SlideShare a Scribd company logo
A Behavior-based Approach to Secure
and Resilient Industrial Control Systems
Dimitrios Serpanos
Industrial Systems Institute/RC ATHENA, Director
University of Patras, Professor
Patras, Greece
Alpen-Adria University Klagenfurt, March 9, 2017
ICS are Cyber-Physical Systems
• Inter-disciplinary emerging area
• Computation + Physics
• Algorithms + Logic + Control + …
IT vs. OT
Information Technology Operational Technology
Purpose Process transactions,
provide information
Control or monitor physical processes and
equipment
Architecture Enterprise wide
infrastructure and
applications (generic)
Event driven, real time, embedded hardware
and software (custom)
Interfaces GUI, web browser,
terminal and keyboard
Electromechanical, sensors, actuators, coded
displays, hand-held devices
Ownership CIO and IT Engineers, technicians, operators and managers
Connectivity Corporate network, IP
based
Control networks, hardwired twisted pair and IP
based
Role Supports people Controls machines
ICS Control Loop
ICS Control Loop Attack
System View - Requirements
• Hierarchical structure
• Heterogeneous technologies
• Autonomy
• Continuous operation/fail-safe
• Dependability
• Dependence on large number of input devices
• Large installation base (legacy systems)
• Increasing connectivity
Attacks on ICS
• Resilience
• Continuous operation under attack
• Attack mitigation
• Fast recovery after attack
• System evolution without disruption
Attacks
There have been several incidents…
Strategy and approach
• Build it right and continuously monitor
- US Federal Government Strategy
• Our approach
- Programmable (executable) specification with security properties
o Secure by design
- Middleware monitoring process (app) execution
o ARMET compares app and specification execution
- Specification includes defense against identified process vulnerabilities
o Novel vulnerability analysis against false data injection attacks
Method
• Define executable process specification
• Augment with all necessary invariants
• Refine to a single behavioral spec (program)
• Include implementation and specification to middleware (ARMET)
• Compare predictions (spec) and observations (implementation)
• Identify inconsistencies – diagnose - recover
Build it right
Continuously
monitor
Program derivation by stepwise refinement
Specification (set of
acceptable behaviors)
Refinement step
(resolves some implementation questions)
Single
program
Proof (⊇)
Proof (⊇)
Proof (⊇)
Proof (⊇)
Proofs constructed & checked with Coq, a general-purpose logic platform
Example: Water tank control (spec)
Example: Water tank control (code)
ARMET: Organization
ARMET: middleware for secure and resilient ICS
• Self-aware system
- Self-awareness through dependency-directed reasoning
• System is allowed to only behave legally
- Continuous monitoring of prediction/observation consistency
- IF inconsistency, THEN diagnosis
- Recovery (safe state from alternate, reliable source)
• Detection of unknown attacks
- Inconsistency between predictions and observations
• System adaptability to evolutionary constraints
- ICS-CERT standards, security and privacy policies, etc.
- Specify policies as legal behavior & monitor behavioral consistency
Example: Water-tank attack
False Data Injection Attack
• FDI attack
- Feed fake measurement data to the system
- Avoid being detected as bad data
- Mislead the controllers
- The attacks can be local (each control unit) or global (the whole
control network)
• FDI defense: develop a defense system using
techniques for data estimation based on formalizing
- plant, sensors, channels, control software and actuators
- attack, defense and detection
ICS Control Loop
FDI Vulnerability – SMT Problem
• Assumption
- Process P(x)
- There is a monitor mon(x,y) [x= process variables, y= measurements]
• Write satisfiability expression for process
- FDI(y)= There_exists x : pass_monitor(x,y) AND NOT correct_reading(x,y)
- Solve for satisfiability of FDI(y)
o IF FDI(y) is satisfiable with injected values, THEN there exists attack
• Available tool today: dReal
Example: FDI Attack for State Estimation
Analysis of benchmarks
Conclusions
• ICS security is extremely challenging
• We are developing a general framework for CPS security that generalizes both
formal program analysis and fault detection methods
• We have a working prototype
- We are developing increasingly advanced ICS models
• We have a promising vulnerability analysis technique
- We have shown vulnerability in realistic nonlinear power grid models
• Behavior-based ICS protection and analysis is promising
Team
• Howard Shrobe (MIT)
• Armando Solar-Lezama (MIT)
• Adam Chlipala (MIT)
• Sicun Gao (MIT)
• Muhammad Taimoor Khan (Alpen-Adria University Klagenfurt)
• Sana Al Farsi (QCRI)
• Aref Al Tamimi (QCRI)
• Mohammed Al Obaidi (QCRI)
• Anastasios Fragopoulos (QCRI)
THANK YOU !

