0% found this document useful (0 votes)
29 views12 pages

DecIED CPSS2020

bcbfghgfh

Uploaded by

Karim Chehab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views12 pages

DecIED CPSS2020

bcbfghgfh

Uploaded by

Karim Chehab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

DecIED: Scalable 𝑘-Anonymous Deception for

IEC61850-Compliant Smart Grid Systems


Dianshi Yang Daisuke Mashima, Wei Lin Jianying Zhou
[email protected] {daisuke.m,lin.wei}@adsc- [email protected]
Singapore University of Technology create.edu.sg Singapore University of Technology
and Design Illinois at Singapore Pte Ltd and Design

ABSTRACT 1 INTRODUCTION
As demonstrated by the past real-world incidents, sophisticated In order to counter emerging cyber threats targeting our critical
attackers targeting our critical infrastructure may be hiding in the infrastructure, the existing cybersecurity solution, such as firewall,
system, perhaps at this moment, in order to collect information and data diode, centralized intrusion/anomaly detection systems would
prepare for massive attacks. If an attacker is mostly passive and not be fully effective. For instance, as demonstrated by the number
monitoring SCADA communication traffic or is clever enough to of real-world incidents in the past years, such as Ukraine power
act under the radar of intrusion/anomaly detection systems, it is plant attacks in 2015 and 2016 [66], persistent attackers were hiding
challenging to counter them. In this direction, deception technology in the smart grid infrastructure to collect information about systems
is an effective cybersecurity tool, by deploying a large number of for over 6 months. During such attack preparation (or reconnais-
dummy and decoy devices throughout the system infrastructure sance) stage, attackers are likely sending query/control commands
to be protected, for capturing probing attempts and lateral move- to collect intelligence about the infrastructure, flying under the
ment of persistent attackers and malware. In this paper, we discuss radar. Furthermore, during the reconnaissance stage, an attacker
the practical design and implementation of high-fidelity decep- could be completely passive and just overhearing communication
tion devices for smart power grid systems, named DecIED. DecIED in the control system infrastructure. Such activities may not be
imitates the device characteristics and communication models of effectively detected by intrusion detection systems [42, 50, 62], or
IEC 61850-compliant IEDs (intelligent electronic devices) and thus other security solutions such as industrial firewall.
realize 𝑘-anonymous smokescreen, which virtually shows 𝑘 − 1 When prevention and detection are bypassed, the potential next
indistinguishable decoy devices, to protect our critical infrastruc- line of defence is to prevent attackers from learning the system. In
ture. Based on our prototype implementation, a single industry PC order to make the reconnaissance difficult as well as to capture such
can host over 200 deception devices, which demonstrates DecIED’s activities, deception technologies are considered effective [26, 45].
scalability and feasibility of integration into the existing systems. At the high-level, deception technologies blend fake, but apparently
real, devices (often called decoy devices or deception devices) in
CCS CONCEPTS the system infrastructure. This way, an attacker, which may be
passively sniffing network traffic, could not tell which are the real
• Security and privacy → Intrusion/anomaly detection and
devices connected to the physical power grid system or what the
malware mitigation; • Computer systems organization → Em-
real system topology is like. The fake device also works as a sensor
bedded and cyber-physical systems; • Networks → Cyber-
(or tripwire), which raises an alarm when it is touched, detecting
physical networks; • Hardware → Smart grid.
attackers’ probing activity during the attack preparation phase.
While there are some commercial services or solutions of decep-
KEYWORDS tion technologies for enterprise IT systems, e.g., [9, 17], deception
smart grid; deception technologies; IEC 61850; cyber security technologies for industrial control systems, including smart grid
systems, are still immature and poses unique challenges. For exam-
ACM Reference Format:
ple, devices used in industrial control systems would have unique
Dianshi Yang, Daisuke Mashima, Wei Lin, and Jianying Zhou. 2020. De-
cIED: Scalable 𝑘-Anonymous Deception for IEC61850-Compliant Smart
device characteristics (e.g., OS fingerprints and services run on
Grid Systems. In Proceedings of the 6th ACM Cyber-Physical System Security devices). Even more challenging is the imitation of communication
Workshop(CPSS ’20), October 6, 2020, Taipei, Taiwan. ACM, New York, NY, patterns. The deception devices should use the same communi-
USA, 12 pages. https://doi.org/10.1145/3384941.3409592 cation protocols as the real one, and the communication models
and timings should be indistinguishable from the real devices. The
other challenge comes from its cyber-physical nature, where mes-
Permission to make digital or hard copies of all or part of this work for personal or sages transmitted in the cyber system should provide system-wide
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation consistency about the physical system. For instance, voltage and
on the first page. Copyrights for components of this work owned by others than ACM current measurements should be consistent with the physical laws
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, of power systems. Otherwise, sophisticated attackers with domain
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected]. knowledge may be able to identify real devices from decoying.
CPSS ’20, October 6, 2020, Taipei, Taiwan In this paper, we discuss the practical design of high-fidelity
© 2020 Association for Computing Machinery. deception devices for smart power grid systems, named DecIED or
ACM ISBN 978-1-4503-7608-2/20/10. . . $15.00
https://doi.org/10.1145/3384941.3409592 a deception IED (intelligent electronic device). DecIED imitates an
IED, which is an intelligent device that works as a communication major limitation is that it does not make sufficient consideration to
end-point in the cyber side while monitoring or controlling physical maintain cyber-physical system consistency. Another limitation is
power system devices in the modernized substation system. DecIED that it is relatively easy to get fingerprinted [16, 51].
is compliant with IEC 61850 standards [4, 7], the established inter- Many of the prior honeypot efforts in the smart grid area, which
national standard for substation automation communication, and is also our focus, including CryPLH [27] and SHaPe [37], only
thus can be easily integrated into the standard-compliant substation imitate the cyber side, and thus, not enough to deceive power-
network without requiring a major change or upgrade on existing system-aware attackers. Some other honeypot systems, such as [46,
devices or interfering with the functionality of existing (real) IEDs. 56], utilize power-flow simulation. However, the use of simulators
Among the variants of deception technologies, in this paper we fo- is impractical to imitate power grid system behaviour in real-time,
cus on the most basic, but fundamental, one, namely “smokescreen” high-fidelity manner, thus not suitable for implementing in-network
with 𝑘-anonymity concept [21], which offers 𝑘 − 1 fake devices deception technologies. We should note that, while honeypot is
that appear and behave like the real IEDs. DecIED takes advan- typically isolated from real systems, in-network deception devices
tage of process-level communication using IEC 61850 to imitate are blended in the real system infrastructure and thus the cyber-
the behaviour of a real IED in a real-time manner. When persistent physical view it presents must be more-tightly consistent with
attackers scan the system, they would find multiple devices that real systems. This is one of the reasons why we did not utilize
identically look and behave. Our particular focus in this paper is to simulators.
prevent attackers from pinpointing real IEDs to compromise and/or In a general IT context, [21] introduces a strategy composition
learning the real system topology. for resilient cyber deception called CONCEAL with an optimal
In order to demonstrate the practicality of the idea, we further composition of various concealment techniques to maximize the
present a proof-of-concept DecIED implementation that can imitate deception utility. This cyber deception framework is a composition
device/OS characteristics of real IEDs that are deployed in a state-of- of mutation, anonymity, and diversity to maximize key deception
the-art smart grid testbed [6] as well as communication models of objectives. The paper also illustrates desired properties for cyber
IEDs that implement control logic that is often found in real-world deception techniques, including scalability for large numbers of
substations. The comprehensive metric or methodology to evaluate hosts or services. CONCEAL framework composes 𝑚-mutation for
deception technologies is still an open problem to our knowledge. address anonymization, 𝑘-anonymity for fingerprint anonymiza-
However, because our goal is to implement 𝑘-anonymity, we eval- tion, and 𝑙-diversity for configuration diversification. 𝑚-mutation
uate the implementation in terms of resemblance and scalability. means the address of the host alters per 1/𝑚 seconds. 𝑘-anonymity
We show that, on commodity industrial PCs, we can run as many means that for a single host there are 𝑘-1 shadow hosts along with
as 200 deception device instances. We believe DecIED can serve the real host with similar or identical fingerprints. 𝑙-diversity means
as a crucial building block for advanced deception solutions such that for each kind of service there are 𝑙-1 fake services in the same
as moving target defence (e.g., [40]) as well as other deception kind with different versions or vendors along with the real one.
strategies discussed in [21]. In the smart grid context, address mutation is not often practical
The rest of the paper is organized as follows. In Section 2 we dis- to avoid major changes in the existing infrastructure. Moreover,
cuss state-of-the-art technologies in the relevant areas. In Section 3, 𝑙-diversity may not make enough sense given the limited number of
we provide an overview of devices that enable smart grid commu- services implemented. Thus, in this paper, we focus on 𝑘-anonymity
nication and control and also their communication models based to implement smokescreen.
on IEC 61850 standards. Section 4 defines our design goals and The comprehensive evaluation of deception technologies, in-
technical challenges to tackle with. We then discuss our approach cluding honeypot systems, is still an open question. As discussed
as well as DecIED proof-of-concept implementation in Section 5 in [22], the quantitative evaluation of realism of ICS honeypot sys-
and Section 6. We present the evaluation in Section 7. Finally, we tem is not feasible. Furthermore, we argue that realism alone does
conclude the paper with future research directions in Section 8. not capture the effectiveness of deception technologies because
deception against human attackers would be a mind game, and
therefore involvement human subjects would be a must. Such an
2 RELATED WORK approach for evaluating attack detection systems has been recently
There are a wide range of security solutions developed for security attempted [20], but it is not in general feasible. In addition, the out-
smart grid systems such as intrusion/attack detection systems [28, come would be still biased depending on the quality of participants.
57, 62], remote attestation [23, 29, 32], cryptographic solutions, such In this paper, we narrow down the scope only to 𝑘-anonymity
as IEC 62351 standard [5] and the reference [30], and cyber and and thus focus on the evaluation of indistinguishability in device
physical zoning, as summarized in [61]. The technology explored characteristics and communication patterns, as well as scalability.
in this paper is categorized under in-network deception, and is Moving target defence (MTD) technologies for perturbation of
considered orthogonal and complementary to the other categories. cyber and/or physical topology to confuse attackers are explored,
Honeypot is also considered as a deception technology, and for instance in [40, 41, 60]. These are effective in preventing attack-
there exist a number of open-source honeypot implementations for ers from obtaining accurate system information to launch successful
industrial control systems [10, 12, 53, 54]. Among them, Conpot [10] attacks, but it is not designed for capturing probing/reconnaissance
is an open-source, low-interaction honeypot designed for industrial activities attempted by persistent attackers that are hiding the in-
control systems (ICS) and is actively maintained. Conpot supports frastructure to prepare for a large-scale attack. Having that said,
several Internet and ICS-specific protocols such as Modbus. One
Firewall

