical utilities. While initially proprietary, SCADA systems now use open standards and IT components, making them vulnerable to cyber attacks which could have catastrophic impacts. A defense-in-depth strategy is needed, combining network segmentation, firewalls, log collection, and host and network intrusion prevention/detection to secure these vital systems.

dts solutionuaescada security
Semester syllabus
Semester syllabusSemester syllabus
Semester syllabus

This document provides an overview of SCADA (Supervisory Control and Data Acquisition) systems. It discusses key components of SCADA including field instrumentation, remote stations, communication networks, and central monitoring stations. It also describes common SCADA configurations, modes of communication, and differences between SCADA and DCS systems. The goal is to introduce SCADA basics and provide context for those familiar and unfamiliar with these systems.

[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security

Bogdan Matache is a cyber security specialist with over 15 years of experience in IT, energy, and industrial control systems. He has penetration tested and hacked several industrial control and IoT systems, including fuel pumps, asphalt stations, cars, drones, and smart home devices. Matache now works as an auditor at EnerSec, focusing on cyber security for the energy sector. He discusses the growth of IoT and risks of attacks against availability, integrity and confidentiality in both SCADA and IoT systems. Matache also outlines common attack types, hardware, software and malware used to target these systems.

owasp_eeeowaspiot
13
RQ3: What is the Most Common Architectural Weakness in ICS?
Tactic CAWE Frequency
Validate Inputs CAWE-20 Improper Input Validation 142
Validate Inputs CAWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 75
Authenticate Actors CAWE-287 Improper Authentication 70
Authorize Actors CAWE-284 Improper Access Control 63
Validate Inputs CAWE-352 Cross-Site Request Forgery (CSRF) 45
Authenticate Actors CAWE-798 Use of Hard-coded Credentials 44
Validate Inputs CAWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 37
Authenticate Actors CAWE-259 Use of Hard-coded Password 20
Encrypt Data CAWE-522 Insufficiently Protected Credentials 18
Validate Inputs CAWE-94 Improper Control of Generation of Code ('Code Injection') 17
Authenticate Actors CAWE-306 Missing Authentication for Critical Function 16
Authorize Actors CAWE-434 Unrestricted Upload of File with Dangerous Type 14
Authorize Actors CAWE-269 Improper Privilege Management 13
Encrypt Data CAWE-326 Inadequate Encryption Strength 13
Encrypt Data CAWE-312 Cleartext Storage of Sensitive Information 12
Validate Inputs CAWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 12
Authorize Actors CAWE-285 Improper Authorization 11
Encrypt Data CAWE-319 Cleartext Transmission of Sensitive Information 10
Encrypt Data CAWE-311 Missing Encryption of Sensitive Data 10
Encrypt Data CAWE-256 Unprotected Storage of Credentials 10
26.29%
of reports
with
CAWEs
20 Most Common Architectural Weaknesses in ICS
14
RQ4: Which Architectural Tactic Implementations are
Compromised Most Often in ICS?
Tactic Frequency
Validate Inputs 199
Encrypt Data 104
Authenticate Actors 93
Authorize Actors 73
Limit Access 12
Cross-Cutting 7
Identify Actors 6
Manage User Sessions 6
Verify Message Integrity 4
Audit 1
• We found ICS Advisories associated with 10 of
the 12 Architectural Tactics
• From the 540 ICS Advisories associated with
CAWEs, 3 tactics were compromised most often.
10 Compromised Architectural Tactics
15
How do these findings compare to those for Enterprise Web Applications?
Architectural Weaknesses in ICS
To understand if the top weaknesses were unique to ICS,
we mapped our CAWE findings to the CWEs in the OWASP
Top 10 risks from 2017
4 of our top 20 could
not be mapped,
including our #1
weakness
Improper Input
Validation
OWASP Top 10 ICS Architectural Weaknesses
A1-Injection
• Rank#7: CWE-89 SQL Injection
• Rank#10: CWE-94 Code Injection
• Rank#16: CWE-78 OS Command Injection
A2-Broken Authentication
• Rank#3: CWE-287 Improper Authentication
• Rank#9: CWE-522 Insufficiently Protected
Credentials
• Rank#11: CWE-306 Missing Authentication of
Critical Function
• Rank#20: CWE-256 Unprotected Storage of
Credentials
• Rank#6: CWE-798 Use of Hard-coded
Credentials
• Rank#8: CWE-259 Use of Hard-coded Password
A3-Sensitive Data Exposure
• Rank#15: CWE-312 Cleartext Storage of
Sensitive Info.
• Rank#18: CWE-319 Cleartext Transmission
of Sensitive Info.
• Rank#19: CWE-311 Missing Encryption of
Sensitive Data
A4-XML External Entities (XXE) N/A
A5-Broken Access Control
• Rank#4: CWE-284 Improper Access Control
• Rank#13: CWE-269 Improper Privilege
Management
• Rank#17: CWE-285 Improper Authorization
A6-Security Misconfiguration N/A
A7-Cross-Site Scripting (XSS) • Rank#2: CWE-79 Cross-site Scripting
A8-Insecure Deserialization N/A
A9-Using Vulnerable Components N/A
A10-Insufficient Logging N/A
16
Summary & Implications for Practitioners
Most Vulnerable ICS Components Most Frequently Compromised Architectural Tactics
1. Isolate Control System Devices and/or Systems from Untrusted Networks
2. Sanitize User’s Inputs to ICS Components and Devices
3. Encrypt Sensitive Data
4. Secure ICS Endpoints
5. Follow a Tactic-centric Approach to ICS Security
6. Use a Protected Network Environment for Unpatched Devices
Implications for Practitioners
62.86% (540) of ICS Advisories studied were associated with 1 or more architectural weakness (CAWE)
Most Common Architectural Weaknesses in ICS

