Automatic Attack Graph Generation for Industrial Controlled Systems
- 300 Downloads
Abstract
Industrial Controlled Systems (ICSs) are prone to cyber-attacks exploiting weaknesses in their units. This chapter illustrates through an example of a pressurized water Nuclear Power Plant (NPP) control system how these vulnerabilities may be exploited by an attacker compromising the system. The control system is described by Architecture Analysis and Design Language (AADL), and then checked with a security property via JKind checker. The resulted Lustre file is later fed to an Attack Scenarios Generation and Filtration Tool (ASGFT). This tool automatically generates all possible attack scenarios resulting in overall plant disruption. The union of these attack scenarios is visualized by a Visualizer.exe, a Graphical User Interface (GUI) built employing C#.
Keywords
Nuclear power plant Attack scenario Assets Vulnerabilities ASGFTNotes
Acknowledgements
The authors would like to acknowledge Deanship of Graduation Studies and Scientific Research at the German Jordanian University for the Seed fund SATS 02/2018.
Supplementary material
References
- 1.Morris, T.H., Gao, W.: 1st International Symposium on ICS & SCADA Cyber Security Research 2013, pp. 22–29. Leicester, UK (2013)Google Scholar
- 2.Potter, W.C.: Less Well Known Cases of Nuclear Terrorism and Nuclear Diversion in Russia. (NIT). http://nti.org/analysis/articles/less-well-known-cases-nuclear-terrorism-and-nuclear-diversion-russia/. (Aug, 1997)
- 3.Maguire, K.: Guard tries to sabotage nuclear reactor. The Guardian. http://theguardian.com/uk/2001/jan/09/nuclear.world (Jan, 2001, Ed.)
- 4.Kesler, B.: The vulnerability of nuclear facilities to cyber attack. Strat. Insights 10(1), 15–25 (2011)Google Scholar
- 5.Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Surv. Global Politics Strategy, 53(1), 23–40. (28 Jan 2011). https://doi.org/10.1080/00396338.2011.555586
- 6.Arène, V.: Le réseau informatique d’Areva piraté. Le Monde Informatique. Retrieved from https://lemondeinformatique.fr/actualites/lire-le-reseau-informatique-d-areva-pirate-42092.html. (30 Sept 2011)
- 7.The 4 most iconic industrial cyberattacks. (Sentryo). https://www.sentryo.net/4-most-iconic-industrial-cyberattacks/. (28 Sept 2016)
- 8.Meeyoung, C., Park, J.-m.: South Korea blames North Korea for December hack on nuclear operator. Infosec Institute. http://resources.infosecinstitute.com/cyber-attacks-against-nuclear-plants-a-disconcerting-threat/#gref. (17 Mar 2015)
- 9.Nuclear Material Control Center data leak report says sensitive info unlikely affected. The Mainichi. Retrieved from https://mainichi.jp/english/articles/20160519/p2a/00m/0na/010000c. (19 May 2016)
- 10.Varuttamaseni, A., Bari, R.A., Youngbl, R.: Construction of a Cyber Attack Model for Nuclear Power Plants. 2017 ANS Annual Conference, pp. 1–10. San Francisco. https://bnl.gov/isd/documents/94595.pdf (2017)
- 11.Cimpanu, C.: Hackers steal research and user data from Japanese Nuclear Research Lab. Softpedia Niews. http://securitynewspaper.com/2016/10/18/hackers-steal-research-user-data-japanese-nuclear-research-lab/ (17 Oct 2016)
- 12.Perlroth, N.: Hackers are targeting nuclear facilities, Homeland Security Dept. and F.B.I. Say. The Newyork Times. https://nytimes.com/2017/07/06/technology/nuclear-plant-hack-report.html (6 July 2017)