implementing MTD on top of the deception devices is a promising


future research direction. HMI, workstation, or control center
Recently, deception technology for modernized substation sys- MMS Station bus
tems is proposed by Lin et al. [43]. Their proposed technology
utilizes software-defined networking and “seed devices”, which are
real power grid devices but, behind SDN (software-defined network-
ing), interact with attackers on behalf of virtual, decoy devices to PLC PLC IED1 IED2 IED3 IED4 IED5 IED N

present realistic device characteristics, etc. Their system requires


deep integration of software-defined networking, which requires
major upgrades in smart grid network architecture. Besides, their
GOOSE Process bus
design does not elaborate imitation of process-level communication SV
and interaction among IEDs, for instance by means of protocols like Merging unit
IEC 61850 GOOSE. In these aspects, our solution has advantages
over their scheme.
Figure 1: Topology of Substation System in Smart Grid

3 MODERNIZED SUBSTATION AND IEC 61850


In this section, we provide background about devices deployed in Figure 1 shows high-level view of the typical substation topology.
the smart power grid system, in particular modernized substations, The topology consists of multiple levels. SCADA/HMI (supervisory
as well as standard communication protocols used in the system. control and data acquisition/human-machine interface), substa-
tion gateway (or protocol translator) general-purpose workstations,
3.1 Intelligent Electronic Device (IED) servers, routers, firewalls, etc. are connected to “station bus” while
Smart grid is, at the high level, a power grid system enhanced merging units (e.g., meters and sensors) and physical power grid
with ICT (information and communication technologies). While devices are connected to “process bus”. IEDs are usually connected
smart grid is a large-scale, inter-connected, complicated system, to both buses while PLCs may or may not have a connection to the
substation is one of the most crucial components that is responsi- process bus.
ble for reliably delivering electricity from generator to consumers Roughly speaking, communication among ICS devices in the
through control of power grid topology as well as transformation station bus uses IEC 61850 MMS (Manufacturing Messaging Specifi-
of voltage at stages. By deploying intelligent devices, such PLCs cation) protocol while the communication in the process bus utilizes
(programmable logic controllers) and IEDs (intelligent electronic IEC 61850 GOOSE (Generic Object Oriented Substation Event) and
devices) in modernized substations and allowing real-time commu- SV (Sampled Values) protocols. As a reference, a communication
nication among them, smart grid aims at improving efficiency and model implemented in a state-of-the-art, IEC 61850-compliant sub-
effectiveness of power grid operation by means of telecontrol and station testbed is discussed in [59]. The SCADA/HMI on the station
automation [34, 47]. bus sends the remote control commands and interrogation com-
An IED works as a communication end-point in the cyber side of mands using IEC 61850 MMS. IEC 61850 standards basically define
the smart grid system and also interacts with physical power grid the information model for the interoperable communication among
components in the substation, such as circuit breakers, transform- multi-vendor ICS devices, and, to transport messages, the model
ers, and so forth, according to the received commands and messages. is mapped onto multiple protocols at different layers. The mod-
IEC 61850 [7] is becoming popular for such communication within els, as well as data, attributes that are processed on each IED is
a modernized substation. For the sake of timely control and moni- defined in an SCL (substation configuration language) files [44].
toring, communication among IEDs typically has stringent latency SCL files may further describe the functional structure and the
requirements [55]. Communication models of IEC 61850-compliant relation/connectivity among IEDs [4].
IEDs will be elaborated later in this section. The MMS protocol is unicast, client-server type communication
PLCs are also often found in substation systems, and they im- over TCP/IP. On the other hand, in the process bus, the GOOSE
plement logic for automated control based on power grid measure- protocol is utilized for announcing status updates among IEDs. SV
ments and status. Thus they can be seen as an advanced version of protocol is also utilized, typically by MUs (merging units), on the
IEDs. In this paper, we mainly focus on the design and implementa- process bus for sharing power grid measurements. Owing to the
tion of deception IED devices, while a similar design is applicable stringent latency requirements on these communications [35], the
for implementing deception PLC devices. publisher-subscriber model using link-layer multicast is employed.
GOOSE is a type of multicast messaging with user-defined values
in the dataset, such as the changes of state of substation parame-
3.2 IEC 61850 Communication Models ters, based on a publisher/subscriber model [52]. For multicast, the
International Electrotechnical Commission (IEC) defines the stan- GOOSE publisher will send its messages to all the devices in the
dardized communication methods and patterns among devices in same LAN in a fixed interval (e.g., in the order of seconds), and
the substation network in the standard IEC61850 [7], for the de- when any status update occurs, GOOSE messages are triggered
sign of the substation automation and control communication sys- immediately and re-transmitted with shorter interval, which then
tem [64]. gradually goes back to the default interval.
According to the specification [7], a GOOSE frame can be divided devices, is considered effective to counter attackers of both types.
into the following parts: the source and destination MAC addresses, Specifically, decoy devices would work as a “tripwire” or minefield
the application protocol data unit (APDU), etc. The APDU involves that raises an alarm when an attacker or malware steps on any
the GOOSE Control Block reference (gocbRef), the time allowed to of them. At the same time, decoy devices could generate dummy
live, the GOOSE ID (goID), the status number (stNum), the sequence network traffic to confuse passive attackers. For example, if we
number (sqNum), and so forth. The user-defined data in the last configure decoy devices so that they send out the same or similar
portion can be defined by the users with different types of data information as a real device, it will prevent attackers from telling
attributes in Boolean, integer, bitstring, etc. [39]. GOOSE Control which one is the real device connected to the physical system. While
Block, along with destination MAC address, is utilized by a recipient blended in the real system infrastructure, deception/decoy devices
IED to decide whether a received GOOSE frame is supposed to be should be isolated from real devices and their operation to avoid
processed by it or not. negative impact on security as well as the availability of them.
SV (Sampled Values) is a protocol for the transfer of digitized We assume that attackers/malware are in the control system
samples of analog measurements [38]. While SV also uses the same infrastructure but not yet equipped with sufficient system knowl-
communication model as GOOSE, the difference is that SV is sent at edge. Attackers in our scope may have footprints in the substation
the constant rate (e.g., 80 messages per cycle, which translates into network and compromise the HMI or engineering workstation at
4,000 messages per second in a 50Hz power grid system). The merg- the station level, e.g., via compromised VPN interface. While usu-
ing unit (MU) can distribute up-to-date power grid measurements ally the station bus and process bus are implemented as a separate
to IEDs by SV protocol. network, we don’t exclude the possibility that attackers have access
to the process-bus communication (i.e., IEC 61850 GOOSE and SV).
Under such an attacker model, we focus on design of IEC 61850
4 DECEPTION TECHNOLOGIES FOR SMART compliant deception IEDs, named DecIED, that imitates characteris-
GRID SECURITY tics and behavior of a real IED (also called a base IED hereafter) to
During the past years, we have witnessed a number of cyber- realize “𝑘-anonymity” concept. In other words, 𝑘 − 1 deception IED
originated attacks targeting smart grid systems. One of the ex- instances are run for each base IED in such a way that it is infeasible
amples is the cyberattack on Ukrainian power grid [58]. In the to identify which one is the real device. Reference [21] also dis-
incident in 2015, attackers successfully executed so-called ICS cy- cussed further concepts such as “𝑙-diversity” and “𝑚-mutation”, and
ber kill chain to penetrate into the smart grid control systems. our design can be extended to support them in a straightforward
Attackers were hiding and collecting system information for 6+ manner. Furthermore, by wisely coordinating status and measure-
months before the actual attack. Moreover, in the incident in 2016, ments messages reported by DecIED, we can mislead/lure attackers
the malware named CrashOverride [11] was utilized. This new to mount non-optimal attack or attacks that can be detected or
malware is the second-ever known case that can disrupt physical prevented by other security schemes, by incorporating the moving
systems after Stuxnet [18]. The notable advancement seen in this target defence [40]. Such extension is left for our future work.
malware was that the infected device can emit standard-compliant While deception technology has been explored for general IT
smart grid control/monitoring commands, impersonating a legit- systems, ones for industrial control systems or more specifically for
imate control center, and thus it can lead to mass power outages smart grid systems is still in the early stage. Below, we summarize
automatically. In addition, after the attack in 2015, the Ukrainian requirements for deception devices for smart grid systems that we
attack in 2016 was fully automated. The malware was programmed pursue in this paper.