Recommended for you

Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities

The document discusses standards for cybersecurity in the energy sector. It notes that threats are increasing as energy infrastructure becomes more connected and data-driven. The document outlines some key cybersecurity standards for the energy industry including NERC CIP, IEEE1686, and IEC 62351. It maps these standards based on their level of technical detail and completeness. The document also discusses best practices for cybersecurity including technological and operational controls and how standards relate to controls for protection, detection and response.

nerccipnetworkinginformation security
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid

This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.

cyber securitypower systempower grid
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod

Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options. We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.

network securitynuclear power systemsmart grid security
Danielle Gonzalez ✦ Fawaz Alhenaki ✦ Mehdi Mirakhorli
An Empirical Study based on Disclosed Software Vulnerabilities
Architectural Security Weaknesses
in Industrial Control Systems (ICS)
IEEE International Conference on Software Architecture (ICSA)
Hamburg, Germany March 2019
Questions? Contact dng2551@rit.edu or mxmvse@rit.edu
@dngonza
18
Common Weakness Enumeration
https://cwe.mitre.org
https://cwe.mitre.org/data/definitions/20.html
19
Data Model

More Related Content

What's hot

Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
RootedCON
 
Scada, a PLC's story
Scada, a PLC's storyScada, a PLC's story
Scada, a PLC's story
Paolo Stagno
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA Presentation
Eric Favetta
 
RF_NEC
RF_NECRF_NEC
RF_NEC
Ayal Vogel
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
IOSR Journals
 
Supervisory control and data acquisition
Supervisory control and data acquisitionSupervisory control and data acquisition
Supervisory control and data acquisition
udaykmr
 
Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System
3abooodi
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
Shah Sheikh
 
Semester syllabus
Semester syllabusSemester syllabus
Semester syllabus
bramesh316
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
P K Agarwal
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
ClubHack
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanisms
Aleksandr Timorin
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentesters
Positive Hack Days
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
Peter Wood
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
Narinrit Prem-apiwathanokul
 

What's hot (19)

Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
 
Scada, a PLC's story
Scada, a PLC's storyScada, a PLC's story
Scada, a PLC's story
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA Presentation
 
RF_NEC
RF_NECRF_NEC
RF_NEC
 
1678 1683
1678 16831678 1683
1678 1683
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
Supervisory control and data acquisition
Supervisory control and data acquisitionSupervisory control and data acquisition
Supervisory control and data acquisition
 
Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Semester syllabus
Semester syllabusSemester syllabus
Semester syllabus
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanisms
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentesters
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 

Similar to ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems

Power system automation
Power system automationPower system automation
Power system automation
Abbas Ali
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
Uchi Pou
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
ssuser1831ba
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
bhavuksharma10
 
SCADA
SCADASCADA
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
IJSRED
 
A presentation on scada system
A presentation on scada systemA presentation on scada system
A presentation on scada system
IIT INDORE
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
Embitel Technologies (I) PVT LTD
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
IJARIIT
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
RapidAcademy
 
SCAD system (overview)
SCAD system (overview)SCAD system (overview)
SCAD system (overview)
Hassen Lazhar
 
Design and simulation of remote monitoring of the intelligent automatic contr...
Design and simulation of remote monitoring of the intelligent automatic contr...Design and simulation of remote monitoring of the intelligent automatic contr...
Design and simulation of remote monitoring of the intelligent automatic contr...
IAESIJAI
 
scada system
scada system scada system
scada system
surangagw
 
Practical Troubleshooting & Problem Solving of Industrial Data Communications
Practical Troubleshooting & Problem Solving of Industrial Data CommunicationsPractical Troubleshooting & Problem Solving of Industrial Data Communications
Practical Troubleshooting & Problem Solving of Industrial Data Communications
Living Online
 
Scada system ( Overview )
Scada system ( Overview )Scada system ( Overview )
Scada system ( Overview )
Ali Al Sarraf
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
Nir Cohen
 
Dcs vs scada
Dcs vs scadaDcs vs scada
Dcs vs scada
Sayed Qaisar Shah
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
NiMa Bagheriasl
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
DelforChacnCornejo
 
Introduction To SCADA
Introduction To SCADAIntroduction To SCADA
Introduction To SCADA
Kunal gupta
 

Similar to ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems (20)

Power system automation
Power system automationPower system automation
Power system automation
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
 
SCADA
SCADASCADA
SCADA
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
A presentation on scada system
A presentation on scada systemA presentation on scada system
A presentation on scada system
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
 
SCAD system (overview)
SCAD system (overview)SCAD system (overview)
SCAD system (overview)
 
Design and simulation of remote monitoring of the intelligent automatic contr...
Design and simulation of remote monitoring of the intelligent automatic contr...Design and simulation of remote monitoring of the intelligent automatic contr...
Design and simulation of remote monitoring of the intelligent automatic contr...
 
scada system
scada system scada system
scada system
 
Practical Troubleshooting & Problem Solving of Industrial Data Communications
Practical Troubleshooting & Problem Solving of Industrial Data CommunicationsPractical Troubleshooting & Problem Solving of Industrial Data Communications
Practical Troubleshooting & Problem Solving of Industrial Data Communications
 
Scada system ( Overview )
Scada system ( Overview )Scada system ( Overview )
Scada system ( Overview )
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Dcs vs scada
Dcs vs scadaDcs vs scada
Dcs vs scada
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
Introduction To SCADA
Introduction To SCADAIntroduction To SCADA
Introduction To SCADA
 

Recently uploaded

Overview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptxOverview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptx
Mitchell Marsh
 
Seamless PostgreSQL to Snowflake Data Transfer in 8 Simple Steps
Seamless PostgreSQL to Snowflake Data Transfer in 8 Simple StepsSeamless PostgreSQL to Snowflake Data Transfer in 8 Simple Steps
Seamless PostgreSQL to Snowflake Data Transfer in 8 Simple Steps
Estuary Flow
 
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdfResponsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Trackobit
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
DNUG e.V.
 
