Network Reliability Monitoring for ICS
Going beyond NSM and SIEM
Jim Gilsinn
• Senior Investigator, Kenexis Consulting
– ICS Network & Security Assessments & Designs
– Developer, Dulcet Analytics, Reliability Monitoring Tool
• Previous Life – NIST Engineering Lab
– 20+ Years Engineering
– ICS Cyber Security & Network Performance
– Control Systems, Automated Vehicles, Wireless Sensors & Systems
• International Society of Automation (ISA)
– ISA99 Committee, Co-Chair (ISA/IEC 62443 Standard Series)
– ISA99-WG2, Co-Chair (ICS Security Program)
What is Network Security Monitoring?
• “the collection, analysis, and escalation of
indications and warnings to detect and respond to
intrusions.”
• “a way to find intruders on your network and do
something about them before they damage your
enterprise.”
The Practice of Network Security Monitoring, Richard Bejtlich
What is Security Information and Event Management?
• SIEM products and services provide “real-time analysis
of security alerts generated by network hardware and
applications.”
–Data aggregation
–Correlation
–Alerting
–Dashboards
–Compliance
–Retention
–Forensics analysis
Wikipedia
This is NOT A Talk About NSM or SIEM
• Richard Bejtlich has some good books on NSM
• Chris Sistrunk has some really good presentations on
NSM for ICS
• <Pick_a_search_engine> and vendors have information
on both NSM and SIEM
–As always, take it with a grain of salt
When NSM Won’t Work?
• “…if you can’t observe the traffic that you care
about, NSM will not work well.”
• “Node-to-node activity, though, is largely
unobserved at the network level.”
The Practice of Network Security Monitoring, Richard Bejtlich
Example ICS/SCADA Network: Upper-Level Architecture
• Most Traffic
Crosses Zone
Boundaries
• Less ICS-Specific
Protocols
• More Common
Platforms
NSM Works Great in Upper-Level Architecture
• Most traffic crosses zone boundaries
– Network traffic can be observed
• Less ICS-specific protocols
– Less ICS-specific protocol knowledge needed to analyze
– More available automated network traffic analyzers
• More common platforms
– Some platforms allow NSM agents
– Security logs available
Example ICS/SCADA Network: Lower-Level Architecture
• Most Traffic
Remains Within
Zone
• Mostly ICS-
Specific
Protocols
• ICS-Specific
Platforms
NSM Doesn’t Work As Well in Lower-Level Architecture
• Most Traffic Remains Within Zone
– Traffic doesn’t generally flow through NSM sensors
– Most traffic remains in smaller segregated segments within zone
• Mostly ICS-specific protocols
– More ICS-specific protocol knowledge to analyze
– Less available automated tools to analyze, if any at all
• ICS-specific platforms
– Non-standard OS on ICS-specific hardware
– Some standard OS exist, with vendor-recommended limitations
NSM Doesn’t Work As Well in Lower-Level Architecture
• ICS/SCADA equipment was generally not designed with security in mind
– Devices aren’t capable
– Information doesn’t exist
– Hardware platforms are minimalistic designs
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring
• Negative indicators don’t tell whole story