to be able to link to the devices and control them with commands
(1) Imitation of device characteristics
by obscure protocols directly, which means that it can attack the
(2) Imitation of communication model and patterns
grid system more rapidly without the management of humans,
(3) Scalability and deployability
feedback from operators, or even without the connection to the
Internet as a logic bomb. Even more recently, there were a number For (1), all the DecIED instances in the system should have the
of incidents where hackers successfully penetrated into the power same features as the base IED, so that the attackers cannot distin-
grid systems [24, 33]. Such incidents demonstrated that attackers guish them. Features include network services (i.e., open ports),
hiding in our critical infrastructure is a realistic security threat. version or specification of network services running, and MAC
After an attacker successfully penetrates the smart grid system addresses that belong to the same vendor as the base IEDs’. In ad-
the plausible next step is reconnaissance and probing to collect dition, OS fingerprint that can be remotely obtained via attacker
information about the system in both cyber and physical sides. tools such as Nmap [15], should also be similar enough to avoid
During this phase, an attacker or malware may attempt to send ICS hinting attackers.
commands (e.g., interrogation and/or innocuous-looking control Requirement (2) includes support of smart grid communication
commands) to actively interact with the devices in the infrastruc- protocols (e.g., IEC 61850) and implement appropriate communica-
ture. Malware may attempt lateral movement from an infected tion patterns, such as ones discussed in Section 3. The communi-
IED to another for propagation. Another type of attacker may stay cation patterns will be further elaborated in Section 5.2. Another
completely passive to sniff ICS network traffic to derive system challenge here is that DecIED should provide sufficient imitation in
topology etc. terms of the payload of IEC 61850 messages it emits. Besides, it is as
Deception technology, which deploys a number of decoy (often important to be accessed by SCADA/HMI or other real devices as
also called deception) devices that are indistinguishable from real well as to behave in a similar way when handling received messages
in terms of both response content and timing. While it is crucial services discussed earlier are run behind Honeyd, and Honeyd can
to make DecIED behaves in the same way as the base IED, the “proxy” incoming requests to these servers. We admit that Honeyd
DecIED’s activities, including messages sent out, should not affect is not a complete solution to counter fingerprinting, but, given
the functionality of real IEDs, PLCs, and SCADA/HMI or overall that IEDs only works as a server (i.e., passive), it is still effective
system availability. This property is particularly important when to counter popular network scanners, like Nmap [48]. We should
DedIED inject fake/crafted information in our future extension. note that some smart grid devices, such as PLCs, sometimes work
Lastly, in order to make deception effective, we should be able as a client (i.e, actively initiating TCP connection). Since outgoing
to run a sufficiently large number of DecIED instances with a rea- traffic is not mediated by Honeyd, more radical solution will be
sonable introductory and management cost. Moreover, deception needed for spoofing device fingerprints, which is part of our future
technology can be integrated into existing infrastructure without work. We don’t claim novelty regarding the use of Honeyd, and it
requiring major changes or updates, which leads to (3). Regarding is utilized for the sake of practical proof of concept.
scalability, we aim at running over 200 DecIED instances on a sin-
gle, commodity industrial PC. Based on “𝑘-anonymity” concept, 5.2 Imitation of Communication Models and
if there are 20 base IEDs in a substation, which is equivalent to a
reference substation model discussed in [25], we can implement
Patterns
10-anonymity or higher. In other words, an attacker would see Our goal in this paper is to design DecIED that behaves in the same
10 IEDs that look and behave in the same manner. Moreover, in way as a base IED. Taking the communication models discussed in
the case of EPIC testbed [6], there are roughly 10 IEDs, and thus Section 3, this can be divided into the following requirements in
deploying 200 DecIED instances allows us to offer 20-anonymity. terms of communication models.
• Responds to IEC 61850 MMS interrogation commands from
5 APPROACH AND DESIGN OVERVIEW SCADA/HMI and substation gateway in the same way as
In this section, we elaborate on our approach to addressing the the base IED
design goals discussed in the previous section to lead the system • Responds to IEC 61850 MMS control commands from SCADA/HMI
design. and substation gateway in the same way as the base IED
• Sends IEC 61850 GOOSE message with the same (or similar)
5.1 Imitation of Device Characteristics status/measurements and the same periodicity as the base
We started with studying network and OS characteristics of real IED, when there is not a status update.
IEDs. In particular, we investigated Siemens IEDs deployed in • Sends IEC 61850 GOOSE message triggered by status changes
publicly-accessible smart power grid testbed hosted by Singapore on the base IED.
University of Technology and Design, called EPIC [6, 59], to use • Acts on the received GOOSE message in the same way as
them as the base IEDs. By using Nmap [15] and Wireshark [19], we the base IED.
conducted a comprehensive scan to identify the following informa- • Messages sent by DecIED should not cause any influence on
tion: real devices in the system
• MAC address In order to meet these requirements, it is imperative for DecIED and
• Network services (Open TCP/UDP ports and version/header the base IED to share a synchronized, consistent physical system
information of each service) view. One possible solution is to run a back-end power flow simula-
• OS fingerprinting results tor and connect all DecIED to it, as attempted in [46]. However, it
Faking MAC address is relatively straightforward and can be is in practice not feasible to keep the simulation model completely
done by changing network interface configuration. Thus, we as- up-to-date to maintain synchronization and consistency with base
sign MAC addresses that belong to the same vendor. Regarding IEDs. Another drawback is latency and resource consumption to
network services provided by the Siemens IED, we found that IEDs run power flow simulation. As discussed in [49], running power
in EPIC testbed opens only port 80 and 102, which corresponds system dynamics simulation would require non-negligible latency.
to HTTP (for offering web-based administrator interface) and IEC Another solution is to rely on multicast, process-bus communi-
61850 MMS respectively. We use Ngnix web server, which is widely cation using IEC 61850 GOOSE and SV. As discussed in Section 3,
used for an embedded platform, with customized HTTP headers IEDs rely on IEC 61850 SV communication on the process bus for
to implement the former and virtual IED module based on open- acquiring real-time power grid measurements. GOOSE messages
source libIEC61850 [8], which will be elaborated later in this paper, are utilized for announcing any types of status updates on IEDs.
for the latter. As long as DecIED are deployed in the same network (more specif-
Countering OS fingerprinting is not trivial. Because many of ically, in the same broadcast domain), DecIED can hear the same
the fingerprinting techniques/tools investigate the distinction of messages at the same time as the base IED, and thus can have the
protocol stack implementation of each device or OS. Thus, the information and system visibility synchronized with the base IED.
ideal solution would require kernel-level modification. Since it is By hearing and processing the process-bus communication, DecIED
not feasible in practice, in this paper we employ an open-source can acquire the same information as the base IED nearly at the same
tool called Honeyd [54] for our proof-of-concept. Honeyd has a time, which allows DecIED to reply the same information as the
feature to spoof OS fingerprints, by configuring the instance with base IED when it gets interrogation commands. The same applies
fingerprint collected from the device of interest. Both network to the GOOSE message reporting measurements and status.
Firewall
IEDs may execute some control logic or status update based
on the received GOOSE and SV messages. For instance, based on HMI, workstation, or control center
the current measurements conveyed in SV messages, IEDs would
trigger some circuit breaker control to protect the power grid and MMS Station bus
then announce status updates using GOOSE. In order to imitate
behavior of the base IED when it acts on received GOOSE and SV
Industrial PC
messages, the simplest solution would be to just sniff messages
Base IED
outgoing from the base IED and replicate them while updating DecIED DecIED DecIED
DecIED’s status accordingly. Although it is easy to implement,
there is a major drawback. Namely, because in such a design the
Process bus
base IED always acts first, attackers could easily learn which one
GOOSE
is the real device by overhearing the traffic for a certain duration. SV
Another approach is to implement a processing logic implemented Merging unit
on the base IED. Given that process-bus communication is heard by
the base IED and DecIED nearly at the same time, both can work
on it simultaneously and thus timing would not give attackers Figure 2: The topology of the network with DecIED
any meaningful clue to identify real devices. Fortunately, we have
access to a power grid testbed, where there are overviews in [6, 59], 5.4 DecIED Prototype Module Architecture
and studied the real IEDs deployed there. Based on our study, the
logic implemented on IEDs is relatively simple and described in
block logic diagrams, so replication of the logic is still doable as LAN IP address
long as the design documentation is available. In this work, we Virtual interface for MAC address

