Cyber SCADA Research for the Nation's Critical InfrastructureCyber SCADA Research for the Nation's Critical Infrastructure
CHRISTOPHER KLAUS*, KEITH ANDREW, and MICHAEL VOGT
AbstractAbstract
SCADA systems used to control critical infrastructure systems have increasingly become part of our CyberInfrastructure by utilizing the Internet for SCADA communications. Unfortunately SCADA systems were not built
with cybersecurity in mind to defend against vulnerabilities inherent with Internet communications. There is a clear need to develop Cyber SCADA Research for the Nation's Critical Infrastructure in order to identify and
explore SCADA cyber attacks, correct existing vulnerabilities, and to help defend against these current and future attacks.
Western Kentucky University’s Cyber Defense Laboratory (CDL) presents this poster to discuss methods of utilizing advanced pattern recognition, classification, trend predictions and autonomic computing from other
challenging disciplines to research SCADA intrusion analysis and prevention.
While federal agencies have cyber defense data warehouses for classified data, currently no equivelent unclassified data warehouse is available to academic researchers. The immediately puts a bottle-neck in any attempt to
train cyber-security personnel and provide a defense against the rapidly growing cyber threats. The CDL has the largest non-government agency owned classified data warehouse for cyber attack data, called ARL NACMAST.
Our strategy leverages this existing infrastructure to create a Cyber Attack Unclassified Data Warehouse for SCADA cyber attacks. This will promote and support the rapid development of effective SCADA Cyber Security
research.
References
Plugfest, SCADA CYBER SECURITY WORKSHOP,
Nov. 3, 2010, http://www.nacmast.com/scada-workshop
AcknowledgementsAcknowledgements
We thank Electronic Warfare Associates and the United States Army Research Laboratory for extensive support and grant
funding this research. We also gratefully acknowledge the NACMAST crew and research scientists for supplying data and
technical support. Special thanks also goes to WKU’s Advanced Research & Technology Program for aid in administering this
grant.
KAS Meeting
Western Kentucky University
Bowling Green, KY
Nov. 12-13, 2010
Cyber Defense Laboratory, Western Kentucky University
Electronic Warfare Associates Government Systems Inc.
Department of Physics and Astronomy
Bowling Green, KY 42101
Applied Physics Institute
Argonne National Laboratory
Army Research Laboratory
Cyber Mapping, MTP
EDaptive Computing
Electronic Warfare Associates, GSI
George Mason University
Michigan State University
Mississippi State University
University of Arizona
University of Louisville
CDL Collaborators
Motors, Drives,
Actuators
Sensors and other
Input/Output Devices
Programmable Logic
Controllers (PLC)
Human Machine
Interface (HMI)
PC Based
Controllers
Ethernet
Remote Terminal
Unit (RTU)
SCADA
Laboratory
FirewallSCADA Laboratories at Western Kentucky
University, Southern Methodist University,
and University of Arizona are being
configured as environments to explore
SCADA cyber attacks. Each SCADA
Laboratory will focus on separate Critical
Infrastructure interests .
CDL Data Warehouse
Appropriate methods to capture network traffic
data of SCADA cyber attacks are being explored.
Initial testing of data capture is being performed
by WKU and SMU with results from the Plugfest
at the SCADA Cyber Security Workshop in
Dallas, TX. SMU is replicating these attacks,
which are captured and transferred to WKU’s
CDL Data Warehouse.
SCADA Laboratories
Leveraging knowledge from data capture with
the SCADA Laboratories, the Interrogator /
Seminole Architecture will be modified to
capture and analyze SCADA cyber attacks.
Biosphere 2
The Biosphere 2 is controlled by
SCADA systems, and is a good
representative of a city’s Critical
Infrastructure.
Interrogator Architecture
Computer Network Defense Analysts
(CNDAs) at the CDL and Electonic Warfare
Associates will review and document
SCADA Cyber Attacks, utilizing network
analysis tools within the Interrogator
Architecture. CNDAs’ network assessments
are based on NSA’s INFOSEC Assessment
and Evaluation Methodology
Red / blue teams have been created at each university comprised of
researchers, faculty, students, and certified ethical hackers. These
teams take turns at attacking and defending the SCADA
Laboratories.
In the future, it is intended that these teams take turns at attacking
and defending the Biosphere 2.
SCADA cyber attacks:
• Unauthorized Command Execution,
• SCADA Denial of Service,
• SCADA Man-in-the-Middle,
• Replay, and
• Malicious Service Commands.
Network traffic and CNDA documentation of
SCADA cyber attacks will be stored in the
CDL Data Warehouse.
Network sensors
will be place in
the Biosphere 2’s
infrastructure to
monitor network
traffic.
Common SCADA equipment is/was
utilized at the SCADA Laboratories
and the recent Plugfest.
The goal is to encourage industries
supporting critical infrastructures to
send their SCADA equipment to our
laboratories for testing.
Biosphere 2 would be utilized for
testing interactions between large
suites of SCADA equipment.
SCADA controls are utilized in all critical
infrastructures (electric, water, transportation,
etc.). These images are from systems that
have been compromised by ad hoc SCADA
attacks. Stuxnet is the first example of a
SCADA worm, which significantly increases
the vulnerabilities of these infrastructures.
SCADA cyber attacks are utilized
by our research team. The goal is
for the CDL Data Warehouse to
become available as a user
facility for other cyber security
researcher teams.
Research produces methods
for defending and hardening
SCADA equipment. Modules for better detection of
SCADA cyber attacks will be
developed for the Interrogator /
Seminole Architecture.
Interrogator is the Army
Research Laboratory’s (ARL)
current IDS architecture, which
is utilized for DoD facilities.
Seminole is a special ARL-
derived IDS architecture for use
with non-DoD participants.
Current research Planned research