More Related Content

PDF
Predictive Maintenance with R
PDF
Presentation predictive maintenance solution with IoT and machine learning_SE...
PPT
Software safety in embedded systems & software safety why, what, and how
PPSX
Reverse Engineering android Malware analysis
PPTX
Safety and security in distributed systems
PPTX
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
PDF
abstract
PDF
Information Security Incidents Survey in Russia
Predictive Maintenance with R
Presentation predictive maintenance solution with IoT and machine learning_SE...
Software safety in embedded systems & software safety why, what, and how
Reverse Engineering android Malware analysis
Safety and security in distributed systems
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
abstract
Information Security Incidents Survey in Russia

What's hot (16)

PDF
Unittest og coverage målinger i udviklingsmiljøet hos Deif Windpower
PDF
Event tracking for real time unaware sensitivity analysis
PDF
Taube
PPTX
Web application security measures
PPTX
Quality engineering in a world with AI and IoT
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PPTX
Enterprise Class Vulnerability Management Like A Boss
PDF
April_Byrne_resume
PPT
AWWAWCEnv1102.009
PDF
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
PDF
Retrospective and Trends in Requirements Engineering for Embedded Systems: A ...
PPTX
Code to Release using Artificial Intelligence and Machine Learning
PDF
Outlier+Overview
PPT
Software Security Engineering
PDF
Koppers Case Study
PPT
Network security
Unittest og coverage målinger i udviklingsmiljøet hos Deif Windpower
Event tracking for real time unaware sensitivity analysis
Taube
Web application security measures
Quality engineering in a world with AI and IoT
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Enterprise Class Vulnerability Management Like A Boss
April_Byrne_resume
AWWAWCEnv1102.009
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
Retrospective and Trends in Requirements Engineering for Embedded Systems: A ...
Code to Release using Artificial Intelligence and Machine Learning
Outlier+Overview
Software Security Engineering
Koppers Case Study
Network security
Ad

Viewers also liked (20)

PDF
How to use trello
DOCX
Benefits of breastfeeding to mother and baby
PPTX
Evolution, Disruptors, and Opportunity: Insights from Industry Leaders
PPTX
Presentazione gandalfs
PDF
[서울예술대학교 201701] 디지털아트전공실기 III - 3주차
PPTX
School for Change Agents Module 5 slides
DOCX
Task 3
PPTX
New microsoft power point presentation
PPTX
Magazine analysis
PPT
Зрительная гимнастика по Аветисову
PPTX
Художники аматори Світловодщини
PPTX
神戸市給食オープンデータの有効活用
PDF
Barclays global financial services conference sep. 13 2016 final
PPT
Ugalketafuntzioa 101116122744-phpapp01
PPTX
DIGITAL MEDIA COVERAGE FOR EVOLUTION OF CITIES
PPT
Презентація:Закон Кулона
PPTX
Acute decompensated heart failure
PDF
Kylo为企业级的数据湖赋能 赵锴 kai_zhao_大数据_数据湖_datalake
DOCX
Vinculan las malas dietas con muertes cardiovasculares
How to use trello
Benefits of breastfeeding to mother and baby
Evolution, Disruptors, and Opportunity: Insights from Industry Leaders
Presentazione gandalfs
[서울예술대학교 201701] 디지털아트전공실기 III - 3주차
School for Change Agents Module 5 slides
Task 3
New microsoft power point presentation
Magazine analysis
Зрительная гимнастика по Аветисову
Художники аматори Світловодщини
神戸市給食オープンデータの有効活用
Barclays global financial services conference sep. 13 2016 final
Ugalketafuntzioa 101116122744-phpapp01
DIGITAL MEDIA COVERAGE FOR EVOLUTION OF CITIES
Презентація:Закон Кулона
Acute decompensated heart failure
Kylo为企业级的数据湖赋能 赵锴 kai_zhao_大数据_数据湖_datalake
Vinculan las malas dietas con muertes cardiovasculares
Ad

