SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
Quimicefa for hackers: Attacking (and trying to
defend) chemical processes
Mikel Iturbe
$ whoami
● Mikel Iturbe
– Researcher at the Intelligent Systems for Industrial
Systems (ISIS SISI) Group of Mondragon
Unibertsitatea.
– Work mainly in ICS Security
● Intrusion (Anomaly) detection
– Among other things
● Data analysis
What I’ll talk about
● Intro to ICS/PCS/SCADA/IN/Industrial… security
● Process-level security
● Attacks on chemical plants
– Demo
● Countermeasures
– Example
● Conclusions
Control Systems
CC-BY-SA 3.0 Kreuzschnabel, Schmimi1848, Wolkenkratzer, Brian Cantoni, Hermann Luyken, Beroesz
Control Systems
● ICS/IACS/IN/SCADA/DCS...
© 2016 Little Bobby All Rights Reserved
A bit of history
● Trans-Siberian pipeline explosion (1982)
– Source unconfirmed (myth?)
– Two hypotheses on the cause:
● Operator mistake
● Malicious and leaked software caused the explosion
A bit of history
● Maroochy Water Breach (2004)
– 142 pumping stations
● Ex-employee attacks the system with stolen
equipment
● >1m liters of sewage water spilled with no
control.
A bit of history
● Stuxnet (2010)
– Designed to disrupt Iran’s nuclear program
– 4 zero-days
– Sabotaged uranium centrifuges by spinning them
faster
A bit of history
● German Steel Mill Incident (2014)
– Not much known (who,where…)
– Spear-Phishing > IT network > OT network
– A blast furnace could not be shut down properly.
“Massive” losses.
(Defensive) ICS Security
(Defensive) ICS Security
IT layers
ICS layers
Ok! Let’s start then
● Realistic environment for research
● Conducting attacks with physical impact
requires large domain knowledge
– Process (what is this?)
– Control (how it behaves?)
– Objective (what do I want to achieve?)
Ok! Lets start then
● http://www.ippe.com/Plants
● http://usedplants.com
●
Ok! Let’s start then
● Realistic environment for research
● Let’s not break the bank
Ok! Let’s start then
Ok! Let’s start then
Ok! Let’s start then
● Realistic environment for research
● Let’s not break the bank
● Let’s not get ourselves killed
Simulation: DVCP
● Damn Vulnerable Chemical Process
– Presented by Krotofil and Larsen
– Two variants
● Tennessee-Eastman (TE)
● Vinyl Acetate Monomer (VAM)
– Developed over Matlab & Simulink
● Process in C
● Control/Execution in Simulink
DVCP-TE
Attacking chemical processes
● Necessary to have wide domain knowledge
– Knowledge of the process and its control
● Main types of attacks
– Equipment damage (break stuff...)
– Economic damage (make it expensive...)
Equipment attacks
● Pipe damage (Clogging, water hammer)
● Reactor damage. (kabooom)
DVCP-TE
Economic attacks
● Produce product of inferior quality (huge
impact)
● Increase cost of operation
● More stealthy than equipment attacks
Demo: Attacks
Countermeasures
● Monitoring variable values
● Signal noise analysis for replay attacks
● Predictive approaches
● Non-predictive approaches
Multivariate Statistical Proc. Control
● Previously used for fault detection/quality
control
● By using PCA, it transforms the original variable
space into a new subspace
● Two statistics are computed, D and Q and
these are monitored
● Once an anomaly is detected, by using
contribution plots we diagnose its cause
Teodora Kourti. Process analysis and abnormal situation detection: from theory to practice
Control Systems, IEEE, IEEE, 2002, 22, 10-25
Example
Mikel Iturbe, José Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria. On the Feasibility of Distinguishing
Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), IEEE,
2016, 155-160
Example
Row 1 Row 2 Row 3 Row 4
0
2
4
6
8
10
12
Column 1
Column 2
Column 3
Example
Example: Detection
Example: Diagnosis
Doing now
● I first wrote MSPC over Apache Spark
– Replicating functionalities from existing Matlab
toolbox
– Yeah, you know, “Big Data”
● Rewriting it in pure Python
● Finishing a Modbus bridge for DVCP-TE
Conclusions
● ICS and IT security are different
– Specially when exploiting systems
● Current protection approaches disregard process
dynamics
– I think this will change
● There are PoC for intrusion detection at the
process level
● This field requires a multidisciplinary point of view
Still much to do!!!!!!!
● This field is still underdeveloped when
compared to other sec fields
● Much to do, much to learn. Not many resources
though, :-/
– Formal training: control theory, chemical
engineering, academic papers.
– Con talks (Marina Krotofil, Jason Larsen...)
Eskerrik asko
● mikel@hamahiru.org
● miturbe@mondragon.edu
● Twitter: @azken_tximinoa
● https://iturbe.info

Contenu connexe

Similaire à Quimicefa for hackers: Attacking (and trying to defend) chemical processes

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsMarina Krotofil
 
Monitoring - deeper dive
Monitoring  - deeper diveMonitoring  - deeper dive
Monitoring - deeper diveRobert Kubiś
 
First SCADA LAB International Workshop
First SCADA LAB International WorkshopFirst SCADA LAB International Workshop
First SCADA LAB International WorkshopScadaLab Project
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel LinaresTI Safe
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systemsJaap van Ekris
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Byres Security Inc.
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systemsJaap van Ekris
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)shanshicn
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxMahendraShukla27
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systemsJaap van Ekris
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsC4Media
 
Embedded Basics
Embedded Basics Embedded Basics
Embedded Basics Electro 8
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systemsJaap van Ekris
 
CS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevCS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevMarina Krotofil
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos, Inc.
 