- 13.Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, Graph-Based Network Vulnerability Analysis. 9th ACM Conference on Computer and Communications Security, pp. 217–224. ACM, Washington. https://doi.org/10.1145/586110.586140 (2002)
- 14.Ahn, W., Chung, M., Min, B.-G., Seo, J.: Development of cyber-attack scenarios for nuclear power plants using scenario graphs. Int. J. Distrib. Sens. Netw. 2015, 12 (2015). https://doi.org/10.1155/2015/836258CrossRefGoogle Scholar
- 15.Templeton, S.J., Levitt, K.N.: A requires/provides model for computer attacks. 2000 Workshop on New security Paradigms, pp. 31–38. ACM, Ballycotton, County Cork, Ireland. https://doi.org/10.1145/366173.366187 (2000)
- 16.Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. The 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 109–118. Washington. https://doi.org/10.1145/1029208.1029225 (2004)
- 17.Zhang, T., Hu, M.-Z., Li, D., Sun, L.: An effective method to generate attack graph. In: The Fourth International Conference on Machine Learning and Cybernetics, pp. 3926–3931. IEEE, Guangzhou. https://doi.org/10.1109/ICMLC.2005.1527624. (Aug, 2005)
- 18.Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: IEEE Symposium on Security and Privacy, pp. 273–284. IEEE, Oakland, California. https://doi.org/10.1109/SECPRI.2002.1004377 (May 2002)
- 19.Xinming, O., Boyer, W., McQueen, M.: A scalable approach to attack graph generation. In: The 13th ACM conference on Computer and communications security, pp. 336–345. ACM, Alexandria, Virginia, USA. https://doi.org/10.1145/1180405.1180446 (2006)
- 20.Rao, P., Sagonas, K., Swift, T., Warren, D.S., Freire, J.: XSB: A system for efficiently computing. In: International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR’97), pp. 2–17. Springer, Dagstuhl, Germany. https://doi.org/10.1007/3-540-63255-7_33 (1997)
- 21.Sheyner, O., Wing, J.: Tools for generating and analyzing attack graphs. In: International Symposium on Formal Methods for Components and Objects, pp. 344–371. Leiden, The Netherlands. https://doi.org/10.1007/978-3-540-30101-1_17 (2003)
- 22.Yi, S., Peng, Y., Xiong, Y. (eds.): Overview on attack graph generation and visualization technology. In: 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID), pp. 1–6. IEEE, Shanghai, China. https://doi.org/10.1109/ICASID.2013.6825274 (2013)
- 23.Amenaza.: Secur/Tree for Attack Tree analysis. (Amenaza Technologies). https://amenaza.com (2001). Accessed on 10 May 2018
- 24.Skybox.: Scybox Security. (Skybox Inc) Retrieved 2018 from https://skyboxsecurity.com (2002). Accessed on 10 May 2018
- 25.Lippmann, R.P., Ingols, K.W.: An Annotated Review of Past Papers on Attack Graphs. Massachusetts Inst of Tech Lexington Lincoln Lab (2015)Google Scholar
- 26.Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: DARPA Information Survivability Conference and Exposition II, 2001, pp. 307–321. IEEE, Anaheim, CA, USA (2001)Google Scholar
- 27.Institute for Security and Safety (ISS) in Cooperation with the Nuclear Threat Initiative (NTI).: Cyber Security at Nuclear Facilities: National Approache. Research Paper, Institute for Security and Safety (ISS) at the Brandenburg University of Applied Sciences. www.nti.org/media/pdfs/Cyber_Security_in_Nuclear_FINAL_UZNMggd.pdf?_=1466705014 (2015)
- 28.Sklyar, V.: Cyber security of safety-critical infrastructures: a case study for nuclear facilities. Inf. Secur. Int. J. 28(1), 98–107 (2012)Google Scholar