Splunk_Remote_Work_Insights_Overview.pptx
Splunk_Remote_Work_Insights_Overview.pptxSplunk_Remote_Work_Insights_Overview.pptx
Splunk_Remote_Work_Insights_Overview.pptx
sudsdeep
 
ENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentationENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentation
sofiafernandezon
 
Intro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AIIntro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AI
Ortus Solutions, Corp
 
CViewSurvey Digitech Pvt Ltd that works on a proven C.A.A.G. model.
CViewSurvey Digitech Pvt Ltd that  works on a proven C.A.A.G. model.CViewSurvey Digitech Pvt Ltd that  works on a proven C.A.A.G. model.
CViewSurvey Digitech Pvt Ltd that works on a proven C.A.A.G. model.
bhatinidhi2001
 
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
Semiosis Software Private Limited
 
WEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service ProvidersWEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service Providers
Severalnines
 
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdfWhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
onemonitarsoftware
 
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial CompanyNBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Softwares
 
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdfIndependence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
Livetecs LLC
 
Cultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational TransformationCultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational Transformation
Mindfire Solution
 
dachnug51 - Whats new in domino 14 .pdf
dachnug51 - Whats new in domino 14  .pdfdachnug51 - Whats new in domino 14  .pdf
dachnug51 - Whats new in domino 14 .pdf
DNUG e.V.
 
Folding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a seriesFolding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a series
Philip Schwarz
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
DNUG e.V.
 
React Native vs Flutter - SSTech System
React Native vs Flutter  - SSTech SystemReact Native vs Flutter  - SSTech System
React Native vs Flutter - SSTech System
SSTech System
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
sudsdeep
 
Break data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud ConnectorsBreak data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud Connectors
confluent
 

Recently uploaded (20)

Overview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptxOverview of ERP - Mechlin Technologies.pptx
Overview of ERP - Mechlin Technologies.pptx
 
Seamless PostgreSQL to Snowflake Data Transfer in 8 Simple Steps
Seamless PostgreSQL to Snowflake Data Transfer in 8 Simple StepsSeamless PostgreSQL to Snowflake Data Transfer in 8 Simple Steps
Seamless PostgreSQL to Snowflake Data Transfer in 8 Simple Steps
 
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdfResponsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
 
Splunk_Remote_Work_Insights_Overview.pptx
Splunk_Remote_Work_Insights_Overview.pptxSplunk_Remote_Work_Insights_Overview.pptx
Splunk_Remote_Work_Insights_Overview.pptx
 
ENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentationENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentation
 
Intro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AIIntro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AI
 
CViewSurvey Digitech Pvt Ltd that works on a proven C.A.A.G. model.
CViewSurvey Digitech Pvt Ltd that  works on a proven C.A.A.G. model.CViewSurvey Digitech Pvt Ltd that  works on a proven C.A.A.G. model.
CViewSurvey Digitech Pvt Ltd that works on a proven C.A.A.G. model.
 
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
 
WEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service ProvidersWEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service Providers
 
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdfWhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
 
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial CompanyNBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial Company
 
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdfIndependence Day Hasn’t Always Been a U.S. Holiday.pdf
Independence Day Hasn’t Always Been a U.S. Holiday.pdf
 
Cultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational TransformationCultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational Transformation
 
dachnug51 - Whats new in domino 14 .pdf
dachnug51 - Whats new in domino 14  .pdfdachnug51 - Whats new in domino 14  .pdf
dachnug51 - Whats new in domino 14 .pdf
 
Folding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a seriesFolding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a series
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
 
React Native vs Flutter - SSTech System
React Native vs Flutter  - SSTech SystemReact Native vs Flutter  - SSTech System
React Native vs Flutter - SSTech System
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
 
Break data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud ConnectorsBreak data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud Connectors
 

ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems

  • 1. Danielle Gonzalez ✦ Fawaz Alhenaki ✦ Mehdi Mirakhorli An Empirical Study based on Disclosed Software Vulnerabilities Architectural Security Weaknesses in Industrial Control Systems (ICS) IEEE International Conference on Software Architecture (ICSA) Hamburg, Germany March 2019
  • 2. 2 What Are Industrial Control Systems (ICS)? ICS often support critical infrastructure: • Manufacturing • Oil & Gas Production • Chemical Processing • Electrical Power Grids • Transportation • More!
  • 3. Architecture of Industrial Control Systems (ICS) Human Machine Interface (HMI) Engineering Workstations Data Historian Supervisory Control & Data Acquisition (SCADA) Server Switched Telephone, Leased Line or Power Line Based Communication Radio, microwave, or cellular Satellite Wide area network Communication Routers Control Center PLC Field Site 1 RTU Field Site 2 Wan Card Modem IED Field Site 3 Modem 3 The PLCs, RTUS etc. communicate with the SCADA server using industrial communication protocols (Fieldbus) 2 HMIs are used by Humans to configure the plant, troubleshoot problems, run/stop/update programs, and recover from failures 3 The Data Historian logs daily operational data used for analysis & diagnosis 4 Programmable Logic Controllers (PLCs) & Remote Terminal Units (RTUs) connect to sensors & actuators 1
  • 4. 4 Security of Industrial Control Systems ICS often support critical infrastructure: • Manufacturing • Oil & Gas Production • Chemical Processing • Electrical Power Grids • Transportation • More! Implications 1. Security is a key concern 2. Attacks can affect national safety & economics 3. Cannot be easily taken offline for updates or patches IEEE Attacks to ICS infrastructures have exponentially increased from a few to hundreds per year Stouffer, Keith, Joe Falco, and Karen Scarfone. "Guide to industrial control systems (ICS) security." NIST special publication 800.82 (2011): 16-16. Yang, Wen, and Qianchuan Zhao. "Cyber security issues of critical components for industrial control system." Proceedings of 2014 IEEE Chinese Guidance, Navigation and Control Conference. IEEE, 2014.
  • 5. 5 Examining Architectural Security Weaknesses in ICS Dataset: 988 Security Advisories mined from the Industrial Control System Cyber Emergency Response Team (ICS-CERT) repositories RQ 1: Which ICS Components are Most Vulnerable? RQ 2: What Percentage of ICS Vulnerabilities had Architectural Root Causes? RQ 3: What are the Most Common Architectural Weaknesses in ICS? RQ 4: Which Architectural Tactics are Most Often Compromised in ICS? Research Questions:
  • 6. 6 Industrial Control System Advisories (ICSA) ICS vendors maintain advisories to report security issues in their products Advisory (ICSA-16-336-06) OVERVIEW: Alexey Osipov and Ilya Karpov of Positive Technologies have identified vulnerabilities in Rockwell Automation’s Allen-Bradley MicroLogix 1100 and 1400 programmable logic controller (PLC) systems. Rockwell Automation has produced new firmware versions to mitigate some of the vulnerabilities. AFFECTED PRODUCTS: 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; [...] IMPACT: Successful exploitation of these vulnerabilities may allow a remote attacker to gain unauthorized access to affected devices, as well as impact the availability of affected devices. VULNERABILITY CHARACTERIZATION: CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION (CWE-319) User credentials are sent to the web server in clear text, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server. EXPLOITABILITY: These vulnerabilities could be exploited remotely. […] Root Cause Common Weakness Enumeration (CWE) ICS-CERT collects these and assigns them an ICSA identifier
  • 7. 7 Identifying Vulnerable Components A manual review process was used to identify ICS products and alternative names/abbreviations Resources reviewed: • Architectural documents of existing ICS products • Reseach papers • ICS application standards 17 components identified § 7 “common” § 10 “optional/variants”
