network monitoring on industrial control systems
play

Network Monitoring on Industrial Control Systems Alvaro Cardenas, - PowerPoint PPT Presentation

Network Monitoring on Industrial Control Systems Alvaro Cardenas, PhD. David I Urbina, PhD. candidate Introduction of NSM Long term goals Current Research ICS T raffjc Analysis Intrusion Detection Some T ools for NSM


  1. Network Monitoring on Industrial Control Systems Alvaro Cardenas, PhD. David I Urbina, PhD. candidate

  2. ● Introduction of NSM ● Long term goals ● Current Research – ICS T raffjc Analysis – Intrusion Detection ● Some T ools for NSM 1/13/15 2

  3. Network Security Monitoring is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. -Informit 1/13/15 3

  4. Network Security Monitoring in ICS 1/13/15 4

  5. Long term goals ● Improve Operational Situational Awareness (OSA). ● Improve Security Situational Awareness (SSA). ● Integrate OSA and SSA into the Control Centers. 1/13/15 5

  6. Integration OSA and SSA in ICS 1/13/15 6

  7. Traffjc Analysis 1/13/15 7

  8. Dissecting Modbus Packets Data Data Link Ethernet 2 / 802.3 IP Data Network TCP Data Transport Data Modbus/TCP Application Modbus 1/13/15 8

  9. Modbus/TCP 1/13/15 9

  10. Intrusion Detection 1/13/15 10

  11. Detection methods: ● Knowledge-based intrusion-detection techniques apply the knowledge accumulated about specifjc attacks and system vulnerabilities. (IT) ● Behavior-based intrusion-detection techniques assume that an intrusion can be detected by observing a deviation from the normal or expected behavior of the system or the users. (ICS) 1/13/15 11

  12. Detection methods: ● Knowledge-based intrusion-detection techniques apply the knowledge accumulated about specifjc attacks and system vulnerabilities. (IT) ● Behavior-based intrusion-detection techniques assume that an intrusion can be detected by observing a deviation from the normal or expected behavior of the system or the users. (ICS) 1/13/15 12

  13. Law Abiding “Behavior” T2 T1 A B A B A B 1/13/15 13

  14. Using models to detect deviations Physical Model 1/13/15 14

  15. Which tools do we use? 1/13/15 15

  16. ● Ubuntu-based Linux distribution for NSM. ● Free and open source GNU GPL v2 ● Helps on: – Deep Packet Inspection – Protocol Analysis – Traffjc Analysis – Intrusion Detection and Prevention 1/13/15 16

  17. Deployment scenarios – Standalone – Server-sensor 1/13/15 17

  18. ● Core functions – Full packet capture → netsnifg-ng (http://netsnifg-ng.com) – Network-based IDS ● Snort (http://snort.org) ● Suricata (http://suricata-ids.org) ● Bro (http://bro-ids.org) – Host-based IDS ● OSSEC (http://www.ossec.net) – Analysis T ools ● Sguil (http://sguild.sourceforge.net) ● Squert (http://www.squertproject.org/) ● Snorby (https://snorby.org/) ● ELSA (https://code.google.com/p/enterprise-log-search-and-archive/ ) 1/13/15 18

  19. Extensible network analysis framework not restricted to any particular detection approach. ● Free and Open Source Bro 1/13/15 19

  20. Bro features ● Logging framework ● Multiple Traffjc Analyzers for IT and ICS protocols ● Extensible Analysis Architecture ● Domain-specifjc, Turing complete Scripting language 1/13/15 20

  21. Previous related research Analysis of Encrypted Traffjc ● Best Paper Award, "On the Practicality of Detecting Anomalies – with Encrypted T raffjc in AMI", IEEE SmartGridComm, 2014. 1/13/15 21

  22. Thanks! 1/13/15 22

Recommend


More recommend