Functional safety by FMEA/FTA
Functional safety by FMEA/FTAFunctional safety by FMEA/FTA
Functional safety by FMEA/FTAmehmor
 

Similaire à Quimicefa for hackers: Attacking (and trying to defend) chemical processes (20)

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsics
 
Monitoring - deeper dive
Monitoring  - deeper diveMonitoring  - deeper dive
Monitoring - deeper dive
 
First SCADA LAB International Workshop
First SCADA LAB International WorkshopFirst SCADA LAB International Workshop
First SCADA LAB International Workshop
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient Systems
 
MKAD_black_V2
MKAD_black_V2MKAD_black_V2
MKAD_black_V2
 
Embedded Basics
Embedded Basics Embedded Basics
Embedded Basics
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
 
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
 
CS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevCS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsev
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
Functional safety by FMEA/FTA
Functional safety by FMEA/FTAFunctional safety by FMEA/FTA
Functional safety by FMEA/FTA
 

Dernier

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Quimicefa for hackers: Attacking (and trying to defend) chemical processes

  • 1. Quimicefa for hackers: Attacking (and trying to defend) chemical processes Mikel Iturbe
  • 2. $ whoami ● Mikel Iturbe – Researcher at the Intelligent Systems for Industrial Systems (ISIS SISI) Group of Mondragon Unibertsitatea. – Work mainly in ICS Security ● Intrusion (Anomaly) detection – Among other things ● Data analysis
  • 3. What I’ll talk about ● Intro to ICS/PCS/SCADA/IN/Industrial… security ● Process-level security ● Attacks on chemical plants – Demo ● Countermeasures – Example ● Conclusions
  • 4. Control Systems CC-BY-SA 3.0 Kreuzschnabel, Schmimi1848, Wolkenkratzer, Brian Cantoni, Hermann Luyken, Beroesz
  • 5. Control Systems ● ICS/IACS/IN/SCADA/DCS... © 2016 Little Bobby All Rights Reserved
  • 6. A bit of history ● Trans-Siberian pipeline explosion (1982) – Source unconfirmed (myth?) – Two hypotheses on the cause: ● Operator mistake ● Malicious and leaked software caused the explosion
  • 7. A bit of history ● Maroochy Water Breach (2004) – 142 pumping stations ● Ex-employee attacks the system with stolen equipment ● >1m liters of sewage water spilled with no control.
  • 8. A bit of history ● Stuxnet (2010) – Designed to disrupt Iran’s nuclear program – 4 zero-days – Sabotaged uranium centrifuges by spinning them faster
  • 9. A bit of history ● German Steel Mill Incident (2014) – Not much known (who,where…) – Spear-Phishing > IT network > OT network – A blast furnace could not be shut down properly. “Massive” losses.
  • 14. Ok! Let’s start then ● Realistic environment for research ● Conducting attacks with physical impact requires large domain knowledge – Process (what is this?) – Control (how it behaves?) – Objective (what do I want to achieve?)
  • 15. Ok! Lets start then ● http://www.ippe.com/Plants ● http://usedplants.com ●
  • 16. Ok! Let’s start then ● Realistic environment for research ● Let’s not break the bank
  • 19. Ok! Let’s start then ● Realistic environment for research ● Let’s not break the bank ● Let’s not get ourselves killed
  • 20. Simulation: DVCP ● Damn Vulnerable Chemical Process – Presented by Krotofil and Larsen – Two variants ● Tennessee-Eastman (TE) ● Vinyl Acetate Monomer (VAM) – Developed over Matlab & Simulink ● Process in C ● Control/Execution in Simulink
  • 22. Attacking chemical processes ● Necessary to have wide domain knowledge – Knowledge of the process and its control ● Main types of attacks – Equipment damage (break stuff...) – Economic damage (make it expensive...)
  • 23. Equipment attacks ● Pipe damage (Clogging, water hammer) ● Reactor damage. (kabooom)
  • 25. Economic attacks ● Produce product of inferior quality (huge impact) ● Increase cost of operation ● More stealthy than equipment attacks
  • 27. Countermeasures ● Monitoring variable values ● Signal noise analysis for replay attacks ● Predictive approaches ● Non-predictive approaches
  • 28. Multivariate Statistical Proc. Control ● Previously used for fault detection/quality control ● By using PCA, it transforms the original variable space into a new subspace ● Two statistics are computed, D and Q and these are monitored ● Once an anomaly is detected, by using contribution plots we diagnose its cause Teodora Kourti. Process analysis and abnormal situation detection: from theory to practice Control Systems, IEEE, IEEE, 2002, 22, 10-25
  • 29. Example Mikel Iturbe, José Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria. On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), IEEE, 2016, 155-160
  • 30. Example Row 1 Row 2 Row 3 Row 4 0 2 4 6 8 10 12 Column 1 Column 2 Column 3
  • 34. Doing now ● I first wrote MSPC over Apache Spark – Replicating functionalities from existing Matlab toolbox – Yeah, you know, “Big Data” ● Rewriting it in pure Python ● Finishing a Modbus bridge for DVCP-TE
  • 35. Conclusions ● ICS and IT security are different – Specially when exploiting systems ● Current protection approaches disregard process dynamics – I think this will change ● There are PoC for intrusion detection at the process level ● This field requires a multidisciplinary point of view
  • 36. Still much to do!!!!!!! ● This field is still underdeveloped when compared to other sec fields ● Much to do, much to learn. Not many resources though, :-/ – Formal training: control theory, chemical engineering, academic papers. – Con talks (Marina Krotofil, Jason Larsen...)
  • 37. Eskerrik asko ● mikel@hamahiru.org ● miturbe@mondragon.edu ● Twitter: @azken_tximinoa ● https://iturbe.info