140 likes | 249 Vues
This project addresses the rising threats to Process Control Systems (PCS) in industries such as oil, water, and power, emphasizing the increasing vulnerability due to the internet, standard protocols, and hacker motivations. We explore a structured approach to defending against attacks, including the use of honeypots, firewalls, and incident handling frameworks. Through understanding PCS threats, implementing relevant defense tools, and streamlining incident response management, we aim to minimize risks and reinforce the security of these critical infrastructures.
E N D
<Omar Faruk, Cheah Zi Bin> {faruk,cheah}@stud.ntnu.no Specialization Course Autumn 2007 Identifying & Responding to External Threats in a PCS Network
Outline • PCS Threats • Project Flow • Defense Tools • Project Topology • PCS Tools • Incident Handling • Questions
PCS Threats • Process Control System(PCS) handles oil, water, power and other industrial processes. • PCS were thought as highly secure. • Threat-increase reasons : • Internet • standard protocol • hacker motivation • Attacks cause blackout, sewage spills, etc.
Defense Tools • Honeypots • Deployed to lure attackers • Deploying Honeypot called Honeynet • Honeywall is used to analyze packets • Snort(in honeywall) drops packets • Router firewall • iptables • NAT table • Filter table
Topology • Router • Honeywall • 3 Layers • DMZ • Admin Network • Process Network
OPC(1) • OLE For Process Control • Provides interoperability and scalability • Reduces implementation time and costs • Open Productivity Connectivity Before OPC After OPC
OPC(2) • Based on COM,DCOM • Implemented in server-client pairs • OPC Connection Scenario • Aggregation • Tunnelling • Bridging (Server-Server)
OPC(3) • OPC Foundation provides specifications • OPC DA : standardize real-time data access • OPC HDA : used to retrieve historical data • OPC DX : data exchange between servers • OPC Tools • Matrikon OPC Tools • Cogent OPC DataHub
Incident Handling(1) • Incident Response (IR) • Mainly focus on technical aspects • Minimize downtime, loss and economical consequences • Incident Response MAnagement (IRMA) • Include technical, cultural & organizational issues • Introduce education and lessons learning • Risk management is a key factor
Incident Handling(2) • Attack Detection and Analysis • Attack identification (monitor, logging) • Analysis of root cause • Identify changes based on risk assessment • Actions based on processes IRMA Framework
References • Diagram 1 • http://www.elscolab.be • IRMA Presentation • http://ikt.hia.no/sqo/Seminars/IRMA_kick-off.pdf • OPC Tutorial • http://www.matrikonopc.com/training/opc-multimedia-tutorial/opc_tutorial_printable_version.pdf • OPC DataHub Manual • http://www.opcdatahub.com/Docs/dho-gettingstarted.html
Thanks • Telematics Dept – Svein • SINTEF – Martin, Maria