implement some representative logic that is often found in real-


world substations, which will be discussed in our proof-of-concept
implementation shown in Section 6. This way, without having
extra coordination among the base IED and DecIED, it is possible
to imitate the communication models and patterns.
The remaining challenge is to prevent messages sent by DecIED
from affecting real devices. This can be addressed by utilizing IEC Web server Honeyd
61850 GOOSE specification. Specifically, an IEC 61850 compliant localhost:80
IED is supposed to check GOOSE Control Block, which consists of
multicast MAC address, AppID, etc., to see whether the correspond-
ing message should be processed by it or not. Using this protocol
specification, by assigning AppIDs that are NOT used in real sys-
tems or devices to the GOOSE messages sent by DecIED, we can
make the DecIED’s messages ignored (and silently discarded) by
real devices. To avoid AppID from being a hint for attackers to IED server IED logic
identify real IEDs, we recommend to assign unique AppIDs for all
IEDs (regardless of whether real or deception devices). Although
we focused on AppID, other parameters used for filtering (e.g., mul-
ticast MAC address) can be used instead, when configuration of
AppID is not feasible owing to the system configuration. GOOSE subscriber GOOSE publisher SV subscriber

5.3 Scalability and Deployability Figure 3: Module Architecture of DecIED


To facilitate the integration of the deception technology into the Figure 3 shows the architecture of the DecIED implementation.
existing infrastructure, we design the solution on a single security As seen in the figure, each DecIED consists of Honeyd with unique
appliance box (e.g., an industrial PC) that is connected to switches at IP and MAC addresses and a virtual IED module. Honeyd proxies
both station bus and process bus. Generating virtual network inter- incoming TCP requests for port 80 and 102 to backend Nginx web
faces on the PC, each DecIED instance can act with a unique MAC server and virtual IED module, which implements IED 61850 MMS
address. While the use of virtual machines for each DecIED instance server, respectively.
would be an alternative option, it would not scale to support a large The virtual IED module consists of the following components:
number of DecIED instances. The deployment is summarized in the GOOSE publisher/subscriber, SV subscriber, IED server, and IED
Figure 2. In addition, according to our design approach discussed in logic. The GOOSE publisher and subscriber are to multicast GOOSE
earlier subsections, DecIED will not require computationally heavy messages about DecIED’s states and receive GOOSE messages from
processing such as power system dynamics simulation, which is the real IEDs for learning the latest IED status. The SV subscriber
also expected to contribute to enhanceing scalability. aims to receive the real-time measurement values in current and
voltage from merging units. The IED logic implements control
logic based on power grid measurements as well as other IEDs’
status change that is implemented on the base IED to imitate. This
may include protection mechanisms, which will be elaborated in
Section 6.1.

