DecIED CPSS2020
DecIED CPSS2020
ABSTRACT 1 INTRODUCTION
As demonstrated by the past real-world incidents, sophisticated In order to counter emerging cyber threats targeting our critical
attackers targeting our critical infrastructure may be hiding in the infrastructure, the existing cybersecurity solution, such as firewall,
system, perhaps at this moment, in order to collect information and data diode, centralized intrusion/anomaly detection systems would
prepare for massive attacks. If an attacker is mostly passive and not be fully effective. For instance, as demonstrated by the number
monitoring SCADA communication traffic or is clever enough to of real-world incidents in the past years, such as Ukraine power
act under the radar of intrusion/anomaly detection systems, it is plant attacks in 2015 and 2016 [66], persistent attackers were hiding
challenging to counter them. In this direction, deception technology in the smart grid infrastructure to collect information about systems
is an effective cybersecurity tool, by deploying a large number of for over 6 months. During such attack preparation (or reconnais-
dummy and decoy devices throughout the system infrastructure sance) stage, attackers are likely sending query/control commands
to be protected, for capturing probing attempts and lateral move- to collect intelligence about the infrastructure, flying under the
ment of persistent attackers and malware. In this paper, we discuss radar. Furthermore, during the reconnaissance stage, an attacker
the practical design and implementation of high-fidelity decep- could be completely passive and just overhearing communication
tion devices for smart power grid systems, named DecIED. DecIED in the control system infrastructure. Such activities may not be
imitates the device characteristics and communication models of effectively detected by intrusion detection systems [42, 50, 62], or
IEC 61850-compliant IEDs (intelligent electronic devices) and thus other security solutions such as industrial firewall.
realize 𝑘-anonymous smokescreen, which virtually shows 𝑘 − 1 When prevention and detection are bypassed, the potential next
indistinguishable decoy devices, to protect our critical infrastruc- line of defence is to prevent attackers from learning the system. In
ture. Based on our prototype implementation, a single industry PC order to make the reconnaissance difficult as well as to capture such
can host over 200 deception devices, which demonstrates DecIED’s activities, deception technologies are considered effective [26, 45].
scalability and feasibility of integration into the existing systems. At the high-level, deception technologies blend fake, but apparently
real, devices (often called decoy devices or deception devices) in
CCS CONCEPTS the system infrastructure. This way, an attacker, which may be
passively sniffing network traffic, could not tell which are the real
• Security and privacy → Intrusion/anomaly detection and
devices connected to the physical power grid system or what the
malware mitigation; • Computer systems organization → Em-
real system topology is like. The fake device also works as a sensor
bedded and cyber-physical systems; • Networks → Cyber-
(or tripwire), which raises an alarm when it is touched, detecting
physical networks; • Hardware → Smart grid.
attackers’ probing activity during the attack preparation phase.
While there are some commercial services or solutions of decep-
KEYWORDS tion technologies for enterprise IT systems, e.g., [9, 17], deception
smart grid; deception technologies; IEC 61850; cyber security technologies for industrial control systems, including smart grid
systems, are still immature and poses unique challenges. For exam-
ACM Reference Format:
ple, devices used in industrial control systems would have unique
Dianshi Yang, Daisuke Mashima, Wei Lin, and Jianying Zhou. 2020. De-
cIED: Scalable 𝑘-Anonymous Deception for IEC61850-Compliant Smart
device characteristics (e.g., OS fingerprints and services run on
Grid Systems. In Proceedings of the 6th ACM Cyber-Physical System Security devices). Even more challenging is the imitation of communication
Workshop(CPSS ’20), October 6, 2020, Taipei, Taiwan. ACM, New York, NY, patterns. The deception devices should use the same communi-
USA, 12 pages. https://doi.org/10.1145/3384941.3409592 cation protocols as the real one, and the communication models
and timings should be indistinguishable from the real devices. The
other challenge comes from its cyber-physical nature, where mes-
Permission to make digital or hard copies of all or part of this work for personal or sages transmitted in the cyber system should provide system-wide
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation consistency about the physical system. For instance, voltage and
on the first page. Copyrights for components of this work owned by others than ACM current measurements should be consistent with the physical laws
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, of power systems. Otherwise, sophisticated attackers with domain
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected]. knowledge may be able to identify real devices from decoying.