  • 8. 8 Component Specification CommonComponents Engineering workstation Reliable software designed for configuration, maintenance and diagnostics of the control system applications and equipment. Data Historian (HIST) A system for logging all data in an ICS environment, this data might be uses for analysis later. Human-machine Interface (HMI) User interface that allows engineers and operators to interact with the controller. Intelligent Electronic Device A smart industrial device capable of acquiring data, communicating with other devices, and automating industrial processes. Programmable Logic Controllers (PLC) A solid-state control system often used in assembly lines, or robotic devices, or activities that require high reliability control, ease of programming and process fault diagnosis. RTU (Remote Terminal Unit) Used to communicate with remote field equipment. PLCs with radio communication capabilities are also used in place of RTUs. Supervisory control software (SCADA) A system performing control functions used to control dispersed assets using centralized data acquisition and supervisory control. Common Industrial Protocol (CIP) Provides a set of services & messages for control, security, synchronization, configuration, information that can be integrated into networks. Device Type Manager A driver-like software that provides an interface for device configurations, maintenance, diagnostics & troubleshooting. Component Specification CommonComponents Engineering workstation Reliable software designed for configuration, maintenance and diagnostics of the control system applications and equipment. Data Historian (HIST) A system for logging all data in an ICS environment, this data might be uses for analysis later. Human-machine Interface (HMI) User interface that allows engineers and operators to interact with the controller. Intelligent Electronic Device A smart industrial device capable of acquiring data, communicating with other devices, and automating industrial processes. Programmable Logic Controllers (PLC) A solid-state control system often used in assembly lines, or robotic devices, or activities that require high reliability control, ease of programming and process fault diagnosis. RTU (Remote Terminal Unit) Used to communicate with remote field equipment. PLCs with radio communication capabilities are also used in place of RTUs. Supervisory control software (SCADA) A system performing control functions used to control dispersed assets using centralized data acquisition and supervisory control. Common Industrial Protocol (CIP) Provides a set of services & messages for control, security, synchronization, configuration, information that can be integrated into networks. Device Type Manager A driver-like software that provides an interface for device configurations, maintenance, diagnostics & troubleshooting. Distributed Control Systems (DCS) SACAD variant, microprocessor based units distributed functionally & geographically over the plant, situated near area where control or data gathering functions being performed. Distributed Network Protocol a widely used protocol in electricity and/or water and waste water treatment plants with three layers (data link, Terminal Unit) with radio communication capabilities are also used in place of RTUs. Supervisory control software (SCADA) A system performing control functions used to control dispersed assets using centralized data acquisition and supervisory control. Variation Common Industrial Protocol (CIP) Provides a set of services & messages for control, security, synchronization, configuration, information that can be integrated into networks. Device Type Manager A driver-like software that provides an interface for device configurations, maintenance, diagnostics & troubleshooting. Distributed Control Systems (DCS) SACAD variant, microprocessor based units distributed functionally & geographically over the plant, situated near area where control or data gathering functions being performed. Distributed Network Protocol (DNP3) a widely used protocol in electricity and/or water and waste water treatment plants with three layers (data link, application, and transport layer). Fieldbus A digital, serial, multi-drop, two-way