Petri Net Model of Insider Attacks in SCADA System: September 2014
Petri Net Model of Insider Attacks in SCADA System: September 2014
Petri Net Model of Insider Attacks in SCADA System: September 2014
net/publication/286570733
CITATIONS READS
10 163
2 authors:
Some of the authors of this publication are also working on these related projects:
herbicide dose and weed density effects on crop:weed competition View project
All content following this page was uploaded by Payam Mahmoudi-Nasr on 27 May 2020.
Abstract—This paper investigates the use of Petri nets for total incidents reported in 2010 [4]. Ben Salem et al. [5] by
modeling insider attacks on the Supervisory Control and Data distinguishing between intruders and traitors as two cases of
Acquisition (SCADA) system. Insider attacks are one of the most insider attacker, have provided proposed solutions for insider
dangerous threats for Critical Infrastructures (CIs). An insider attack detection in the computer security research literature.
attacker, by sending legitimate control commands, can bring
Petri nets (PNs) are well-known tools for studying and
catastrophic damages to CIs at the national level. Therefore, it is
important to develop new model to study the sequence of the modeling attacks in vulnerable systems. A CPN based attack
operator actions in the CIs. Many CIs are monitored and model of malicious insider attacks is described in [6]. Chen et
controlled by SCADA systems. This paper proposes a new al. [7] have used Petri nets for modeling coordinated cyber-
modelling approach of operator behavior, for resolving alarms physical attacks on the smart grid. Henry et al. [8] have used
and insider attacks, in electric power SCADA. In order to study Petri net analysis to clear the potential for attacker control of
operator behavior, several attack scenarios have been studied to resources for quantifying the risk of computer network
evaluate offered model. The proposed model is based on Colored operations against SCADA systems. Bouchti et al. [9] have
Petri Nets (CPNs). presented a CPN based approach to model the cyber-attack for
SCADA systems. Petri net as a modelling technique for
Insider attack; SCADA; colored petri net
SCADA systems under cyber-attacks is presented in [10].
I. INTRODUCTION Baracaldo et al. [11] have used a formulation of CPN to identify
Supervisory Control and Data Acquisition (SCADA) systems when an insider attacker may infer unauthorized permissions.
Allen et al. [12] are proposed a solution to the anomaly
are used in many CI applications such as power, water, oil and
detection problem, based on resource-based Petri net model, for
gas distribution systems, transport monitoring (e.g., railway,
event-based systems that use shared resources to interact
airports), and production systems. SCADA reliability and its between processes.
security operations are important for national security and Based on our studies, although alarms are a main factor in
economic activity. In the past, SCADA systems relied on SCADA system, there is no alarm-driven model for insider
Proprietary networks and non-standard protocols to protect attacks in SCADA. In this paper, we aim to show that alarms
against attacks [1], whereas today SCADA architectures have can be used to model insider attacks on the SCADA system.
taken advantage of high speed networking that uses The main contribution of this paper is a new alarm based CPN
standardized open protocols such as Ethernet over TCP/IP. This model for electric power SCADA operations. Our CPN model
allows sharing of real-time data processing and remote access consist of operator behavior in two parts: (i) resolving alarms
capabilities for operations and services. These changes have (ii) operator attacks. To demonstrate proposed CPN model,
increased the vulnerabilities of SCADA. According to Rantala experimental scenarios for studying intensity of operator
[2], CI businesses have been affected by 13 million cybercrime attacks are offered.
incidents (nearly two-thirds of the total) in U.S.A., with The remaining of this paper is organized as follows. Section
suffering $288 million of financial loss and around 152,200 h II provides an overview of the SCADA system. Section III
of system downtime in 2005. proposes our Petri net models for SCADA insider attacks.
Section IV describes the validation of the models and simulation
One of the major threats of SCADA is when an insider
results. Section V gives the conclusion.
attacker sends legitimate control commands to create
catastrophic damages [3]. An insider attack is a malicious attack II. SCADA SYSTEM
on a computer system or network by an operator with
Modern industrial facilities such as power generation plants,
authorized access control. Insider attack can be deliberately or
potable water systems, wastewater treatment facilities, oil and
inadvertently. Operators or contractors, with extensive internal
gas production and transportation/distribution networks often
knowledge of the SCADA architecture and system policies/
involve components that are geographically distributed. To
procedures, can cause insider attacks. Also an intruder, with
continuously monitor and control the different sections of the
insider role, could use valid SCADA control application to
perform undesirable actions. According to the computer Crime
and Security Survey, insider attacks accounted for 33% of the
plant in order to ensure its appropriate operation leads to the use Historian
Events/
Alarms
SCADA systems. Server (Logs) RTU_1
Parameter Description
TABLE VIII
CONTROL PARAMETERS OF THE ATTACK SCENARIOS
Fig. 5. Petri network for Unresolved Alarms attacks. Cascade
Attack Type λ d m Probability
TABLE V misConfiguration 24 5% 5% 5%
PLACES FOR THE PN R EPRESENTATION OF UNRESOLVED ALARMS ATTACKS Unresolved 8760 80% 80% 5%
Combined 24 60% 60% 5%
Place Description
tokens in place P1 is the number of substation alarms in HMI
P7 d% of alarms- Delayed or no response server. We have counted them using the ‘write in file
P8 m% of remaining alarms- Incorrect or
Incomplete response
monitoring’ tool.