CPSS ’20, October 6, 2020, Taipei, Taiwan In this paper, we discuss the practical design of high-fidelity
© 2020 Association for Computing Machinery. deception devices for smart power grid systems, named DecIED or
ACM ISBN 978-1-4503-7608-2/20/10. . . $15.00
https://doi.org/10.1145/3384941.3409592 a deception IED (intelligent electronic device). DecIED imitates an
IED, which is an intelligent device that works as a communication major limitation is that it does not make sufficient consideration to
end-point in the cyber side while monitoring or controlling physical maintain cyber-physical system consistency. Another limitation is
power system devices in the modernized substation system. DecIED that it is relatively easy to get fingerprinted [16, 51].
is compliant with IEC 61850 standards [4, 7], the established inter- Many of the prior honeypot efforts in the smart grid area, which
national standard for substation automation communication, and is also our focus, including CryPLH [27] and SHaPe [37], only
thus can be easily integrated into the standard-compliant substation imitate the cyber side, and thus, not enough to deceive power-
network without requiring a major change or upgrade on existing system-aware attackers. Some other honeypot systems, such as [46,
devices or interfering with the functionality of existing (real) IEDs. 56], utilize power-flow simulation. However, the use of simulators
Among the variants of deception technologies, in this paper we fo- is impractical to imitate power grid system behaviour in real-time,
cus on the most basic, but fundamental, one, namely “smokescreen” high-fidelity manner, thus not suitable for implementing in-network
with 𝑘-anonymity concept [21], which offers 𝑘 − 1 fake devices deception technologies. We should note that, while honeypot is
that appear and behave like the real IEDs. DecIED takes advan- typically isolated from real systems, in-network deception devices
tage of process-level communication using IEC 61850 to imitate are blended in the real system infrastructure and thus the cyber-
the behaviour of a real IED in a real-time manner. When persistent physical view it presents must be more-tightly consistent with
attackers scan the system, they would find multiple devices that real systems. This is one of the reasons why we did not utilize
identically look and behave. Our particular focus in this paper is to simulators.
prevent attackers from pinpointing real IEDs to compromise and/or In a general IT context, [21] introduces a strategy composition
learning the real system topology. for resilient cyber deception called CONCEAL with an optimal
In order to demonstrate the practicality of the idea, we further composition of various concealment techniques to maximize the
present a proof-of-concept DecIED implementation that can imitate deception utility. This cyber deception framework is a composition
device/OS characteristics of real IEDs that are deployed in a state-of- of mutation, anonymity, and diversity to maximize key deception
the-art smart grid testbed [6] as well as communication models of objectives. The paper also illustrates desired properties for cyber
IEDs that implement control logic that is often found in real-world deception techniques, including scalability for large numbers of
substations. The comprehensive metric or methodology to evaluate hosts or services. CONCEAL framework composes 𝑚-mutation for
deception technologies is still an open problem to our knowledge. address anonymization, 𝑘-anonymity for fingerprint anonymiza-
However, because our goal is to implement 𝑘-anonymity, we eval- tion, and 𝑙-diversity for configuration diversification. 𝑚-mutation
uate the implementation in terms of resemblance and scalability. means the address of the host alters per 1/𝑚 seconds. 𝑘-anonymity
We show that, on commodity industrial PCs, we can run as many means that for a single host there are 𝑘-1 shadow hosts along with
as 200 deception device instances. We believe DecIED can serve the real host with similar or identical fingerprints. 𝑙-diversity means
as a crucial building block for advanced deception solutions such that for each kind of service there are 𝑙-1 fake services in the same
as moving target defence (e.g., [40]) as well as other deception kind with different versions or vendors along with the real one.
strategies discussed in [21]. In the smart grid context, address mutation is not often practical
The rest of the paper is organized as follows. In Section 2 we dis- to avoid major changes in the existing infrastructure. Moreover,
cuss state-of-the-art technologies in the relevant areas. In Section 3, 𝑙-diversity may not make enough sense given the limited number of
we provide an overview of devices that enable smart grid commu- services implemented. Thus, in this paper, we focus on 𝑘-anonymity
nication and control and also their communication models based to implement smokescreen.
on IEC 61850 standards. Section 4 defines our design goals and The comprehensive evaluation of deception technologies, in-
technical challenges to tackle with. We then discuss our approach cluding honeypot systems, is still an open question. As discussed
as well as DecIED proof-of-concept implementation in Section 5 in [22], the quantitative evaluation of realism of ICS honeypot sys-
and Section 6. We present the evaluation in Section 7. Finally, we tem is not feasible. Furthermore, we argue that realism alone does
conclude the paper with future research directions in Section 8. not capture the effectiveness of deception technologies because
deception against human attackers would be a mind game, and
therefore involvement human subjects would be a must. Such an
2 RELATED WORK approach for evaluating attack detection systems has been recently
There are a wide range of security solutions developed for security attempted [20], but it is not in general feasible. In addition, the out-
smart grid systems such as intrusion/attack detection systems [28, come would be still biased depending on the quality of participants.