data bus between field equipment,. sensors, transducers, actuators, control room devices. Modbus The de facto ICS communications protocol that uses serial communications with PLCs. Object Linking & Embedding (OLE) for Process Control (OPC) A set of open standards developed to promote interoperability between disparate field devices, automation/control, and business systems. PAC a "mashup" between a PC and a PLC in that it typically offers the benefits of both in a single package. Process Control System (PCS) SCADA variant, typically rack-mounted, processes sensor input, executes control algorithms, and computes actuator outputs. Real time OS Operating System Common Components Optional / Variant ComponentsICS Components Used in This Study
  • 9. 9 Identifying Vulnerable Components ICS Component Terms in Dictionary Programmable Logic Controllers Programmable Logic Controllers, PLC, control loop, logic controller Distributed Control Systems Distributed Control Systems, DCS, digital processor control system, process manager Fieldbus Fieldbus, Field Device Supervisory Control Software Supervisory control software, SCADA, supervisory control and data acquisition Human-machine Interface Human-machine Interface, HMI, Human Machine Interface, Web Interface, operator Remote Terminal Unit Remote Terminal Units, RTUs, RTU, Remote Terminal Unit Data Historian data historian, Operational Historian, HIST, process data archive, historian Sample of Component-Term Dictionary Component-Term DictionaryText Data from Advisories ICS Component Terms in Dictionary Programmable Logic Controllers Programmable Logic Controllers, PLC, control loop, logic controller Distributed Control Systems Distributed Control Systems, DCS, digital processor control system, process manager Fieldbus Fieldbus, Field Device Supervisory Control Software Supervisory control software, SCADA, supervisory control and data acquisition Human-machine Interface Human-machine Interface, HMI, Human Machine Interface, Web Interface, operator Remote Terminal Unit Remote Terminal Units, RTUs, RTU, Remote Terminal Unit Data Historian data historian, Operational Historian, HIST, process data archive, historian Text Processing Script (Keyword Search) 55.06% of reports mentioned at least 1 of the 17 components
  • 10. 10 RQ1: Which ICS Components are Most Vulnerable? Real tim e Variation Common Industrial Protocol (CIP) 13 Device Type Manager 14 Distributed Control Systems 16 DNP3 (Distributed Network Protocol) 39 Fieldbus 18 Modbus 31 OPC (OLE for Process Control) 57 PAC 6 Process Control System (PCS) 42 Common Components Engineering workstation 15 HIST 25 HMI 257 Intelligent Electronic device 3 Master Terminal Unit (MTU) 8Programmable Logic Controllers (PLC) 114 RTU (Remote Terminal Unit) 32 SCADA (Supervisory control software) 212 ICS Component # of Reports Human-machine Interface (HMI) 257 Supervisory Control Software (SCADA) 212 Programmable Logic Controllers (PLC) 114 OLE for Process Control (OPC) 57 Process Control System (PCS) 42 Distributed Network Protocol (DNP3) 39 Remote Terminal Unit (RTU) 32 Modbus 31 Data Historian (HIST) 25 Building Automation System (BAS) 19 10 Most Vulnerable ICS Components
  • 11. 11 RQ2: What % of ICS Vulnerabilities had an Architectural Root Cause? https://cwe.mitre.org/data/definitions/1008.html Santos, J. C. S., Peruma, A., Mirakhorli, M., Galster, M. and Sejfia, A.. "Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.". pages 69 - 78. 2017 IEEE International Conference on Software Architecture (ICSA). 2017. Common Architectural Weakness Enumeration
  • 12. 12 Identifying ICS Advisories with Architectural Root Causes Text Data from Advisories CAWE Mapping https://cwe.mitre.org/data/definitions/1008.html RQ2: What % of ICS Vulnerabilities had an Architectural Root Cause? 62.86% (540) of ICS Advisories were associated with 1 or more architectural weakness (CAWE) IDs in the text were mapped to the IDs in the CAWE catalog