5.5 Discussion
Besides the AppID tweak discussed above, in order to make the
DecIED’s communication model indistinguishable from the base
IED’s, we also need to make SCADA/HMI or substation gateway to
interact with DecIED instances just like the base IED. For instance,
when a SCADA/HMI queries status from the base IED, the same
interrogation request should be sent to DecIED instances too. One
solution for this issue is that we register DecIED instances on the Figure 4: Cyber and Physical Topology in Substation
SCADA/HMI along with the base IED so that all are interrogated
equally. In this case, we also need to prevent the SCADA/HMI C language so that existing logic codes on a base IED can be feasibly
system (or human operator) from getting confused. A trivial so- ported into DecIED, and thus our design and implementation are
lution would be to configure the list of DecIED instances on the extensible.
SCADA/HMI to be excluded. Unfortunately, this is not an ideal Figure 4 shows system topology around one of the buses in
solution for a couple of reasons: first, we need to make changes on a substation, which is drawn based on a setup discussed in [25].
the SCADA/HMI, and secondly, once an attacker compromises the As can be seen, IEDs are connected to a circuit breaker, or CB,
SCADA/HMI, deception is no longer effective (i.e., SCADA/HMI (a rectangle on each power transmission line) and MUs are also
must be fully secure). connected to the transmission lines to collect measurements. Both
Although the generic solution that works for any kinds of de- IEDs are MUs are connected to a switch on process bus of the
ception technologies may not be trivial, our 𝑘-anonymous DecIED substation. The breaker is closed when there is no fault and is
design inherently avoids this problem. Recall that all DecIED in- opened to cut down the power flow on a transmission line when
stances and the base IED share the power grid measurements (via SV an overcurrent situation is detected to protect the line as well
messages) and status (via GOOSE messages). Thus, measurements as connected equipment. Besides, IEDs also implement a backup
and status reported by all are essentially the same (i.e., reporting protection mechanism that can be triggered when a certain circuit
the same values for the same power grid component). Thus, from breaker associated with another IED in the substation fails to trip.
the SCADA perspective, they are treated as redundant, repeated Some popular protection mechanisms, namely busbar protec-
messages. Therefore, even when DecIED instances are equally reg- tion and breaker failure protection are discussed in [25] along with
istered on SCADA/HMI and historian database, the SCADA/HMI hypothetical but realistic substation topology. Below, we summa-
or human operators will not be confused. This way, we can hide rize how these work according to the setting shown in Figure 4 so
any traits of deception devices in the communication patterns as that we can implement them on our proof-of-concept virtual IED
well as configuration of the SCADA/HMI, and therefore, even if implementation.
SCADA/HMI is compromised, an attacker cannot break the decep- Busbar protection: This protection aims at preventing fault sit-
tion technology. uation on a bus in a substation. The measurement of current is
based on the messages by SV protocol. If the SV messages indicate
anomalous current values, 𝐼𝐸𝐷 0 quickly realises the fault and trig-
6 PROOF-OF-CONCEPT VIRTUAL IED
gers a trip of its own circuit breaker as well as sends notification
Among the components illustrated in Figure 3, the virtual IED mod- for other relevant IEDs (i.e., 𝐼𝐸𝐷 1 and 𝐼𝐸𝐷 2 in Figure 4) to trip by
ule plays an essential role in attaining indistinguishability from using GOOSE communication.
real IEDs. Thus, in this section, we elaborate on the design details Breaker failure protection: There may be a situation that the
of it with hypothetical but representative control mechanisms im- overcurrent occurs but the breaker does not trip because of me-
plemented on real-world IEDs to demonstrate the feasibility of chanical failure or any other reasons. When one IED (e.g., 𝐼 𝐸𝐷 0 )
implementation. picks up occurrence of overcurrent and attempts to open its own
circuit breaker, but then it detects a failure preventing the CB from
6.1 Control Logic Implemented on IED opening. Once such an event occurs, the corresponding IED to send
In this section, we discuss automated control mechanisms that are out a GOOSE message for nearby IEDs (i.e., 𝐼𝐸𝐷 1 and 𝐼 𝐸𝐷 2 ) to let
typically implemented on IEDs. In practice, IEDs listens to IEC 61850 them know the situation, which will then trigger those IEDs to trip
GOOSE messages sent by peer IEDs and SV messages sent by MUs their CBs.
(merging units) and execute control logic for automated control. We should emphasize that the logic implemented on our pro-
Among such mechanisms, we focus on protection mechanisms totype can be implemented on multiple (real) IEDs. For instance,
because of popularity and importance. While we demonstrate only a breaker failure protection logic is implemented on all IEDs that con-
small number of logics, we note that, by using a tool like Matiec [13], trol circuit breakers. Thus, our prototype can be readily customized
we can convert logic written according to IEC 61131-3 standard into for providing deception for the real IEDs of this sort.
6.2 Virtual IED Implementation Details the external equipment health of the breaker (“XCBR.EEHealth.stVal”
The MMS server, GOOSE publisher, and GOOSE/SV subscriber and “PTRC.EEHealth.stVal”) by changing the value from 1 (normal
modules utilize the libIEC61850 open-source C library [8]. These state) to 3 (alarm).
modules utilize an SCL file, which is prepared based on the config-
uration discussed in [25], to generate data models used for parsing
as well as constructing IEC 61850 messages. The virtual IED is 7 EVALUATION
running with four threads: GOOSE Publisher, GOOSE Subscriber, This section evaluates the DecIED prototype based on the design
SV Subscriber, and IED logic. In addition, there is a buffer to record goals in Section 4.
real-time values from incoming GOOSE and SV messages. For the
data attributes in measurement, due to the values of current and
voltage are in sinusoidal function, the coming data values in SV
7.1 Similarity in Device Characteristics
messages are recorded in a certain interval (e.g., duration corre-
sponding to 1 cycle), and the effective values are calculated by all In order to evaluate the similarity in device characteristics on the
the SV values in the period. The initial values are defined according cyber side, we utilized a popular network scanning tool, Nmap [15].
to the normal status of the real device. The scanning method used was to probe all the TCP and UDP ports.
Then the discrepancies of the OS fingerprints of the DecIED and a
Table 1: The data attributes of GOOSE messages defined by real IED in EPIC testbed [6, 59] (i.e., base IED) are compared.
the SCL file of IED. (FC: function constraint [65], i32: 32bits Some earlier approaches for implementing deception technolo-
integer. The values shown are for the normal state.) gies for industrial control systems, such as [22, 46], utilized Mininet [14]
to implement virtual devices. Thus, we also obtained OS finger-
Dataset NAME FC TYPE VALUE
prints of the Mininet-based implementation that are used in the
PTRC.EEHealth.stVal ST i32 1
XCBR.Loc.stVal ST bool false literature [46]. DecIED as well as Mininet-based implementation
IED-CTRL/Status (called Mininet IED hereafter) are set up on a separate virtual ma-
XCBR.Pos.stVal ST i32 1
XSWI.Pos.stVal ST i32 1 chine running Ubuntu Linux OS.
LPHD.PwrSupAlm.stVal ST bool false Regarding the open ports, since we configured DecIED based on
PIOC.Op.general ST bool false a Siemens IED used in the EPIC testbed, no difference was seen, and
IED-PROT/Alarm PSCH.ProRx.stVal ST bool false both opens port 80 and 102. Besides, since we customized HTTP
PSCH.ProTx.stVal ST bool false headers on the web server in DecIED according to the base IED, no
XCBR.EEHealth.stVal ST i32 1 difference was observed.
Table 2 shows Nmap’s OS fingerprinting results of a DecIED, the
Table 1 shows the GOOSE data attributes defined by the SCL base IED, and Mininet IED. As can be seen, compared to Mininet IED,
file generated based on [25]. We have another data set to announce DecIED presents significantly better similarity. Moreover, while
measurements (IED-MEAS/Meas), but it is omitted for the interest Mininet IED was fingerprinted as “Linux 3.2-4.9”, the DecIED and
of space. In sum, there are three groups of data attributes, including the base IED returned “No exact OS matches”. Since virtual nodes on
status (control), alarm (protection), and measurement, which are Mininet are essentially copy of the host OS, and thus OS fingerprint
sent in separate GOOSE messages. The detailed explanations of revealed the information of the host OS (i.e., Ubuntu Linux).
the data attributes are introduced in IEC61850-7-2 [1], 7-3 [3], and For both DecID and Mininet IED, differences from the base IED
7-4 [2]. are highlighted in the table, and we immediately see the limitation
For the protection mechanisms on IEDs introduced in Section 6.1, of Mininet IED. There are some differences seen in the SEQ lines in
here let us elaborate on the implementation of busbar protection DecIED fingerprint. Among these, SP and ISR fluctuate ±2 based
mechanism. The virtual IED program firstly gets the real-time SV on our repeated experiments. Therefore, from the results it can be
values about the current via SV Subscriber module. If the real-time concluded that the differences between these two values do not
effective value is larger than the pre-configured threshold, it is affect the fingerprint resistance of the system. Regarding the other
treated as an overcurrent situation. Then, virtual IED “pretends” to differences, namely SS and IPL, according to Nmap documenta-
open circuit breaker, and updates the data attribute about the circuit tion [15], the former indicates whether TCP and ICMP shares IP
breaker status. The data attribute “XCBR.Pos.stVal” is associated ID sequence or not and the latter is based on the total length of an
with the position of the breaker, which is updated to 0 (open), and IP packet used for a port unreachable ICMP message when UDP
“PIOC.Op.general” is used for the status of instantaneous overcur- packet is sent to a closed port. Other smart grid devices, such as
rent, which is updated to true to alarm the status. These updates WAGO PLC used in EPIC testbed [59], returned IPL=164, which is
will be handled by GOOSE Publisher for the announcement to other the same as DecIED. Thus, without knowing the exact characteris-
IEDs. The implementation results of the protection scenarios will tics of the specific IED model used in the system, it is not feasible for
be introduced in Section 7.2. an attacker to tell differences between real and fake devices. More-
Regarding the circuit breaker failure protection case, IED Logic over, collection of IPL requires active fingerprinting, repetition of
module checks the position of the circuit breaker. If the circuit which can be caught by other security measures, such as intrusion
breaker remains closed, a breaker failure protection is triggered to detection systems. Having that said, we can radically address these
give the alarm. The virtual IED sends out the breaker failure mes- differences by modifying socket implementation, which will be left
sage to the other IEDs, and updates the related data attributes about for our future work.
Figure 5: IEC 61850 GOOSE communication pattern of DecIED (50 instances) under circuit breaker failure situation