57, 62], remote attestation [23, 29, 32], cryptographic solutions, such In this paper, we narrow down the scope only to 𝑘-anonymity
as IEC 62351 standard [5] and the reference [30], and cyber and and thus focus on the evaluation of indistinguishability in device
physical zoning, as summarized in [61]. The technology explored characteristics and communication patterns, as well as scalability.
in this paper is categorized under in-network deception, and is Moving target defence (MTD) technologies for perturbation of
considered orthogonal and complementary to the other categories. cyber and/or physical topology to confuse attackers are explored,
Honeypot is also considered as a deception technology, and for instance in [40, 41, 60]. These are effective in preventing attack-
there exist a number of open-source honeypot implementations for ers from obtaining accurate system information to launch successful
industrial control systems [10, 12, 53, 54]. Among them, Conpot [10] attacks, but it is not designed for capturing probing/reconnaissance
is an open-source, low-interaction honeypot designed for industrial activities attempted by persistent attackers that are hiding the in-
control systems (ICS) and is actively maintained. Conpot supports frastructure to prepare for a large-scale attack. Having that said,
several Internet and ICS-specific protocols such as Modbus. One
Firewall
5.5 Discussion
Besides the AppID tweak discussed above, in order to make the
DecIED’s communication model indistinguishable from the base
IED’s, we also need to make SCADA/HMI or substation gateway to
interact with DecIED instances just like the base IED. For instance,
when a SCADA/HMI queries status from the base IED, the same
interrogation request should be sent to DecIED instances too. One
solution for this issue is that we register DecIED instances on the Figure 4: Cyber and Physical Topology in Substation
SCADA/HMI along with the base IED so that all are interrogated
equally. In this case, we also need to prevent the SCADA/HMI C language so that existing logic codes on a base IED can be feasibly
system (or human operator) from getting confused. A trivial so- ported into DecIED, and thus our design and implementation are
lution would be to configure the list of DecIED instances on the extensible.
SCADA/HMI to be excluded. Unfortunately, this is not an ideal Figure 4 shows system topology around one of the buses in
solution for a couple of reasons: first, we need to make changes on a substation, which is drawn based on a setup discussed in [25].
the SCADA/HMI, and secondly, once an attacker compromises the As can be seen, IEDs are connected to a circuit breaker, or CB,
SCADA/HMI, deception is no longer effective (i.e., SCADA/HMI (a rectangle on each power transmission line) and MUs are also
must be fully secure). connected to the transmission lines to collect measurements. Both
Although the generic solution that works for any kinds of de- IEDs are MUs are connected to a switch on process bus of the
ception technologies may not be trivial, our 𝑘-anonymous DecIED substation. The breaker is closed when there is no fault and is
design inherently avoids this problem. Recall that all DecIED in- opened to cut down the power flow on a transmission line when
stances and the base IED share the power grid measurements (via SV an overcurrent situation is detected to protect the line as well
messages) and status (via GOOSE messages). Thus, measurements as connected equipment. Besides, IEDs also implement a backup
and status reported by all are essentially the same (i.e., reporting protection mechanism that can be triggered when a certain circuit
the same values for the same power grid component). Thus, from breaker associated with another IED in the substation fails to trip.
the SCADA perspective, they are treated as redundant, repeated Some popular protection mechanisms, namely busbar protec-
messages. Therefore, even when DecIED instances are equally reg- tion and breaker failure protection are discussed in [25] along with
istered on SCADA/HMI and historian database, the SCADA/HMI hypothetical but realistic substation topology. Below, we summa-
or human operators will not be confused. This way, we can hide rize how these work according to the setting shown in Figure 4 so
any traits of deception devices in the communication patterns as that we can implement them on our proof-of-concept virtual IED
well as configuration of the SCADA/HMI, and therefore, even if implementation.
