Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed

被引:42
作者
Urbina, David [1 ]
Giraldo, Jairo [1 ]
Tippenhauer, Nils Ole [2 ]
Cardenas, Alvaro [1 ]
机构
[1] Univ Texas Dallas, 800 Campbell Rd, Richardson, TX 75080 USA
[2] Singapore Univ Technol & Design, ISTD, Singapore, Singapore
来源
PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN | 2016年 / 14卷
关键词
ICS; Critical System; Cyber-attacks; Fieldbus; DATA INJECTION ATTACKS; STATE ESTIMATION; SYSTEMS;
D O I
10.3233/978-1-61499-617-0-75
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The study of cyber-attacks in industrial control systems is of growing interest among the research community. Nevertheless, restricted access to real industrial control systems that can be used to test attacks has limited the study of their implementation and potential impact. In this work, we discuss practical attacks applied to a room-sized water treatment testbed. The testbed includes a complete physical process, industrial communication systems, and supervisory controls. We implement scenarios in which the attacker manipulates or replaces sensor data as reported from the field devices to the control components. As a result, the attacker can change the system state vector as perceived by the controls, which will cause incorrect control decisions and potential catastrophic failures. We discuss practical challenges in setting up Man-In-The-Middle attacks on fieldbus communications in the industrial EtherNet/IP protocol and topologies such as Ethernet rings using the Device-Level-Ring protocol. We show how the attacker can overcome those challenges, and insert herself into the ring. Once established as a Man-in-the-Middle attacker, we launched a range of attacks to modify sensor measurements and manipulate actuators. We show the efficacy of the proposed methodology in two experimental examples, where an adversary can intelligently design attacks that remain undetected for a typical bad-data detection mechanism.
引用
收藏
页码:75 / 89
页数:15
相关论文
共 14 条
[1]  
Abrams M., 2008, TECHNICAL REPORT
[2]  
Albright D, 2010, TECHNICAL REPORT
[3]  
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[4]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[5]  
Antonioli D., 2015, P 1 ACM WORKSH CYB P, P91, DOI [10.1145/2808705.2808715, DOI 10.1145/2808705.2808715]
[6]   Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber-Physical Systems [J].
Banerjee, Ayan ;
Venkatasubramanian, Krishna K. ;
Mukherjee, Tridib ;
Gupta, Sandeep Kumar S. .
PROCEEDINGS OF THE IEEE, 2012, 100 (01) :283-299
[7]  
Brooks P, 2001, TECHNICAL REPORT
[8]  
I. N. W. Group, 2015, ADM SCOP IP MULT
[9]  
Kosut O, 2010, INT CONF SMART GRID, P220, DOI 10.1109/SMARTGRID.2010.5622045
[10]  
Krotofil M, 2013, IEEE INTL CONF IND I, P670, DOI 10.1109/INDIN.2013.6622964