Similar to A Behavior-based Approach to Secure and Resilient Industrial Control Systems (20)

PDF
Paper4
PPTX
ICS_Security_Use_Case_Presentation (1).pptx
PDF
ICS security
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
DOCX
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
PPT
Industrial control systems cybersecurity.ppt
PPT
Control system including PLC cybersecurity
PPTX
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
PDF
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
PPTX
Luigi Roman - CybersecurityPointOfView-LR.pptx
PDF
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf
PPTX
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
PDF
Securing Industrial Control System
PDF
Cyber security colombo meetup
ODP
CISSP Week 22
PPTX
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
PPT
Power Grid Communications & Control Systems
PPTX
Critical Infrastructure Security by Subodh Belgi
PPTX
Deep secure holistic protection for ICS
PPTX
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Paper4
ICS_Security_Use_Case_Presentation (1).pptx
ICS security
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Industrial control systems cybersecurity.ppt
Control system including PLC cybersecurity
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
Luigi Roman - CybersecurityPointOfView-LR.pptx
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Securing Industrial Control System
Cyber security colombo meetup
CISSP Week 22
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Power Grid Communications & Control Systems
Critical Infrastructure Security by Subodh Belgi
Deep secure holistic protection for ICS
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...

More from Förderverein Technische Fakultät (20)

PDF
„Die Klimakrise ist da! Wo führt sie hin?“
PDF
Constrained text generation to measure reading performance: A new approach ba...
PPTX
Greening local government units: Current status and required competences
PDF
Supervisory control of business processes
PPTX
The Digital Transformation of Education: A Hyper-Disruptive Era through Block...
PDF
A Game of Chess is Like a Swordfight.pdf
PDF
From Mind to Meta.pdf
PDF
Miniatures Design for Tabletop Games.pdf
PPTX
Distributed Systems in the Post-Moore Era.pptx
PPTX
Don't Treat the Symptom, Find the Cause!.pptx
PDF
Engineering Serverless Workflow Applications in Federated FaaS.pdf
PDF
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
PDF
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
PDF
Towards a data driven identification of teaching patterns.pdf
PPTX
Förderverein Technische Fakultät.pptx
PDF
The Computing Continuum.pdf
PPTX
East-west oriented photovoltaic power systems: model, benefits and technical ...
PDF
Machine Learning in Finance via Randomization
PPTX
Advances in Visual Quality Restoration with Generative Adversarial Networks
„Die Klimakrise ist da! Wo führt sie hin?“
Constrained text generation to measure reading performance: A new approach ba...
Greening local government units: Current status and required competences
Supervisory control of business processes
The Digital Transformation of Education: A Hyper-Disruptive Era through Block...
A Game of Chess is Like a Swordfight.pdf
From Mind to Meta.pdf
Miniatures Design for Tabletop Games.pdf
Distributed Systems in the Post-Moore Era.pptx
Don't Treat the Symptom, Find the Cause!.pptx
Engineering Serverless Workflow Applications in Federated FaaS.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Towards a data driven identification of teaching patterns.pdf
Förderverein Technische Fakultät.pptx
The Computing Continuum.pdf
East-west oriented photovoltaic power systems: model, benefits and technical ...
Machine Learning in Finance via Randomization
Advances in Visual Quality Restoration with Generative Adversarial Networks

Recently uploaded (20)

PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Approach and Philosophy of On baking technology
PDF
August Patch Tuesday
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
TLE Review Electricity (Electricity).pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Getting Started with Data Integration: FME Form 101
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
Web App vs Mobile App What Should You Build First.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Accuracy of neural networks in brain wave diagnosis of schizophrenia
DP Operators-handbook-extract for the Mautical Institute
SOPHOS-XG Firewall Administrator PPT.pptx
Approach and Philosophy of On baking technology
August Patch Tuesday
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Unlocking AI with Model Context Protocol (MCP)
TLE Review Electricity (Electricity).pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
WOOl fibre morphology and structure.pdf for textiles
Getting Started with Data Integration: FME Form 101
Enhancing emotion recognition model for a student engagement use case through...
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars

A Behavior-based Approach to Secure and Resilient Industrial Control Systems

  • 1. A Behavior-based Approach to Secure and Resilient Industrial Control Systems Dimitrios Serpanos Industrial Systems Institute/RC ATHENA, Director University of Patras, Professor Patras, Greece Alpen-Adria University Klagenfurt, March 9, 2017
  • 2. ICS are Cyber-Physical Systems • Inter-disciplinary emerging area • Computation + Physics • Algorithms + Logic + Control + …
  • 3. IT vs. OT Information Technology Operational Technology Purpose Process transactions, provide information Control or monitor physical processes and equipment Architecture Enterprise wide infrastructure and applications (generic) Event driven, real time, embedded hardware and software (custom) Interfaces GUI, web browser, terminal and keyboard Electromechanical, sensors, actuators, coded displays, hand-held devices Ownership CIO and IT Engineers, technicians, operators and managers Connectivity Corporate network, IP based Control networks, hardwired twisted pair and IP based Role Supports people Controls machines
  • 6. System View - Requirements • Hierarchical structure • Heterogeneous technologies • Autonomy • Continuous operation/fail-safe • Dependability • Dependence on large number of input devices • Large installation base (legacy systems) • Increasing connectivity
  • 7. Attacks on ICS • Resilience • Continuous operation under attack • Attack mitigation • Fast recovery after attack • System evolution without disruption Attacks
  • 8. There have been several incidents…
  • 9. Strategy and approach • Build it right and continuously monitor - US Federal Government Strategy • Our approach - Programmable (executable) specification with security properties o Secure by design - Middleware monitoring process (app) execution o ARMET compares app and specification execution - Specification includes defense against identified process vulnerabilities o Novel vulnerability analysis against false data injection attacks
  • 10. Method • Define executable process specification • Augment with all necessary invariants • Refine to a single behavioral spec (program) • Include implementation and specification to middleware (ARMET) • Compare predictions (spec) and observations (implementation) • Identify inconsistencies – diagnose - recover Build it right Continuously monitor
  • 11. Program derivation by stepwise refinement Specification (set of acceptable behaviors) Refinement step (resolves some implementation questions) Single program Proof (⊇) Proof (⊇) Proof (⊇) Proof (⊇) Proofs constructed & checked with Coq, a general-purpose logic platform
  • 12. Example: Water tank control (spec)
  • 13. Example: Water tank control (code)
  • 15. ARMET: middleware for secure and resilient ICS • Self-aware system - Self-awareness through dependency-directed reasoning • System is allowed to only behave legally - Continuous monitoring of prediction/observation consistency - IF inconsistency, THEN diagnosis - Recovery (safe state from alternate, reliable source) • Detection of unknown attacks - Inconsistency between predictions and observations • System adaptability to evolutionary constraints - ICS-CERT standards, security and privacy policies, etc. - Specify policies as legal behavior & monitor behavioral consistency
  • 17. False Data Injection Attack • FDI attack - Feed fake measurement data to the system - Avoid being detected as bad data - Mislead the controllers - The attacks can be local (each control unit) or global (the whole control network) • FDI defense: develop a defense system using techniques for data estimation based on formalizing - plant, sensors, channels, control software and actuators - attack, defense and detection
  • 19. FDI Vulnerability – SMT Problem • Assumption - Process P(x) - There is a monitor mon(x,y) [x= process variables, y= measurements] • Write satisfiability expression for process - FDI(y)= There_exists x : pass_monitor(x,y) AND NOT correct_reading(x,y) - Solve for satisfiability of FDI(y) o IF FDI(y) is satisfiable with injected values, THEN there exists attack • Available tool today: dReal
  • 20. Example: FDI Attack for State Estimation
  • 22. Conclusions • ICS security is extremely challenging • We are developing a general framework for CPS security that generalizes both formal program analysis and fault detection methods • We have a working prototype - We are developing increasingly advanced ICS models • We have a promising vulnerability analysis technique - We have shown vulnerability in realistic nonlinear power grid models • Behavior-based ICS protection and analysis is promising
  • 23. Team • Howard Shrobe (MIT) • Armando Solar-Lezama (MIT) • Adam Chlipala (MIT) • Sicun Gao (MIT) • Muhammad Taimoor Khan (Alpen-Adria University Klagenfurt) • Sana Al Farsi (QCRI) • Aref Al Tamimi (QCRI) • Mohammed Al Obaidi (QCRI) • Anastasios Fragopoulos (QCRI)