SCADA/HMI is compromised, an attacker cannot break the decep- Busbar protection: This protection aims at preventing fault sit-
tion technology. uation on a bus in a substation. The measurement of current is
based on the messages by SV protocol. If the SV messages indicate
anomalous current values, 𝐼𝐸𝐷 0 quickly realises the fault and trig-
6 PROOF-OF-CONCEPT VIRTUAL IED
gers a trip of its own circuit breaker as well as sends notification
Among the components illustrated in Figure 3, the virtual IED mod- for other relevant IEDs (i.e., 𝐼𝐸𝐷 1 and 𝐼𝐸𝐷 2 in Figure 4) to trip by
ule plays an essential role in attaining indistinguishability from using GOOSE communication.
real IEDs. Thus, in this section, we elaborate on the design details Breaker failure protection: There may be a situation that the
of it with hypothetical but representative control mechanisms im- overcurrent occurs but the breaker does not trip because of me-
plemented on real-world IEDs to demonstrate the feasibility of chanical failure or any other reasons. When one IED (e.g., 𝐼 𝐸𝐷 0 )
implementation. picks up occurrence of overcurrent and attempts to open its own
circuit breaker, but then it detects a failure preventing the CB from
6.1 Control Logic Implemented on IED opening. Once such an event occurs, the corresponding IED to send
In this section, we discuss automated control mechanisms that are out a GOOSE message for nearby IEDs (i.e., 𝐼𝐸𝐷 1 and 𝐼 𝐸𝐷 2 ) to let
typically implemented on IEDs. In practice, IEDs listens to IEC 61850 them know the situation, which will then trigger those IEDs to trip
GOOSE messages sent by peer IEDs and SV messages sent by MUs their CBs.
(merging units) and execute control logic for automated control. We should emphasize that the logic implemented on our pro-
Among such mechanisms, we focus on protection mechanisms totype can be implemented on multiple (real) IEDs. For instance,
because of popularity and importance. While we demonstrate only a breaker failure protection logic is implemented on all IEDs that con-
small number of logics, we note that, by using a tool like Matiec [13], trol circuit breakers. Thus, our prototype can be readily customized
we can convert logic written according to IEC 61131-3 standard into for providing deception for the real IEDs of this sort.
6.2 Virtual IED Implementation Details the external equipment health of the breaker (“XCBR.EEHealth.stVal”
The MMS server, GOOSE publisher, and GOOSE/SV subscriber and “PTRC.EEHealth.stVal”) by changing the value from 1 (normal
modules utilize the libIEC61850 open-source C library [8]. These state) to 3 (alarm).
modules utilize an SCL file, which is prepared based on the config-
uration discussed in [25], to generate data models used for parsing
as well as constructing IEC 61850 messages. The virtual IED is 7 EVALUATION
running with four threads: GOOSE Publisher, GOOSE Subscriber, This section evaluates the DecIED prototype based on the design
SV Subscriber, and IED logic. In addition, there is a buffer to record goals in Section 4.
real-time values from incoming GOOSE and SV messages. For the
data attributes in measurement, due to the values of current and
voltage are in sinusoidal function, the coming data values in SV
7.1 Similarity in Device Characteristics
messages are recorded in a certain interval (e.g., duration corre-
sponding to 1 cycle), and the effective values are calculated by all In order to evaluate the similarity in device characteristics on the
the SV values in the period. The initial values are defined according cyber side, we utilized a popular network scanning tool, Nmap [15].
to the normal status of the real device. The scanning method used was to probe all the TCP and UDP ports.
Then the discrepancies of the OS fingerprints of the DecIED and a
Table 1: The data attributes of GOOSE messages defined by real IED in EPIC testbed [6, 59] (i.e., base IED) are compared.
the SCL file of IED. (FC: function constraint [65], i32: 32bits Some earlier approaches for implementing deception technolo-
integer. The values shown are for the normal state.) gies for industrial control systems, such as [22, 46], utilized Mininet [14]
to implement virtual devices. Thus, we also obtained OS finger-
Dataset NAME FC TYPE VALUE
prints of the Mininet-based implementation that are used in the
PTRC.EEHealth.stVal ST i32 1
XCBR.Loc.stVal ST bool false literature [46]. DecIED as well as Mininet-based implementation
IED-CTRL/Status (called Mininet IED hereafter) are set up on a separate virtual ma-
XCBR.Pos.stVal ST i32 1
XSWI.Pos.stVal ST i32 1 chine running Ubuntu Linux OS.