- 29.Stoutland, P.: Cyberattacks on Nuclear Power Plants: How Worried Should We Be?. Nuclear Threat Initiative. https://nti.org/analysis/atomic-pulse/cyberattacks-nuclear-power-plants-how-worried-should-we-be/ (Mar, 2018). Accessed on 16 May 2018
- 30.Angle, M.G., Madnick, S., Kirtley, J.L., Khan, S.: Identifying and anticipating cyber attacks that could cause physical damage to industrial control systems. IEEE Power Energy Technol. Syst. J. https://doi.org/10.1109/JPETS.2019.2923970 (June, 2019)
- 31.Carnegie-Mellon-University.: Open Source AADL Tool Environment for the SAE Architecture. http://osate.github.io/index.html (2018)
- 32.Gacek, A., Backes, J., Whalen, M., Wagner, L., Ghassabani, E.: The JKind model checker. Computer Aided Verification 2018. Oxford, UK. https://doi.org/10.1007/978-3-319-96142-2_3 (2018)
- 33.Microsoft.: Visual Studio. https://visualstudio.com/vs/ (2018). Accessed on 20 May 2018
- 34.Li, Y., Ma, J., Chan, A., Huang, Y., Wang, B.: Mechanism model of pressurizer in the pressurized water reactor nuclear. In: 2012 24th Chinese Control and Decision Conference (CCDC), pp. 178–182. IEEE, Taiyuan, China. https://doi.org/10.1109/CCDC.2012.6244026 (2012)
- 35.USNRC HRTD.: Westinghouse Technology Systems Manual. U.S. Nuclear Regulatory Commission. https://nrc.gov/docs/ML1122/ML11223A287.pdf. Accessed on 21 May 2018 (n.d.)
- 36.USNRC Technical Training Center.: Pressurized Water Reactor Systems. https://nrc.gov/reading-rm/basic-ref/students/for-educators/04.pdf. Accessed on 21 May 2018 (n.d.)
- 37.Green, S.J., Hetsroni, G.: PWR steam generators. Int. J. Multiph. Flow 21(null), 1–97, (1995). https://doi.org/10.1016/0301-9322(95)00016-q
- 38.Nuclear Power Plant Safety Systems.: Canadian Nuclear Safety Commission. https://cnsc-ccsn.gc.ca/eng/reactors/power-plants/nuclear-power-plant-safety-systems/ (2016). Accessed on 23 May 2018
- 39.Razak, T.A., Ibrahim Salim, M.: A study on IDS for preventing Denial of Service attack using outliers techniques. In: 2nd IEEE International Conference on Engineering and Technology (ICETECH), pp. 768–775. IEEE, Coimbatore, India. https://doi.org/10.1109/ICETECH.2016.7569352 (Mar 2016)
- 40.JKind, An infinite-state model checker for safety properties.: Loonwerks. Available http://loonwerks.com/tools/jkind.html (n.d.). Accessed on 11 Nov 2018
- 41.Halbwachs, N., Caspi, P., Raymond, P., Pilaud, D.: The synchronous data flow programming language LUSTRE. IEEE 79(9), 1305–1320 (Sept, 1991). https://doi.org/10.1109/5.97300
- 42.Uof-Minnesota, R.-C. a.: The Assume Guarantee Reasoning Environment. Pittsburgh, Pennsylvania, USA. http://standards.sae.org/as5506/ (2016). Accessed on 11 Jan 2018
- 43.HTML5 Web Development Support NetBeans: https://netbeans.org/features/html5/index.html. (2014). Accessed on 17 Feb 2018
- 44.Tulac.: Happy Birthday NetBeans. J, Interviewer. (17 May 2008)Google Scholar
- 45.Maven, Using NetBeans with Apache Maven.: NetBeans. http://wiki.netbeans.org/Maven (2014). Accessed on 10 Oct 2018
- 46.Böck, H.: The definitive guide to NetBeans™ Platform 7, Apress. Apress (2011). https://doi.org/10.1007/978-1-4302-4102-7CrossRefGoogle Scholar
- 47.David, M.: Visual Studio IDE Offers Many Advantages For Developers. (SearchSoftware Quality) from https://searchsoftwarequality.techtarget.com (9 Sept 2015). Accessed on 20 May 2018