  • 13. 13 RQ3: What is the Most Common Architectural Weakness in ICS? Tactic CAWE Frequency Validate Inputs CAWE-20 Improper Input Validation 142 Validate Inputs CAWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 75 Authenticate Actors CAWE-287 Improper Authentication 70 Authorize Actors CAWE-284 Improper Access Control 63 Validate Inputs CAWE-352 Cross-Site Request Forgery (CSRF) 45 Authenticate Actors CAWE-798 Use of Hard-coded Credentials 44 Validate Inputs CAWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 37 Authenticate Actors CAWE-259 Use of Hard-coded Password 20 Encrypt Data CAWE-522 Insufficiently Protected Credentials 18 Validate Inputs CAWE-94 Improper Control of Generation of Code ('Code Injection') 17 Authenticate Actors CAWE-306 Missing Authentication for Critical Function 16 Authorize Actors CAWE-434 Unrestricted Upload of File with Dangerous Type 14 Authorize Actors CAWE-269 Improper Privilege Management 13 Encrypt Data CAWE-326 Inadequate Encryption Strength 13 Encrypt Data CAWE-312 Cleartext Storage of Sensitive Information 12 Validate Inputs CAWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 12 Authorize Actors CAWE-285 Improper Authorization 11 Encrypt Data CAWE-319 Cleartext Transmission of Sensitive Information 10 Encrypt Data CAWE-311 Missing Encryption of Sensitive Data 10 Encrypt Data CAWE-256 Unprotected Storage of Credentials 10 26.29% of reports with CAWEs 20 Most Common Architectural Weaknesses in ICS
  • 14. 14 RQ4: Which Architectural Tactic Implementations are Compromised Most Often in ICS? Tactic Frequency Validate Inputs 199 Encrypt Data 104 Authenticate Actors 93 Authorize Actors 73 Limit Access 12 Cross-Cutting 7 Identify Actors 6 Manage User Sessions 6 Verify Message Integrity 4 Audit 1 • We found ICS Advisories associated with 10 of the 12 Architectural Tactics • From the 540 ICS Advisories associated with CAWEs, 3 tactics were compromised most often. 10 Compromised Architectural Tactics
  • 15. 15 How do these findings compare to those for Enterprise Web Applications? Architectural Weaknesses in ICS To understand if the top weaknesses were unique to ICS, we mapped our CAWE findings to the CWEs in the OWASP Top 10 risks from 2017 4 of our top 20 could not be mapped, including our #1 weakness Improper Input Validation OWASP Top 10 ICS Architectural Weaknesses A1-Injection • Rank#7: CWE-89 SQL Injection • Rank#10: CWE-94 Code Injection • Rank#16: CWE-78 OS Command Injection A2-Broken Authentication • Rank#3: CWE-287 Improper Authentication • Rank#9: CWE-522 Insufficiently Protected Credentials • Rank#11: CWE-306 Missing Authentication of Critical Function • Rank#20: CWE-256 Unprotected Storage of Credentials • Rank#6: CWE-798 Use of Hard-coded Credentials • Rank#8: CWE-259 Use of Hard-coded Password A3-Sensitive Data Exposure • Rank#15: CWE-312 Cleartext Storage of Sensitive Info. • Rank#18: CWE-319 Cleartext Transmission of Sensitive Info. • Rank#19: CWE-311 Missing Encryption of Sensitive Data A4-XML External Entities (XXE) N/A A5-Broken Access Control • Rank#4: CWE-284 Improper Access Control • Rank#13: CWE-269 Improper Privilege Management • Rank#17: CWE-285 Improper Authorization A6-Security Misconfiguration N/A A7-Cross-Site Scripting (XSS) • Rank#2: CWE-79 Cross-site Scripting A8-Insecure Deserialization N/A A9-Using Vulnerable Components N/A A10-Insufficient Logging N/A
  • 16. 16 Summary & Implications for Practitioners Most Vulnerable ICS Components Most Frequently Compromised Architectural Tactics 1. Isolate Control System Devices and/or Systems from Untrusted Networks 2. Sanitize User’s Inputs to ICS Components and Devices 3. Encrypt Sensitive Data 4. Secure ICS Endpoints 5. Follow a Tactic-centric Approach to ICS Security 6. Use a Protected Network Environment for Unpatched Devices Implications for Practitioners 62.86% (540) of ICS Advisories studied were associated with 1 or more architectural weakness (CAWE) Most Common Architectural Weaknesses in ICS
  • 17. Danielle Gonzalez ✦ Fawaz Alhenaki ✦ Mehdi Mirakhorli An Empirical Study based on Disclosed Software Vulnerabilities Architectural Security Weaknesses in Industrial Control Systems (ICS) IEEE International Conference on Software Architecture (ICSA) Hamburg, Germany March 2019 Questions? Contact dng2551@rit.edu or mxmvse@rit.edu @dngonza