– Absence of security reports doesn’t indicate everything is working properly
• Develop a “known-good” set of traffic signatures
– FAT, SAT, commissioning, system changes, periodic testing, etc.
– Continuous monitoring possible
• Compare periodic scans to “known-good” signatures
• Look for deviations from norm
– New traffic streams
– Traffic streams performing different than expected
– Traffic anomalies
Network Reliability Monitoring Can Be Simple
• Complex algorithms not necessary
– Hardest part can be isolating traffic streams
– Your Wireshark Fu needs to be strong in many cases
– Measurement metrics relatively simple (Jitter & Latency)
• Free and low-cost tools exist
– Wireshark for traffic stream processing
– Spreadsheets for metric analysis
• Basic charts & graphs are easy to generate
Network Reliability Monitoring Can Be Incredibly Hard
• Detailed analysis takes knowledge of ICS-protocols
– Inner working
– Quirks & idiosyncrasies
• Root cause analysis is incredibly difficult
– Device real-time architecture
– Network performance issues
– Lack the tools & techniques to investigate many issues
• Automating the analysis process can be difficult
– Building in process knowledge to algorithms
So… What Can You See?
Expected Frequency *Jitter is Variation From Expected Frequency
~10ms Mean Measured Packet Interval
±400µs Jitter*
So… What Can You See?
~10.4ms Mean Measured Packet Interval
±400µs Jitter*
Wider Distribution
More Peaks in Histogram
So… What Can You See? ~1ms Mean Measured Packet Interval
±10µs Jitter*
Beat Patter @ ~30s
So… What Can You See? ~2ms Mean Measured Packet Interval
±1ms Jitter*
Beat Patter @ ~50s
So… What Can You See?
• OS & application operations
– Garbage collection
– Antivirus checks & updates
– On-screen operator commands
• Network anomalies
– Network EMI interference
– Signal degradation
– Flaky connections
• Security-related incidents
Man-In-The-Middle Testing
• Kali Linux VM
– Ettercap
– ARP Poisoning
– All default settings
(script-kiddy style)
• Captured traffic off
mirror port
• PLC to I/O
– EtherNet/IP™
– 10ms frequency
• MITM against PLC
MITM Testing – Source IP Address was I/O Block
~10ms Mean Measured Packet Interval
±400µs Jitter*
MITM Testing – Source Address was PLC
MITM Testing – Results
• PLC and I/O block didn’t care
– Both devices continued transmitting in the presence of MITM attack
– Likely due to multicast EtherNet/IP protocol
• When PLC traffic isolated from MITM, it showed no change in
performance
• Ettercap scripts to modify command signals generated
– Increase sequence number
– Modify output commands to I/O block
• Checked captures without seeing red-flags
– VirusTotal
– NetworkMiner
– Bro
Summary
• NSM is good
– If you are doing it great
– If not, maybe you should
• NSM can’t detect everything, especially for ICS/SCADA networks
• There are ways to measure network reliability in the lower layers
– ICS/SCADA networks are particularly well suited to this
Questions & Comments?
• Jim Gilsinn
• Senior Investigator, Kenexis
• +1-614-323-2254
• Jim.Gilsinn@Kenexis.com
• @JimGilsinn

