Title: Assessing Power Substation Network Security and Survivability
1Assessing Power Substation Network Security and
Survivability
- Carol Taylor, Axel Krings, Paul Oman
- Computer Science Department, University of Idaho,
Moscow, Idaho - The 2003 International Conference on Security and
Management - June 23-26, 2003
Graduate of Dept. of IM Wendy Y.F. Wen
2Incentives
- Electric power grid can be regarded as a complex
network. - Risk Management Survivability
- The failure of power substation network will
result in cascading failure. - Node Dependency
3Outline
- 0. Risk Management Concepts
- Introduction
- Current State of Power Networks
- Mitigation Strategies
- Survivability and Vulnerability Assessment
- Conclusion
4Outline
- 0. Risk Management Concepts
- Introduction
- Current State of Power Networks
- Mitigation Strategies
- Survivability and Vulnerability Assessment
- Conclusion
5Risk Management Concepts
- The process of identifying, assessing and
reducing risks to an acceptable level.
Reference Symposium of Risk Management,
2005/11/11, Po-Hao Tsang
6Risk Management Concepts (cont)
- Risk Assessment
- Risk Analysis
- Risk Evaluation
- Risk Treatment
Reference Symposium of Risk Management,
2005/1/1, Po-Hao Tsang
7Goals of Risk Analysis
- Asset valuation and threat identification
- To quantify or qualify the impact
- To provide cost-benefit comparison for safeguards
or countermeasures
Reference Symposium of Risk Management,
2005/1/1, Po-Hao Tsang
8Risk Management
9Outline
- 0. Risk Management Concepts
- Introduction
- Current State of Power Networks
- Mitigation Strategies
- Survivability and Vulnerability Assessment
- Conclusion
10Incentives
- The on-going problem of securing our critical
infrastructures from cyber threats is becoming
more acute. - Terrorism and its consequences
- Dependency on the computer networks that support
our daily lives - As the critical infrastructure industries have
become more computerized, the risk of digital
disruption has increased. - The threat groups range from casual hackers to
terrorists.
11PCCIP
- In 1997, the Presidents Commission on Critical
Infrastructure Protection (PCCIP) to investigate
threats and mitigation strategies for cyber
controlled critical networks. - This group identified eight critical
infrastructure systems.
12PCCIP -- Electric Power Grid
- Power grid vulnerabilities and mitigations were
documented in the PCCIPs NSTAC Electric Power
Risk Assessment report. - PCCIP Presidents Commission on Critical
Infrastructure Protection - NSTAC National Security Telecommunications
Advisory Committee - Their suggestions included a broad program of
education and awareness. - Between government and industry, sharing of
information and cooperatively developing risk
assessment methods.
13Assessment techniques
- To adapt existing vulnerability assessment
methods and/or develop new approaches. - Checklists
- Survivable Systems Analysis (SSA)/ Probability
Risk Assessment (PRA) - Expert system
14Goals of Paper
- To report the results of applying these
techniques to the assessment of power substation
control networks for cyber based attacks. - To report on the cyber security challenges still
facing the electric power industry after the
vulnerabilities were documented. - To examine some of the underlying design issues
typical of power substation networks that impact
security efforts.
15Outline
- 0. Risk Management Concepts
- Introduction
- Current State of Power Networks
- 2.1 Current Vulnerabilities
- 2.2 Current Challenges
- Mitigation Strategies
- Survivability and Vulnerability Assessment
- Conclusion
16On-site Visit
- To conduct site assessments.
- To interact with people knowledgeable about the
systems.
172.1 Current Vulnerabilities
- The greatest vulnerability of the power
substation control networks is the lack of cyber
security awareness within the power industry. - Lack of security awareness can be found at all
levels of the industry. - developers of systems and software
- operators of the power control systems
- power engineers
- Power Grid Vulnerabilities
18Power Grid Vulnerabilities
19Why Old-Vulnerabilities Exist?
- There still appears to be a lack of urgency in
the attitude of power industry executives. - Power industry deregulation has created
competition, forcing power companies to trim
development and work closer to their margins
without extra resources. - Executives that make company decisions are
business oriented and lack the technical
background.
202.2 Current Challenges
- Geographic distribution of these networks
- the sheer number of devices connected to a single
network - the sheer size of the network
- Diversity of equipment and protocols
- Diversity and lack of interoperability in these
protocols - Diversity of electronic control equipment
21- Proprietary SCADA protocol or Ethernet
- Proprietary, EIA232, EIA485, Ethernet, UCA, or
ControlNet - Vendor Proprietary Protocol
- Ethernet
- Local Ethernet or Internet
- EIA-232
- V.32, V.34, WAP, or WEP
- DNP, Modbus, Profibus, Fieldbus
22Outline
- 0. Risk Management Concepts
- Introduction
- Current State of Power Networks
- Mitigation Strategies
- Cyber Security Education
- Enforcement of Cyber Security Policy
- Authentication Enforcement
- Enact Encryption
- Firewalls, Virus Scanners, Intrusion Detection
Systems - Keep SCADA control and Corporate networks
separate - Survivability and Vulnerability Assessment
- Conclusion
23Mitigation Strategies
- Cyber Security Education
- Education creates employee cyber awareness
employees assist with cyber security. - Enforcement of Cyber Security Policy
- A security policy is critical for cyber security.
