This document discusses the need to develop cyber SCADA research to identify and address vulnerabilities in critical infrastructure systems that use SCADA (Supervisory Control and Data Acquisition) systems connected to the internet. It proposes utilizing Western Kentucky University's Cyber Defense Laboratory and classified cyber attack data warehouse to create an unclassified Cyber Attack Data Warehouse for SCADA attacks. This will support research to develop effective defenses against cyber threats to critical infrastructure SCADA systems.
1 of 1
Downloaded 24 times
More Related Content
Cdl Scada Poster V2
1. Cyber SCADA Research for the Nation's Critical InfrastructureCyber SCADA Research for the Nation's Critical Infrastructure
CHRISTOPHER KLAUS*, KEITH ANDREW, and MICHAEL VOGT
AbstractAbstract
SCADA systems used to control critical infrastructure systems have increasingly become part of our CyberInfrastructure by utilizing the Internet for SCADA communications. Unfortunately SCADA systems were not built
with cybersecurity in mind to defend against vulnerabilities inherent with Internet communications. There is a clear need to develop Cyber SCADA Research for the Nation's Critical Infrastructure in order to identify and
explore SCADA cyber attacks, correct existing vulnerabilities, and to help defend against these current and future attacks.
Western Kentucky University’s Cyber Defense Laboratory (CDL) presents this poster to discuss methods of utilizing advanced pattern recognition, classification, trend predictions and autonomic computing from other
challenging disciplines to research SCADA intrusion analysis and prevention.
While federal agencies have cyber defense data warehouses for classified data, currently no equivelent unclassified data warehouse is available to academic researchers. The immediately puts a bottle-neck in any attempt to
train cyber-security personnel and provide a defense against the rapidly growing cyber threats. The CDL has the largest non-government agency owned classified data warehouse for cyber attack data, called ARL NACMAST.
Our strategy leverages this existing infrastructure to create a Cyber Attack Unclassified Data Warehouse for SCADA cyber attacks. This will promote and support the rapid development of effective SCADA Cyber Security
research.
References
Plugfest, SCADA CYBER SECURITY WORKSHOP,
Nov. 3, 2010, http://www.nacmast.com/scada-workshop
AcknowledgementsAcknowledgements
We thank Electronic Warfare Associates and the United States Army Research Laboratory for extensive support and grant
funding this research. We also gratefully acknowledge the NACMAST crew and research scientists for supplying data and
technical support. Special thanks also goes to WKU’s Advanced Research & Technology Program for aid in administering this
grant.
KAS Meeting
Western Kentucky University
Bowling Green, KY
Nov. 12-13, 2010
Cyber Defense Laboratory, Western Kentucky University
Electronic Warfare Associates Government Systems Inc.
Department of Physics and Astronomy
Bowling Green, KY 42101
Applied Physics Institute
Argonne National Laboratory
Army Research Laboratory
Cyber Mapping, MTP
EDaptive Computing
Electronic Warfare Associates, GSI
George Mason University
Michigan State University
Mississippi State University
University of Arizona
University of Louisville
CDL Collaborators
Motors, Drives,
Actuators
Sensors and other
Input/Output Devices
Programmable Logic
Controllers (PLC)
Human Machine
Interface (HMI)
PC Based
Controllers
Ethernet
Remote Terminal
Unit (RTU)
SCADA
Laboratory
FirewallSCADA Laboratories at Western Kentucky
University, Southern Methodist University,
and University of Arizona are being
configured as environments to explore
SCADA cyber attacks. Each SCADA
Laboratory will focus on separate Critical
Infrastructure interests .
CDL Data Warehouse
Appropriate methods to capture network traffic
data of SCADA cyber attacks are being explored.
Initial testing of data capture is being performed
by WKU and SMU with results from the Plugfest
at the SCADA Cyber Security Workshop in
Dallas, TX. SMU is replicating these attacks,
which are captured and transferred to WKU’s
CDL Data Warehouse.
SCADA Laboratories
Leveraging knowledge from data capture with
the SCADA Laboratories, the Interrogator /
Seminole Architecture will be modified to
capture and analyze SCADA cyber attacks.
Biosphere 2
The Biosphere 2 is controlled by
SCADA systems, and is a good
representative of a city’s Critical
Infrastructure.
Interrogator Architecture
Computer Network Defense Analysts
(CNDAs) at the CDL and Electonic Warfare
Associates will review and document
SCADA Cyber Attacks, utilizing network
analysis tools within the Interrogator
Architecture. CNDAs’ network assessments
are based on NSA’s INFOSEC Assessment
and Evaluation Methodology
Red / blue teams have been created at each university comprised of
researchers, faculty, students, and certified ethical hackers. These
teams take turns at attacking and defending the SCADA
Laboratories.
In the future, it is intended that these teams take turns at attacking
and defending the Biosphere 2.
SCADA cyber attacks:
• Unauthorized Command Execution,
• SCADA Denial of Service,
• SCADA Man-in-the-Middle,
• Replay, and
• Malicious Service Commands.
Network traffic and CNDA documentation of
SCADA cyber attacks will be stored in the
CDL Data Warehouse.
Network sensors
will be place in
the Biosphere 2’s
infrastructure to
monitor network
traffic.
Common SCADA equipment is/was
utilized at the SCADA Laboratories
and the recent Plugfest.
The goal is to encourage industries
supporting critical infrastructures to
send their SCADA equipment to our
laboratories for testing.
Biosphere 2 would be utilized for
testing interactions between large
suites of SCADA equipment.
SCADA controls are utilized in all critical
infrastructures (electric, water, transportation,
etc.). These images are from systems that
have been compromised by ad hoc SCADA
attacks. Stuxnet is the first example of a
SCADA worm, which significantly increases
the vulnerabilities of these infrastructures.
SCADA cyber attacks are utilized
by our research team. The goal is
for the CDL Data Warehouse to
become available as a user
facility for other cyber security
researcher teams.
Research produces methods
for defending and hardening
SCADA equipment. Modules for better detection of
SCADA cyber attacks will be
developed for the Interrogator /
Seminole Architecture.
Interrogator is the Army
Research Laboratory’s (ARL)
current IDS architecture, which
is utilized for DoD facilities.
Seminole is a special ARL-
derived IDS architecture for use
with non-DoD participants.
Current research Planned research