More Related Content

PPTX
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
PPTX
Practical Approaches to Securely Integrating Business and Production
PDF
Secure Systems Security and ISA99- IEC62443
PDF
Nist 800 82 ICS Security Auditing Framework
PPTX
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
PPTX
Integrating the Alphabet Soup of Standards
PDF
Cybersecurity in Industrial Control Systems (ICS)
PPTX
CyberSecurity Best Practices for the IIoT
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Practical Approaches to Securely Integrating Business and Production
Secure Systems Security and ISA99- IEC62443
Nist 800 82 ICS Security Auditing Framework
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
Integrating the Alphabet Soup of Standards
Cybersecurity in Industrial Control Systems (ICS)
CyberSecurity Best Practices for the IIoT

What's hot (20)

PDF
The journey to ICS - Extended
PDF
Should I Patch My ICS?
PPTX
The Future of ICS Security Products
PPT
DHS ICS Security Presentation
PPTX
Using Assessment Tools on ICS (English)
PPTX
Scada security presentation by Stephen Miller
PDF
Monitoring ICS Communications
PDF
Industrial Control System Security Overview
PPTX
IEC and cyber security (June 2018)
PPTX
Hacker Halted 2016 - How to get into ICS security
PDF
S4xJapan Closing Keynote
PPTX
ICS Security 101 by Sandeep Singh
PPTX
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
PDF
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
PDF
CSIRS ICS BCS 2.2
PPTX
Critical Infrastructure and Security
PPSX
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
PDF
Securing SCADA
PDF
Active Directory in ICS: Lessons Learned From The Field
PDF
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
The journey to ICS - Extended
Should I Patch My ICS?
The Future of ICS Security Products
DHS ICS Security Presentation
Using Assessment Tools on ICS (English)
Scada security presentation by Stephen Miller
Monitoring ICS Communications
Industrial Control System Security Overview
IEC and cyber security (June 2018)
Hacker Halted 2016 - How to get into ICS security
S4xJapan Closing Keynote
ICS Security 101 by Sandeep Singh
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
CSIRS ICS BCS 2.2
Critical Infrastructure and Security
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Securing SCADA
Active Directory in ICS: Lessons Learned From The Field
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Ad

Viewers also liked (9)

PPTX
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
PPTX
Havex Deep Dive (English)
PPTX
Dynamic Zoning Based On Situational Activity in ICS (Japanese)
PPTX
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
PPTX
ICS Security Training ... What Works and What Is Needed (Japanese)
PPTX
BSidesAugusta ICS SCADA Defense
PDF
ICS Network Security Monitoring (NSM)
PDF
Lessons Learned from the NIST CSF
PDF
Cisco ASA
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Havex Deep Dive (English)
Dynamic Zoning Based On Situational Activity in ICS (Japanese)
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ICS Security Training ... What Works and What Is Needed (Japanese)
BSidesAugusta ICS SCADA Defense
ICS Network Security Monitoring (NSM)
Lessons Learned from the NIST CSF
Cisco ASA
Ad

Similar to Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM (20)

PDF
DEF CON 23 - NSM 101 for ICS
PPTX
Where Are All The ICS Attacks?
PPT
Control system including PLC cybersecurity
PDF
Defcon 23 - Chris Sistrunk - nsm 101 for ics
PPT
Power Grid Communications & Control Systems
PPTX
Encryption in industrial control systems; Is the juice worth the squeeze?
PPTX
INSECS: Intelligent networks security system
PPTX
Kaseya Connect 2012 - THE ABC'S OF MONITORING
PDF
Defcon 22-tim-mcguffin-one-man-shop
PDF
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PDF
PT-DTS SCADA Security using MaxPatrol
PPTX
Science DMZ security
PPTX
Spirent: The Internet of Things: The Expanded Security Perimeter
PPT
intrusion detection system (IDS)
PPTX
Pass4sure 640-554 Cisco IOS Network Security
PPTX
Network Intrusion Detection Systems #1
PPT
Day4
PPTX
640-554 IT Certification and Career Paths
PDF
Sym 2015 product overview apr2015
DEF CON 23 - NSM 101 for ICS
Where Are All The ICS Attacks?
Control system including PLC cybersecurity
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Power Grid Communications & Control Systems
Encryption in industrial control systems; Is the juice worth the squeeze?
INSECS: Intelligent networks security system
Kaseya Connect 2012 - THE ABC'S OF MONITORING
Defcon 22-tim-mcguffin-one-man-shop
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
Building a Cyber Security Operations Center for SCADA/ICS Environments
PT-DTS SCADA Security using MaxPatrol
Science DMZ security
Spirent: The Internet of Things: The Expanded Security Perimeter
intrusion detection system (IDS)
Pass4sure 640-554 Cisco IOS Network Security
Network Intrusion Detection Systems #1
Day4
640-554 IT Certification and Career Paths
Sym 2015 product overview apr2015

More from Jim Gilsinn (11)