24Mitigation Strategies (cont)
- The greatest reduction from the threat of cyber
intrusion can be achieved by enacting a program
of cyber security education and training combined
with an enforced security policy. - The insider threat is considered to be more
serious due to the insider's knowledge of
electric power system operations. - The education and enforcement will assist with
counteracting both external and insider threats.
25Mitigation Strategies (cont)
- Authentication Enforcement
- Strong password policy multifactor
authentication. - Enact Encryption
- Communication data should be encrypted --
encrypting modem or VPN device.
26Mitigation Strategies (cont)
- Firewalls, Virus Scanners, Intrusion Detection
Systems - Network security devices for both corporate and
power control networks will help reduce cyber
threats. - Keep SCADA control and Corporate networks
separate - Connecting critical SCADA control networks
increases risk of intruder access.
27Outline
- 0. Risk Management Concepts
- Introduction
- Current State of Power Networks
- Mitigation Strategies
- Survivability and Vulnerability Assessment
- 4.1 Standards Checklists
- 4.2 SSA/ PRA
- 4.3 Expert System Analysis
- Conclusion
284.1 Standards Checklists
- Prior to undertaking several on-site industry
visits, we compiled checklists derived from
industry standards and guidelines. - IEC 61850 TC 57
- IEEE Standard 1402-2000
- IEEE Draft Standard 1525
29Standards Checklists (cont)
- Limitation of checklist
- The checklists require a certain level of
knowledge and computer security expertise in the
person performing the assessment. - In summary, checklist is a good starting point,
but not adequate.
304.2 SSA/ PRA - SSA (Survivability System
Analysis)
- SSA is particularly suitable for assessing
unbounded networks with ill-defined boundaries
and non-centralized control. - SSA emphasizes survivability.
- The continued operation of the essential services
of a system in spite of deliberate compromise or
natural failure of some components.
31SSA (cout)
- A problem with SSA is its lack of quantification.
- In an effort to add quantification capability to
SSA, we have combined PRA with SSA.
324.2 SSA/ PRA - PRA (Probability Risk
Assessment )
- PRA utilizes probabilities to determine the
likelihood that adverse events will occur. - statistical sampling
- historical records
- solicitation of expert opinion
- A PRA for cyber security threats
- Quantification of the risk from these threats
- Specification of mitigating actions including
costs
33Problems with PRA (cont)
- Lack of historical cyber security data for
estimating risk - Difficulty of analyzing risk for large networks
34Combined Approach -- RAPSA
- Risk Analysis and Probabilistic Survivability
Assessment (RAPSA) seeks to leverage the
strengths of both approaches. - There are four stages in RAPSA method.
35RAPSA (cont)
- Stage 1 System Self-assessment
- An analysis team performs a self-assessment to
understand system mission objectives. - Partition the system into services that are
essential to the mission and those services that
are identified.
36RAPSA (cont)
- Stage 2 Threat Identification
- Threats from cyber attacks are enumerated for the
essential services identified in the previous
step. - Intrusion scenarios/ attack stages are outlined.
- Vulnerabilities associated with each intrusion
scenario are identified.
37RAPSA (cont)
- Stage 3 Risk Quantification
- Quantify the risks for each intrusion scenario.
- Event/fault trees will be used where needed to
assist with understanding how attacks can be
neutralized. - Mitigation mechanisms will be proposed.
38RAPSA (cont)
- Stage 4 Risk Mitigation Trade-off
- Several types of tradeoff analyses are possible.
- Partitioned Multi-objective Risk Method (PMRM)
- Decision Tree Analysis
- Produce survivability map including risks and
costs for mitigation strategies.
394.3 Expert System Analysis
- To analyze the individual components using a
prototype ES. - Prolog - AI language
- Model the visibility conditions
- Implement the shortest path algorithm
40visibility condition
visibility path
41 Output of ES Vulnerability Assessment
- Visibility paths from Internet to CircuitBreaker
- Internet, "SubstationController", "IED2",
"CircuitBreaker" with vulnerability level 10 - "Internet", "IED2", "CircuitBreaker" with
vulnerability level 7 - "Internet", "CorporateNetwork", "SCADAMaster",
"SubstationController", "IED2", "CircuitBreaker"
with vulnerability level 23 - Most vulnerable visibility path from Internet to
CircuitBreaker - "Internet", "CorporateNetwork", "SCADAMaster",
"SubstationController", "IED2", "CircuitBreaker"
with vulnerability level 23
42Outline
- 0. Risk Management Concepts
- Introduction
- Current State of Power Networks
- Mitigation Strategies
- Survivability and Vulnerability Assessment
- Conclusion
43Conclusion
- In looking at the current state of power industry
cyber security, it appears to lag behind the
state-of-the-practice in both network security
and ultra-reliable systems design. - In spite of the national emphasis on terrorism
awareness, the power industry as a whole appears
to be lacking in cyber security awareness.
44Thank you for your listening