Table 2: Fingerprinting results of DecIED, Base IED, and traffic when there is no event or status change. For each period, De-
Mininet IED cIED sends out 3 GOOSE messages corresponding to the 3 datasets
discussed in Table 1. Measurement values are calculated by SV
IED system
DecIED
Fingerprint
SEQ( SP=C5 %GCD=1% ISR=D5 %TI=I%CI=I%II=I% SS=O %TS=U)
traffic generated by an emulated MU.
ECN(R=N) Let us next see the behavior of DecIED under a disturbance
T1(R=Y%DF=N%T=72%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N) scenario, namely circuit breaker failure case. In order to emulate
T3(R=N)
T4(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) an overcurrent situation, we configured MU to send out SV mes-
T5(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
sages conveying overcurrent measurement, and also run two sets
T7(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=) of DecIED instances, corresponding to 𝐼𝐸𝐷 0 and 𝐼𝐸𝐷 1 . As seen in
U1(R=Y%DF=N%T=72% IPL=164 %UN=0%RIPL=G%RID=G%RIPCK=G%
RUCK=6339%RUD=I)
Figure 5, after overcurrent is picked up, DecIED instances imitating
Base IED
IE(R=Y%DFI=N%T=72%CD=Z)
SEQ(SP=CD%GCD=1%ISR=D6%TI=I%CI=I%II=I%TS=U)
𝐼𝐸𝐷 0 start sending GOOSE messages to report circuit breaker fail-
ECN(R=N) ure (around time 9.7s). The figure is showing the network trace as
T1(R=Y%DF=N%T=72%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N) well as the number of GOOSE messages for each 0.001s time slot.
T3(R=N)
T4(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) As can be seen, DecIED instances are sending GOOSE messages in
T5(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) a random order. The time duration from the first to the last DecIED
T7(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
U1(R=Y%DF=N%T=72%IPL=240%UN=0%RIPL=G%RID=G%RIPCK=G%
on average was 0.067s in the case of 50 instances. When we run
RUCK=6339%RUD=I)
IE(R=Y%DFI=N%T=72%CD=Z)
200 instances, the duration becomes 0.51s on average. This may
Mininet IED SEQ( SP=106 %GCD=1% ISR=10E%TI=Z %CI=I%II=I% TS=8 ) be caused by the limitation in the number of concurrent processes
OPS(O1=M5B4ST11NW9%O2=M5B4ST11NW9%O3=M5B4NNT11NW9% as well as the single NIC (network interface controller). However,
O4=M5B4ST11NW9%O5=M5B4ST11NW9%O6=M5B4ST11) the IED’s operation typically involves interaction with physical
WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120) systems, and actuation latency will be involved. For instance, to
ECN(R=Y%DF=Y%T=40%W=7210%O=M5B4NNSNW9%CC=Y%Q=) open/close circuit breaker, based on our observation in the testbed,
T1(R=Y% DF=Y%T=40 %S=O%A=S+%F=AS%RD=0%Q=) it takes in the order of second, which outweighs the aforementioned
T2(R=N)
T3(R=N) timing difference.
T4(R=Y% DF=Y%T=40 %W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
Because we were not able to conduct experiments emulating
T5(R=Y% DF=Y%T=40 %W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
the breaker failure scenario on EPIC testbed, we cannot compare
T6(R=Y% DF=Y%T=40 %W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
T7(R=Y% DF=Y%T=40 %W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
DecIED with the real IED deployed there. However, one measure-
U1(R=Y% DF=N%T=40%IPL=164 %UN=0%RIPL=G%RID=G%RIPCK=G% ment in a similar setting was found in [63], which showed that
RUCK=G%RUD=G ) the latency of between the receipt of alarm and announcement of
IE(R=Y%DFI=N% T=40%CD=S ) circuit breaker status update measured on a real, commercial IED
was 783.385ms on average with standard deviation 125.277ms. By
configuring artificial delay on DecIED, we can overlap this duration
7.2 Indistinguishability in Communication with the real IED to make them indistinguishable. As future work,
Models we plan to conduct rigorous evaluations in terms of similarity in
In this section we present the network traffic generated by our communication patterns and behaviors, once we establish our own
DecIED prototype as a preliminary evaluation. According to the testbed for measurements.
specification (see also Section 3), DecIED generates periodic GOOSE
7.3 Scalability (and sequentially to fly under the radar), the success probability for
In order to evaluate the scalability of DecIED, we conducted ex- him is 𝑘1 . In other words, the probability that the first attempt is
periments to run a different number of DecIED instances on an flagged by our deception appliance is 1 − 𝑘1 , which is translated, in
industrial with varying resource configuration. Our evaluation here the case of 20-anonymity setup, to 95%.
is based on whether DecIED instances can generate the expected It might be argued that a committed attacker would send the
number of periodic GOOSE messages (e.g., 3 GOOSE messages for same malicious commands (in particular, control commands) to all
each interval per instance). If the number of observed GOOSE mes- of them, including a base IED and DecIED instances. If all com-
sages is significantly below the expected number, we conclude that mands are sent out at the same time, the malicious control command
the number of DecIED instances exceeds the capacity. would be executed before being reported by DecIED. However, such
We have conducted a series of experiments with different num- a traffic pattern (i.e., simultaneously sending the same commands to
bers of DecIED instances for 6 minutes with various periodic GOOSE multiple DecIED instances) can be detected or blocked by intrusion
messaging interval (5, 3, and 1 second(s)). 5-second interval is the detection/prevention systems. If the commands are sent sequen-
default interval used in libIEC61850 [8] while 3-second interval is tially, DecIED still can report the incident before the base IED is
found in EPIC testbed [6]. All the GOOSE messages are captured by affected by the attacker’s command as discussed earlier, by work-
Wireshark, and the numbers of messages observed in each second ing with, for instance, intrusion prevention systems. We note that
are recorded. We ran all experiments on 3 industrial PCs: “high”- DecIED is not intended to be a standalone, self-contained security
end one with Intel Core i7-7700 and 32GB RAM, “middle”-end one solution. The primary purpose of DecIED is enhancing capability
with Intel Core i7-3610QE with 16GB RAM, and “low”-end one with to capture activities by attackers in pre-attack phase, and, DecIED
Intel Celeron J1900 with 4GB RAM. The results are summarized can increase the probability of detection.
in Figure 6. In the figure, solid and dashed lines represent ethe As discussed in Section 5, by overhearing broadcast process-bus
xpected number of GOOSE messages per second, and in order to communication (IEC 61850 GOOSE and SV), DecIED shares power
judge the scalability, we evaluated whether DecIED instances are grid status and measurements with the real IED, and thus, DecIED
catching up with this expected rate. For instance, in the case of can generate the traffic like the real IED in both station bus (IEC
1-second interval, high-end and middle-end ones can support up 61850 MMS) and process bus (IEC 61850 GOOSE). Given that our
to 200 instances while with 5-second interval, they support up to attacker model does not exclude attackers who can access to the
500 instances and even the low-end one can support 200 instances. process-bus network, let us discuss the case where attackers may
The max number of instances supported for each setting as well as inject maliciously-crafted messages there. Even when an attacker
resource consumption are summarized in Table 3. at process bus would inject fake GOOSE or SV messages, because
Combined with the observation in Section 7.2, we claim that at DecIED is designed to process the message according to the same
least 200 DecIED instances can be run on a single industrial PC logic as the real IED, the impact of such messages is the same on
without losing indistinguishability in the communication models, both, which thus makes them indistinguishable. Note that detection
which meets our design goal. or prevention of malicious message injection itself is not the goal
of the deception technology. It is possible to implement some sort
Table 3: Summary of Scalability Evaluation of bad data detection mechanism on the DecIED appliance, and it
Time In- PC Grade Number of CPU Usage Memory Usage is part of our future work.
terval(s) DecIEDs Regarding the countermeasures against device/OS fingerprinting,
"high" 200 61% 0.3226% there are other types of techniques, such as ones based on latency
1 "medium" 200 99.1% 1.3548% between a certain request and response [31] and clock skew [36].
"low" 50 99.4% 2.7027% We admit that Honeyd is not the universal solution to counter them.
"high" 450 66% 1.5974% For instance, to counter latency-based fingerprinting, we need to
3 "medium" 350 99.4% 2.3226% carefully measure and model the latency of the real device, and the
"low" 50 99.8% 3.2432% countermeasure for the latter may require radical implementation
"high" 500 70% 1.631% change. Evaluation with such techniques and implementation of
5 "medium" 500 98.9% 3.1613%
the evading mechanism is part of our future work.
"low" 100 99% 5.6757%
In our prototype implementation, we focused on popular logic
related to circuit breaker control. There should be other logic as-
7.4 Security Discussion sociated with other types of power grid physical components, and
Our goal in this paper is to practically implement deception IEDs studying feasibility to implement such logic is part of our future
that offer “𝑘-anonymous smokescreen” to deceive such attackers. work. However, circuit breakers are one of the most critical power
If we configure 20-anonymity (e.g., by deploying 200 DecIED in- grid components that significantly influence power grid stability,
stances for EPIC testbed [6]), attackers in the substation system and it is usually the first priority for attackers, as was the case in
(either at station bus or process bus) will see 20 devices that look Ukraine power plant attack [66]. Thus, our proof-of-concept fo-
and behave indistinguishably. Thus, passive attackers cannot distin- cused on circuit breaker control still demonstrates the feasibility to
guish which of the 20 devices is the real IED and cannot learn which implement additional lines of defence of real-world importance. Val-
one to target when he mounts an attack against the infrastructure. idation of a real power grid system under various attack scenarios
An attacker may send out innocuous control commands for probing. is planned in our future work.
When an attacker sends an IEC 61850 MMS commend randomly
The scalability tests
900
expected rate for T=1s
expected rate for T=3s
expected rate for T=5s
800 observed rate for "high", time interval=1s
observed rate for "middle",time interval=1s
expected and observed rate (number of packets / second)

observed rate for "low",time interval=1s


700 observed rate for "high", time interval=3s
observed rate for "middle",time interval=3s
observed rate for "low",time interval=3s
600 observed rate for "high", time interval=5s
observed rate for "middle",time interval=5s
observed rate for "low",time interval=5s
500