More Related Content

PDF
Incident Response in an ICS Environment
PPT
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
PDF
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
PDF
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
DOCX
Sqrrl
PPTX
SeaCat: and SDN End-to-end Application Containment ArchitecTure
PPTX
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
PDF
Neo4j for Discovering Drugs and Biomarkers
Incident Response in an ICS Environment
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Sqrrl
SeaCat: and SDN End-to-end Application Containment ArchitecTure
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Neo4j for Discovering Drugs and Biomarkers

Similar to CDL Scada Security Poster (20)

PDF
Utilization of Encryption for Security in SCADA Networks
PDF
Encryption Security in SCADA Networks
PPTX
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
PPT
Towards a World of Ubiquitous Sensors and Actuators
PPT
The Importance of Large-Scale Computer Science Research Efforts
PDF
Cyber-Defensive Architecture for Networked Industrial Control Systems
PDF
Technical seminar for btech student for the presentation which can be present
PPT
Calit2 Projects in Cyberinfrastructure
PDF
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
PDF
Iaetsd survey on big data analytics for sdn (software defined networks)
PDF
Deep Learning for Smart Grid Intrusion Detection: A Hybrid CNN-LSTM-Based Model
PDF
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
PDF
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
PDF
SCADA forensic tools open source. What are they What they doSo.pdf
PPTX
Cps security bitsworkshopdec15.2012 (1)
PPTX
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
PDF
Secure Decisions - Cyber Security Sensemaking
PDF
3. the grid new infrastructure
DOCX
Wireless body area network
PDF
Three level intrusion detection system based on conditional generative advers...
Utilization of Encryption for Security in SCADA Networks
Encryption Security in SCADA Networks
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
Towards a World of Ubiquitous Sensors and Actuators
The Importance of Large-Scale Computer Science Research Efforts
Cyber-Defensive Architecture for Networked Industrial Control Systems
Technical seminar for btech student for the presentation which can be present
Calit2 Projects in Cyberinfrastructure
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
Iaetsd survey on big data analytics for sdn (software defined networks)
Deep Learning for Smart Grid Intrusion Detection: A Hybrid CNN-LSTM-Based Model
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
SCADA forensic tools open source. What are they What they doSo.pdf
Cps security bitsworkshopdec15.2012 (1)
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
Secure Decisions - Cyber Security Sensemaking
3. the grid new infrastructure
Wireless body area network
Three level intrusion detection system based on conditional generative advers...
Ad

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Unlock new opportunities with location data.pdf
PPT
Geologic Time for studying geology for geologist
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid model detection and classification of lung cancer
PPTX
Modernising the Digital Integration Hub
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
DP Operators-handbook-extract for the Mautical Institute
Group 1 Presentation -Planning and Decision Making .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
The various Industrial Revolutions .pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Enhancing emotion recognition model for a student engagement use case through...
observCloud-Native Containerability and monitoring.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Module 1.ppt Iot fundamentals and Architecture
1 - Historical Antecedents, Social Consideration.pdf
A review of recent deep learning applications in wood surface defect identifi...
Tartificialntelligence_presentation.pptx
Unlock new opportunities with location data.pdf
Geologic Time for studying geology for geologist
Zenith AI: Advanced Artificial Intelligence
Hybrid model detection and classification of lung cancer
Modernising the Digital Integration Hub
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting started with AI Agents and Multi-Agent Systems
Hindi spoken digit analysis for native and non-native speakers
DP Operators-handbook-extract for the Mautical Institute
Ad