P9 Long alarm or intensive alarm A. misConfiguration Attack Scenario
TABLE VI In this scenario, misConfiguration attack is carried by the
TRANSITIONS FOR THE PN REPRESENTATION UNRESOLVED ALARMS ATTACKS attacker on average once a day. The values of parameters d and
m are assumed 5% as normal human mistake. In addition, since
Transient Description
the creation of a cascade alarm depends on many factors such
T10 Delay attack, holding alarm as the amount of power generation, power plant status, network
T11 Incorrect or Incomplete attack, holding alarm load and etc., and because this topic is beyond the scope of this
and send incorrect command to RTU paper, we assume a fixed low probability (5%) for it. Although
T12 Create a new cascade alarm
this amount could be higher in real terms. The number of alarms
at substation are measured and is shown in Fig. 7. It can be seen
at the same substation or other substations. Fig. 5 displays the that, although the number of alarms are increased but all of them
Petri net model developed for all four attack types. Table V and have been resolved.
Table VI describe all places and transitions that constitute the
Petri net model of Fig 5. B. Unresolved Alarms Attack Scenario
In addition, and in the worst case, the attacker for hide the In this scenario, the values of parameters d and m are
attacks, maybe resolve some alarms. In this situation, we can assumed 80%. Therefore, 80% of alarms would have no
simulate attacker behavior with two parameters: (i) d: is the response or delayed response, and 80% of remaining alarms
percent of attack types (1), (2) and (ii) m: is the percent of attack would have incorrect/incomplete response, and only 20% of
types (3) and (4) for remaining alarms, and so (100- m) is the their remaining alarms would be timely and correctly
percent for resolving remaining alarms. responded. MisConfiguration attack is carried by the attacker
on average once a year as normal human mistake. A fixed low
D. Modeling of Total System
probability is considered for cascading alarms (5%). The
Fig. 6 shows total system model by CPNTOOLS. Place P5 number of alarms at substation are measured and is shown in
has timed colorset with exponential distribution. Only T1, T2 Fig. 8.
are timed transitions and others are immediate transitions. Table
VII shows all three control parameters for total system. Poisson C. Combined Attack Scenario
distribution is used for the number misconfiguration attack. In this scenario, both attacks are carried by the operator. The
number of alarms at substation are measured and is shown in
IV. VALIDATION AND EXPRIMENTAL SCENARIOS Fig. 9. We see that, substation conditions is highly critical.
As a validation of our models, we present some attack V. CONCLUSIONS
scenarios. The control parameters λ, 𝑑, 𝑚 simulate attacker
behavior. By changing them, several types of operator attack This paper has proposed a new CPN modeling for SCADA
can be studied. The values of the control parameters are shown operator behavior in electric power grid. Three model for
in Table VIII. For all scenarios, the models are analyzed by resolving alarms, misconfiguration attack and unresolved
using simulation, state space, and monitoring tools in alarms attacks are presented. CPN is used to analyze insider
CPNTOOLS. We have also used ‘message sequence charts’ to threats that occur in the computer systems, used in CIs. Such
know about step-by-step transitions and places, in addition to threats take place when an attacker manages to gain valid user
credentials and performs actions to alter/disrupt a targeted
notifications, when transitions are executed. The number of
Fig. 6. Total System of CPN model.
1.2 3.5
Number of Unresoled
1
3
0.8
Alarms
2.5
0.6
2
0.4
1.5
0.2
0 1
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49
0.5
Events
0
73
17
25
33
41
49
57
65
81
89
97
1
9
161
105
113
121
129
137
145
153
169
177
Fig. 7. misConfiguration attack scenario.
Events
industrial process, or when a legitimate user makes an
operational mistake or delay and causes a process failure. Fig. 8. unresolved Alarms attack scenario.
In this paper, we have shown how an unresolved alarm could
create a new cascade alarm. Also we were able to study effects 10
Number of Unresolved Alarms
REFERENCES 6
5
[1] B. Miller, D. C. Rowe, “A Survey of SCADA and Critical Infrastructure 4
Incidents”, Proc. of the 1st Annual conf. on Research in information 3
technology, pp. 51-56, 2012. 2
[2] R. Rantala, “Cybercrime against businesses”, Technical report, U.S. Dept.
1
of Justice, Office of Justice Programs, Bureau of Justice Statistics, Special
0
Report, Sep. 2008.
15
22
29
36
43
50
57
64
71
78
85
92
99
1
8
106
113
120
127
134
141
148
155
162
169
176
183