400

300

200

100

0
50 100 150 200 250 300 350 400 450 500
The number of DecIEDs

Figure 6: Scalability evaluation with different GOOSE messaging interval (T) in different industrial PCs

8 CONCLUSIONS (CREATE) programme. Jianying Zhou’s work is supported by the


In this paper, we discussed the practical design and implementa- SUTD start-up research grant SRG-ISTD-2017-124.
tion of deception technologies for IEC61850-compliant smart grid
systems, called DecIED. DecIED can imitate externally-visible char- REFERENCES
[1] 2003. International Standard IEC 61850-7-2 Communication networks and sys-
acteristics of the real IED in a modernized electrical substation tems in substations - Part 7-2: Basic communication structure for substation and
to implement 𝑘-anonymous smokescreen. By deploying sufficient feeder equipment - Abstract communication service interface (ACSI).
numbers of DecIED instances, we can make it difficult for persis- [2] 2003. International Standard IEC 61850-7-4 Communication networks and sys-
tems in substations - Part 7-4: Basic communication structure for substation and
tent attackers in the attack-preparation phase to learn the actual feeder equipment - Compatible logical node classes and data classes.
system configuration and topology correctly. Furthermore, once [3] 2010. International Standard IEC 61850-7-3 Communication networks and sys-
attackers attempt to touch any of DecIED instances, an alarm is tems for power utility automation - Part 7-3: Basic communication structure -
Common data classes.
triggered to alert system operators and/or to invoke intrusion pre- [4] 2011. IEC 61850 Communication protocol manual. https://www.naic.edu/~phil/
vention functionality. This way, DecIED helps to detect probing hardware/sitePower/evd4/1MRK511242-UEN_-_en_Communication_protocol_
manual__IEC_61850__650_series__IEC.pdf.
activities and lateral movement by persistent attackers or malware. [5] 2018. IEC 62351:2018 SER Series. https://webstore.iec.ch/publication/6912
Our proof-of-concept implementation, which we plan to publish as [6] 2018. Electric Power and Intelligent Control (EPIC) Testbed. [Online].
an open-source project, demonstrated feasibility, indistinguishabil- Available: https://itrust.sutd.edu.sg/wp-content/uploads/sites/3/2019/02/EPIC_
technical_details-231018-v1.2.pdf. (Date last accessed on Feb. 12, 2019).
ity, and scalability when deployed on commodity industrial PCs. [7] 2019. IEC 61850 - Communication Networks and Systems in Substations. https:
As future work, we plan to conduct the evaluation in a practical //webstore.iec.ch/
environment, ideally in a real power grid system. For instance, we [8] 2019. libIEC61850: open source libraries for IEC 61850 . https://libiec61850.com/
libiec61850/new-version-1-3-3-of-libiec61850/.
will implement the same control logic implemented on the IEDs in [9] 2019. Revolutionary Deception Technologies. https://cybertrap.com/.
a real system and compare the behavior of DecIED in a quantita- [10] 2020. CONPOT ICS/SCADA Honeypot. http://conpot.org.
[11] 2020. ’Crash Override’: The Malware That Took Down a Power Grid. [Online].
tive manner. Another evaluation strategy is deploying DecIED in a Available: https://www.wired.com/story/crash-override-malware/.
hacking/capture-the-flag competition to evaluate difficulty to dis- [12] 2020. Digital Bond. http://www.digitalbond.com/tools/scada-honeynet.
tinguish it from a real IED. Evaluating capability and effectiveness [13] 2020. Matied. https://directory.fsf.org/wiki/Matiec.
[14] 2020. Mininet. http://mininet.org/.
of DecIED under various attack models and exploring integration [15] 2020. Nmap: the Network Mapper. https://nmap.org/.
with other security measures, such as intrusion detection systems, [16] 2020. Shodan. https://www.shodan.io/.
would be also interesting directions. [17] 2020. ThreatDefend Platform. https://attivonetworks.com/product/deception-
technology/.
[18] 2020. What is Stuxnet? https://www.mcafee.com/enterprise/en-sg/security-
ACKNOWLEDGEMENT awareness/ransomware/what-is-stuxnet.html.
[19] 2020. Wireshark. https://www.wireshark.org/.
This work is supported in part by the National Research Foundation, [20] Sridhar Adepu and Aditya Mathur. 2018. Assessing the effectiveness of attack
Prime Minister’s Office, Singapore under the Energy Programme detection at a hackfest on industrial control systems. IEEE Transactions on
Sustainable Computing (2018).
and administrated by the Energy Market Authority (EP Award No. [21] Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, and Cliff Wang. 2019. CONCEAL:
NRF2017EWT-EP003-047) and is partly supported by the National A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and
Research Foundation, Prime Minister’s Office, Singapore under Deployment. Springer International Publishing, Cham, 101–124. https://doi.
org/10.1007/978-3-030-02110-8_6
its Campus for Research Excellence and Technological Enterprise
[22] Daniele Antonioli, Anand Agrawal, and Nils Ole Tippenhauer. 2016. Towards [43] Hui Lin, Jianing Zhuang, Yih-Chun Hu, and Huayu Zhou. 2020. DefRec: Es-
high-interaction virtual ICS honeypots-in-a-box. In Proceedings of the 2nd ACM tablishing Physical FunctionVirtualization to Disrupt Reconnaissance of Power-
Workshop on Cyber-Physical Systems Security and Privacy. ACM, 13–22. Grids’ Cyber-Physical Infrastructures. In The Proceedings of 2020 Network and
[23] Nadarajah Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Distributed System Security Symposium (NDSS).
Matthias Schunter, Gene Tsudik, and Christian Wachsmann. 2015. Seda: Scal- [44] Ralph E Mackiewicz. 2006. Overview of IEC 61850 and Benefits. In 2006 IEEE
able embedded device attestation. In Proceedings of the 22nd ACM SIGSAC Power Engineering Society General Meeting. IEEE, 8–pp.
Conference on Computer and Communications Security. ACM, 964–975. [45] Yuval Malachi. 2020. Kaspersky Labs hacked - Deception technology could
[24] BBC News. 2018. Russian hackers penetrate US power stations. https://www. help - TrapX Security. https://trapx.com/kaspersky-labs-hacked-deception-
bbc.com/news/technology-44937787 (Date last accessed on Sep. 22, 2019). technology-could-help Posted by Yuval Malachi, CTO of TrapX Security, Inc.
[25] Partha P Biswas, Heng Chuan Tan, Qingbo Zhu, Yuan Li, Daisuke Mashima, and [46] Daisuke Mashima, Binbin Chen, Prageeth Gunathilaka, and Edwin Lesmana
Binbin Chen. 2019. A Synthesized Dataset for Cybersecurity Study of IEC 61850 Tjiong. 2017. Towards a grid-wide, high-fidelity electrical substation hon-
based Substation. In 2019 IEEE International Conference on Communications, eynet. In 2017 IEEE International Conference on Smart Grid Communications
Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, (SmartGridComm). IEEE, 89–95.
1–7. [47] Daisuke Mashima, Prageeth Gunathilaka, and Binbin Chen. 2019. Artificial
[26] Boyd Brown. 2020. Deception as a security strategy. https://trapx.com/ Command Delaying for Secure Substation Remote Control: Design and Imple-
whitepapers A whitepaper by TrapX Security, Inc. mentation. https://doi.org/10.1109/TSG.2017.2744802. , 471-482 pages.
[27] Dániel István Buza, Ferenc Juhász, György Miru, Márk Félegyházi, and Tamás Hol- [48] Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, and Alvin Cheng.
czer. 2014. CryPLH: Protecting smart energy systems from targeted attacks with 2020. On Design and Enhancement of Smart Grid Honeypot System for Practical
a PLC honeypot. In International Workshop on Smart Grid Security. Springer, Collection of Threat Intelligence. In 13th USENIX Workshop on Cyber Security
181–192. Experimentation and Test.