CDL Scada Security Poster

  • 1. Cyber SCADA Research for the Nation's Critical InfrastructureCyber SCADA Research for the Nation's Critical Infrastructure CHRISTOPHER KLAUS*, KEITH ANDREW, and MICHAEL VOGT AbstractAbstract SCADA systems used to control critical infrastructure systems have increasingly become part of our CyberInfrastructure by utilizing the Internet for SCADA communications. Unfortunately SCADA systems were not built with cybersecurity in mind to defend against vulnerabilities inherent with Internet communications. There is a clear need to develop Cyber SCADA Research for the Nation's Critical Infrastructure in order to identify and explore SCADA cyber attacks, correct existing vulnerabilities, and to help defend against these current and future attacks. Western Kentucky University’s Cyber Defense Laboratory (CDL) presents this poster to discuss methods of utilizing advanced pattern recognition, classification, trend predictions and autonomic computing from other challenging disciplines to research SCADA intrusion analysis and prevention. While federal agencies have cyber defense data warehouses for classified data, currently no equivelent unclassified data warehouse is available to academic researchers. The immediately puts a bottle-neck in any attempt to train cyber-security personnel and provide a defense against the rapidly growing cyber threats. The CDL has the largest non-government agency owned classified data warehouse for cyber attack data, called ARL NACMAST. Our strategy leverages this existing infrastructure to create a Cyber Attack Unclassified Data Warehouse for SCADA cyber attacks. This will promote and support the rapid development of effective SCADA Cyber Security research. References Plugfest, SCADA CYBER SECURITY WORKSHOP, Nov. 3, 2010, http://www.nacmast.com/scada-workshop AcknowledgementsAcknowledgements We thank Electronic Warfare Associates and the United States Army Research Laboratory for extensive support and grant funding this research. We also gratefully acknowledge the NACMAST crew and research scientists for supplying data and technical support. Special thanks also goes to WKU’s Advanced Research & Technology Program for aid in administering this grant. KAS Meeting Western Kentucky University Bowling Green, KY Nov. 12-13, 2010 Cyber Defense Laboratory, Western Kentucky University Electronic Warfare Associates Government Systems Inc. Department of Physics and Astronomy Bowling Green, KY 42101 Applied Physics Institute Argonne National Laboratory Army Research Laboratory Cyber Mapping, MTP EDaptive Computing Electronic Warfare Associates, GSI George Mason University Michigan State University Mississippi State University University of Arizona University of Louisville CDL Collaborators Motors, Drives, Actuators Sensors and other Input/Output Devices Programmable Logic Controllers (PLC) Human Machine Interface (HMI) PC Based Controllers Ethernet Remote Terminal Unit (RTU) SCADA Laboratory FirewallSCADA Laboratories at Western Kentucky University, Southern Methodist University, and University of Arizona are being configured as environments to explore SCADA cyber attacks. Each SCADA Laboratory will focus on separate Critical Infrastructure interests . CDL Data Warehouse Appropriate methods to capture network traffic data of SCADA cyber attacks are being explored. Initial testing of data capture is being performed by WKU and SMU with results from the Plugfest at the SCADA Cyber Security Workshop in Dallas, TX. SMU is replicating these attacks, which are captured and transferred to WKU’s CDL Data Warehouse. SCADA Laboratories Leveraging knowledge from data capture with the SCADA Laboratories, the Interrogator / Seminole Architecture will be modified to capture and analyze SCADA cyber attacks. Biosphere 2 The Biosphere 2 is controlled by SCADA systems, and is a good representative of a city’s Critical Infrastructure. Interrogator Architecture Computer Network Defense Analysts (CNDAs) at the CDL and Electonic Warfare Associates will review and document SCADA Cyber Attacks, utilizing network analysis tools within the Interrogator Architecture. CNDAs’ network assessments are based on NSA’s INFOSEC Assessment and Evaluation Methodology Red / blue teams have been created at each university comprised of researchers, faculty, students, and certified ethical hackers. These teams take turns at attacking and defending the SCADA Laboratories. In the future, it is intended that these teams take turns at attacking and defending the Biosphere 2. SCADA cyber attacks: • Unauthorized Command Execution, • SCADA Denial of Service, • SCADA Man-in-the-Middle, • Replay, and • Malicious Service Commands. Network traffic and CNDA documentation of SCADA cyber attacks will be stored in the CDL Data Warehouse. Network sensors will be place in the Biosphere 2’s infrastructure to monitor network traffic. Common SCADA equipment is/was utilized at the SCADA Laboratories and the recent Plugfest. The goal is to encourage industries supporting critical infrastructures to send their SCADA equipment to our laboratories for testing. Biosphere 2 would be utilized for testing interactions between large suites of SCADA equipment. SCADA controls are utilized in all critical infrastructures (electric, water, transportation, etc.). These images are from systems that have been compromised by ad hoc SCADA attacks. Stuxnet is the first example of a SCADA worm, which significantly increases the vulnerabilities of these infrastructures. SCADA cyber attacks are utilized by our research team. The goal is for the CDL Data Warehouse to become available as a user facility for other cyber security researcher teams. Research produces methods for defending and hardening SCADA equipment. Modules for better detection of SCADA cyber attacks will be developed for the Interrogator / Seminole Architecture. Interrogator is the Army Research Laboratory’s (ARL) current IDS architecture, which is utilized for DoD facilities. Seminole is a special ARL- derived IDS architecture for use with non-DoD participants. Current research Planned research