PPTX
ISA/IEC 62443: Intro and How To
PPTX
Network Security: Protecting SOHO Networks
PPTX
Cook Like a Hacker!
PPTX
ICS Performance Lab
PPTX
Cyber & Process Attack Scenarios for ICS
PPTX
Low-Cost ICS Network Performance Testing
PPTX
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
PPTX
You name it, we analyze it
PPTX
Wireshark Network Protocol Analyzer
PPTX
Network Packet Analysis with Wireshark
PPTX
Test Tool for Industrial Ethernet Network Performance (June 2009)
ISA/IEC 62443: Intro and How To
Network Security: Protecting SOHO Networks
Cook Like a Hacker!
ICS Performance Lab
Cyber & Process Attack Scenarios for ICS
Low-Cost ICS Network Performance Testing
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
You name it, we analyze it
Wireshark Network Protocol Analyzer
Network Packet Analysis with Wireshark
Test Tool for Industrial Ethernet Network Performance (June 2009)

Recently uploaded (20)

PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
WOOl fibre morphology and structure.pdf for textiles
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPT
Geologic Time for studying geology for geologist
DOCX
search engine optimization ppt fir known well about this
PDF
STKI Israel Market Study 2025 version august
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Modernising the Digital Integration Hub
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
NewMind AI Weekly Chronicles – August ’25 Week III
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
What is a Computer? Input Devices /output devices
WOOl fibre morphology and structure.pdf for textiles
Module 1.ppt Iot fundamentals and Architecture
Web Crawler for Trend Tracking Gen Z Insights.pptx
Architecture types and enterprise applications.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Getting Started with Data Integration: FME Form 101
Final SEM Unit 1 for mit wpu at pune .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Geologic Time for studying geology for geologist
search engine optimization ppt fir known well about this
STKI Israel Market Study 2025 version august
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A comparative study of natural language inference in Swahili using monolingua...
Modernising the Digital Integration Hub

Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM

  • 1. Network Reliability Monitoring for ICS Going beyond NSM and SIEM
  • 2. Jim Gilsinn • Senior Investigator, Kenexis Consulting – ICS Network & Security Assessments & Designs – Developer, Dulcet Analytics, Reliability Monitoring Tool • Previous Life – NIST Engineering Lab – 20+ Years Engineering – ICS Cyber Security & Network Performance – Control Systems, Automated Vehicles, Wireless Sensors & Systems • International Society of Automation (ISA) – ISA99 Committee, Co-Chair (ISA/IEC 62443 Standard Series) – ISA99-WG2, Co-Chair (ICS Security Program)
  • 3. What is Network Security Monitoring? • “the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions.” • “a way to find intruders on your network and do something about them before they damage your enterprise.” The Practice of Network Security Monitoring, Richard Bejtlich
  • 4. What is Security Information and Event Management? • SIEM products and services provide “real-time analysis of security alerts generated by network hardware and applications.” –Data aggregation –Correlation –Alerting –Dashboards –Compliance –Retention –Forensics analysis Wikipedia
  • 5. This is NOT A Talk About NSM or SIEM • Richard Bejtlich has some good books on NSM • Chris Sistrunk has some really good presentations on NSM for ICS • <Pick_a_search_engine> and vendors have information on both NSM and SIEM –As always, take it with a grain of salt
  • 6. When NSM Won’t Work? • “…if you can’t observe the traffic that you care about, NSM will not work well.” • “Node-to-node activity, though, is largely unobserved at the network level.” The Practice of Network Security Monitoring, Richard Bejtlich
  • 7. Example ICS/SCADA Network: Upper-Level Architecture • Most Traffic Crosses Zone Boundaries • Less ICS-Specific Protocols • More Common Platforms
  • 8. NSM Works Great in Upper-Level Architecture • Most traffic crosses zone boundaries – Network traffic can be observed • Less ICS-specific protocols – Less ICS-specific protocol knowledge needed to analyze – More available automated network traffic analyzers • More common platforms – Some platforms allow NSM agents – Security logs available
  • 9. Example ICS/SCADA Network: Lower-Level Architecture • Most Traffic Remains Within Zone • Mostly ICS- Specific Protocols • ICS-Specific Platforms
  • 10. NSM Doesn’t Work As Well in Lower-Level Architecture • Most Traffic Remains Within Zone – Traffic doesn’t generally flow through NSM sensors – Most traffic remains in smaller segregated segments within zone • Mostly ICS-specific protocols – More ICS-specific protocol knowledge to analyze – Less available automated tools to analyze, if any at all • ICS-specific platforms – Non-standard OS on ICS-specific hardware – Some standard OS exist, with vendor-recommended limitations
  • 11. NSM Doesn’t Work As Well in Lower-Level Architecture • ICS/SCADA equipment was generally not designed with security in mind – Devices aren’t capable – Information doesn’t exist – Hardware platforms are minimalistic designs
  • 13. Network Reliability Monitoring • Negative indicators don’t tell whole story – Absence of security reports doesn’t indicate everything is working properly • Develop a “known-good” set of traffic signatures – FAT, SAT, commissioning, system changes, periodic testing, etc. – Continuous monitoring possible • Compare periodic scans to “known-good” signatures • Look for deviations from norm – New traffic streams – Traffic streams performing different than expected – Traffic anomalies
  • 14. Network Reliability Monitoring Can Be Simple • Complex algorithms not necessary – Hardest part can be isolating traffic streams – Your Wireshark Fu needs to be strong in many cases – Measurement metrics relatively simple (Jitter & Latency) • Free and low-cost tools exist – Wireshark for traffic stream processing – Spreadsheets for metric analysis • Basic charts & graphs are easy to generate
  • 15. Network Reliability Monitoring Can Be Incredibly Hard • Detailed analysis takes knowledge of ICS-protocols – Inner working – Quirks & idiosyncrasies • Root cause analysis is incredibly difficult – Device real-time architecture – Network performance issues – Lack the tools & techniques to investigate many issues • Automating the analysis process can be difficult – Building in process knowledge to algorithms
  • 16. So… What Can You See? Expected Frequency *Jitter is Variation From Expected Frequency ~10ms Mean Measured Packet Interval ±400µs Jitter*
  • 17. So… What Can You See? ~10.4ms Mean Measured Packet Interval ±400µs Jitter* Wider Distribution More Peaks in Histogram
  • 18. So… What Can You See? ~1ms Mean Measured Packet Interval ±10µs Jitter* Beat Patter @ ~30s
  • 19. So… What Can You See? ~2ms Mean Measured Packet Interval ±1ms Jitter* Beat Patter @ ~50s
  • 20. So… What Can You See? • OS & application operations – Garbage collection – Antivirus checks & updates – On-screen operator commands • Network anomalies – Network EMI interference – Signal degradation – Flaky connections • Security-related incidents
  • 21. Man-In-The-Middle Testing • Kali Linux VM – Ettercap – ARP Poisoning – All default settings (script-kiddy style) • Captured traffic off mirror port • PLC to I/O – EtherNet/IP™ – 10ms frequency • MITM against PLC
  • 22. MITM Testing – Source IP Address was I/O Block ~10ms Mean Measured Packet Interval ±400µs Jitter*
  • 23. MITM Testing – Source Address was PLC
  • 24. MITM Testing – Results • PLC and I/O block didn’t care – Both devices continued transmitting in the presence of MITM attack – Likely due to multicast EtherNet/IP protocol • When PLC traffic isolated from MITM, it showed no change in performance • Ettercap scripts to modify command signals generated – Increase sequence number – Modify output commands to I/O block • Checked captures without seeing red-flags – VirusTotal – NetworkMiner – Bro
  • 25. Summary • NSM is good – If you are doing it great – If not, maybe you should • NSM can’t detect everything, especially for ICS/SCADA networks • There are ways to measure network reliability in the lower layers – ICS/SCADA networks are particularly well suited to this
  • 26. Questions & Comments? • Jim Gilsinn • Senior Investigator, Kenexis • +1-614-323-2254 • Jim.Gilsinn@Kenexis.com • @JimGilsinn