[28] John Henry Castellanos and Jianying Zhou. 2019. A Modular Hybrid Learning [49] Daisuke Mashima, Ramkumar Rajendran, Toby Zhou, Binbin Chen, and Biplab
Approach for Black-Box Security Testing of CPS. In Applied Cryptography and Sikdar. 2019. On Optimization of Command-Delaying for Advanced Command
Network Security, Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, and Authentication in Smart Grid Systems. In Proc. of IEEE PES ISGT Asia 2019.
Moti Yung (Eds.). Springer International Publishing, Cham, 196–216. IEEE.
[29] Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, and Yueqiang Cheng. [50] Kieran McLaughlin. 2015. High-level design documentation and deploy-
2017. Secure and efficient software-based attestation for industrial control de- ment architecture for Multi-Attribute SCADA Intrusion Detection Sys-
vices with arm processors. In Proceedings of the 33rd Annual Computer Security tem. https://project-sparks.eu/wp-content/uploads/2014/04/SPARKS_D4_1_
Applications Conference. ACM, 425–436. Multi-Attribute_SCADA_Intrusion_Detection_System.pdf (Date last accessed
[30] Shaik Mullapathi Farooq, SM Suhail Hussain, and Taha Selim Ustun. 2019. Per- on Jun. 7, 2017).
formance Evaluation and Analysis of IEC 62351-6 Probabilistic Signature Scheme [51] Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit,
for Securing GOOSE Messages. IEEE Access 7 (2019), 32343–32351. Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J Alex Halderman,
[31] David Formby, Preethi Srinivasan, Andrew M. Leonard, Jonathan D. Rogers, et al. 2016. An Internet-Wide View of ICS Devices. In 14th IEEE Privacy, Security,
and Raheem A. Beyah. 2016. Who’s in Control of Your Control System? and Trust Conference (PST’16).
Device Fingerprinting for Cyber-Physical Systems. In 23rd Annual Network [52] Kapuge Kariyawasam Mudalige and Sachintha Kariyawasam. 2016. Implemen-
and Distributed System Security Symposium, NDSS 2016, San Diego, California, tation of an IEC 61850 Sampled Values Based Line Protection IED with a New
USA, February 21-24, 2016. The Internet Society. https://pdfs.semanticscholar. Transients-Based Hybrid Protection Algorithm. http://hdl.handle.net/1993/31306.
org/d160/c46512ebc12c172d26f150797b42592a9095.pdf (2016).
[32] Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis [53] Venkat Pothamsetty and Matthew Franz. 2005. SCADA HoneyNet Project: Build-
Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, and Saman ing Honeypots for Industrial Networks. http://scadahoneynet.sourceforge.net/.
Zonouz. 2019. PAtt: Physics-based Attestation of Control Systems. In 22nd [54] Niels Provos. 2003. Honeyd-a virtual honeypot daemon. In 10th DFN-CERT
International Symposium on Research in Attacks, Intrusions and Defenses Workshop, Hamburg, Germany, Vol. 2. 4.
(RAID 2019). USENIX Association, Chaoyang District, Beijing, 165–180. https: [55] Muhammad Talha Abdul Rashid, Salman Yussof, and Yunus Yusoff. 2016. Trust
//www.usenix.org/conference/raid2019/presentation/ghaeini system architecture for securing GOOSE communication in IEC 61850 substation
[33] Andy Greenberg. 2019. The Highly Dangerous ’Triton’ Hackers Have Probed network. https://doi.org/10.14257/ijsia.2016.10.4.27. International Journal of
the US Grid. https://www.wired.com/story/triton-hackers-scan-us-power-grid/ Security and Its Applications 10, 4 (2016), 289–302.
(Date last accessed on Sep. 22, 2019). [56] Owen Redwood, Joshua Lawrence, and Mike Burmester. 2015. A symbolic
[34] IEC TC57. 2015. IEC 61850-90-2 TR: Communication networks and systems honeynet framework for scada system threat intelligence. In International
for power utility automation – Part 90-2: Using IEC 61850 for the communica- Conference on Critical Infrastructure Protection. Springer, 103–118.
tion between substations and control centres. International Electro technical [57] Wenyu Ren, Timothy Yardley, and Klara Nahrstedt. 2018. EDMAND: Edge-Based
Commission Std (2015). Multi-Level Anomaly Detection for SCADA Networks. In 2018 IEEE International
[35] IEEE Power and Energy Society. 2005. IEEE Standard Communication Delivery Conference on Communications, Control, and Computing Technologies for
Time Performance Requirements for Electric Power Substation Automation. Smart Grids (SmartGridComm). IEEE, 1–7.
(2005). [58] Electricity Information Sharing and Analysis Center (E-ISAC). 2016. Analysis of
[36] Tadayoshi Kohno, Andre Broido, and Kimberly C Claffy. 2005. Remote physical the cyber attack on the Ukrainian power grid. (2016).
device fingerprinting. IEEE Transactions on Dependable and Secure Computing [59] Ahnaf Siddiqi, Nils Ole Tippenhauer, Daisuke Mashima, and Binbin Chen.
2, 2 (2005), 93–108. 2018. On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
[37] Kamil Kołtyś and Robert Gajewski. 2015. Shape: A honeypot for electric power In Proceedings of the Cyber-Physical System Security Workshop (CPSS),
substation. Journal of Telecommunications and Information Technology 4 (2015), co-located with ASIACCS. https://doi.org/10.1145/3198458.3198461
37–43. [60] Jianhua Sun and Kun Sun. 2016. DESIR: Decoy-enhanced seamless IP randomiza-
[38] Jakub W Konka, Colin M Arthur, Francisco J Garcia, and Robert C Atkinson. tion. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference
2011. Traffic generation of IEC 61850 sampled values. https://ieeexplore.ieee. on Computer Communications. IEEE, 1–9.
org/abstract/document/6089025. In 2011 IEEE First International Workshop on [61] Heng Chuan Tan, Carmen Cheh, Binbin Chen, and Daisuke Mashima. 2019.
Smart Grid Modeling and Simulation (SGMS). IEEE, 43–48. Tabulating Cybersecurity Solutions for Substations: Towards Pragmatic Design
[39] Carl Kriger, Shaheen Behardien, and John-Charly Retonda-Modiya. 2013. A and Planning. In Proceedings of IEEE PES ISGT Asia 2019. IEEE.
detailed analysis of the GOOSE message structure in an IEC 61850 standard- [62] Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, and
based substation automation system. International Journal of Computers Mathias Ekstedt. 2016. Exploiting bro for intrusion detection in a SCADA sys-
Communications & Control 8, 5 (2013), 708–721. tem. In Proceedings of the 2nd ACM International Workshop on Cyber-Physical
[40] Subhash Lakshminarayana, E Veronica Belmega, and H Vincent Poor. 2019. System Security. ACM, 44–51.
Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in [63] Noriyuki Ueda. 2019. Prototyping of Substation Automation System Testbeds for
Power Grids. arXiv preprint arXiv:1908.02392 (2019). Cyber Security Evaluation. In CIGRE 2019. 103–118.
[41] Hui Lin, Zbigniew Kalbarczyk, and Ravishankar K Iyer. 2018. RAINCOAT: RAn- [64] Craig Wester, Mark Adamiak, and J Vico. 2011. Practical Applications of IEC
domization of Network Communication in Power Grid Cyber INfrastructure to 61850 Protocol in Industrial Facilities. IAS, Orlando, FL (2011), 1–2.
Mislead Attackers. IEEE Transactions on Smart Grid (2018). [65] Yubo Yuan and Yi Yang. 2019. IEC 61850-Based Smart Substations: Principles,
[42] Hui Lin, Adam Slagell, Catello Di Martino, Zbigniew Kalbarczyk, and Ravis- Testing, Operation and Maintenance. Elsevier Science. https://books.google.
hankar K Iyer. 2013. Adapting bro into scada: building a specification-based com.sg/books?id=ji6dDwAAQBAJ
intrusion detection system for the dnp3 protocol. In Proceedings of the Eighth [66] Kim Zetter. 2016. Inside the Cunning, Unprecedented Hack of Ukraine’s
Annual Cyber Security and Information Intelligence Research Workshop. ACM, Power Grid. [Online]. Available: http://www.wired.com/2016/03/inside-cunning-
5. unprecedented-hack-ukraines-power-grid/. (Date last accessed on Jun. 7, 2017).

You might also like