LPHD.PwrSupAlm.stVal ST bool false Regarding the open ports, since we configured DecIED based on
PIOC.Op.general ST bool false a Siemens IED used in the EPIC testbed, no difference was seen, and
IED-PROT/Alarm PSCH.ProRx.stVal ST bool false both opens port 80 and 102. Besides, since we customized HTTP
PSCH.ProTx.stVal ST bool false headers on the web server in DecIED according to the base IED, no
XCBR.EEHealth.stVal ST i32 1 difference was observed.
Table 2 shows Nmap’s OS fingerprinting results of a DecIED, the
Table 1 shows the GOOSE data attributes defined by the SCL base IED, and Mininet IED. As can be seen, compared to Mininet IED,
file generated based on [25]. We have another data set to announce DecIED presents significantly better similarity. Moreover, while
measurements (IED-MEAS/Meas), but it is omitted for the interest Mininet IED was fingerprinted as “Linux 3.2-4.9”, the DecIED and
of space. In sum, there are three groups of data attributes, including the base IED returned “No exact OS matches”. Since virtual nodes on
status (control), alarm (protection), and measurement, which are Mininet are essentially copy of the host OS, and thus OS fingerprint
sent in separate GOOSE messages. The detailed explanations of revealed the information of the host OS (i.e., Ubuntu Linux).
the data attributes are introduced in IEC61850-7-2 [1], 7-3 [3], and For both DecID and Mininet IED, differences from the base IED
7-4 [2]. are highlighted in the table, and we immediately see the limitation
For the protection mechanisms on IEDs introduced in Section 6.1, of Mininet IED. There are some differences seen in the SEQ lines in
here let us elaborate on the implementation of busbar protection DecIED fingerprint. Among these, SP and ISR fluctuate ±2 based
mechanism. The virtual IED program firstly gets the real-time SV on our repeated experiments. Therefore, from the results it can be
values about the current via SV Subscriber module. If the real-time concluded that the differences between these two values do not
effective value is larger than the pre-configured threshold, it is affect the fingerprint resistance of the system. Regarding the other
treated as an overcurrent situation. Then, virtual IED “pretends” to differences, namely SS and IPL, according to Nmap documenta-
open circuit breaker, and updates the data attribute about the circuit tion [15], the former indicates whether TCP and ICMP shares IP
breaker status. The data attribute “XCBR.Pos.stVal” is associated ID sequence or not and the latter is based on the total length of an
with the position of the breaker, which is updated to 0 (open), and IP packet used for a port unreachable ICMP message when UDP
“PIOC.Op.general” is used for the status of instantaneous overcur- packet is sent to a closed port. Other smart grid devices, such as
rent, which is updated to true to alarm the status. These updates WAGO PLC used in EPIC testbed [59], returned IPL=164, which is
will be handled by GOOSE Publisher for the announcement to other the same as DecIED. Thus, without knowing the exact characteris-
IEDs. The implementation results of the protection scenarios will tics of the specific IED model used in the system, it is not feasible for
be introduced in Section 7.2. an attacker to tell differences between real and fake devices. More-
Regarding the circuit breaker failure protection case, IED Logic over, collection of IPL requires active fingerprinting, repetition of
module checks the position of the circuit breaker. If the circuit which can be caught by other security measures, such as intrusion
breaker remains closed, a breaker failure protection is triggered to detection systems. Having that said, we can radically address these
give the alarm. The virtual IED sends out the breaker failure mes- differences by modifying socket implementation, which will be left
sage to the other IEDs, and updates the related data attributes about for our future work.
Figure 5: IEC 61850 GOOSE communication pattern of DecIED (50 instances) under circuit breaker failure situation
Table 2: Fingerprinting results of DecIED, Base IED, and traffic when there is no event or status change. For each period, De-
Mininet IED cIED sends out 3 GOOSE messages corresponding to the 3 datasets
discussed in Table 1. Measurement values are calculated by SV
IED system
DecIED
Fingerprint
SEQ( SP=C5 %GCD=1% ISR=D5 %TI=I%CI=I%II=I% SS=O %TS=U)
traffic generated by an emulated MU.
ECN(R=N) Let us next see the behavior of DecIED under a disturbance
T1(R=Y%DF=N%T=72%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N) scenario, namely circuit breaker failure case. In order to emulate
T3(R=N)
T4(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) an overcurrent situation, we configured MU to send out SV mes-
T5(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
sages conveying overcurrent measurement, and also run two sets
T7(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=) of DecIED instances, corresponding to 𝐼𝐸𝐷 0 and 𝐼𝐸𝐷 1 . As seen in
U1(R=Y%DF=N%T=72% IPL=164 %UN=0%RIPL=G%RID=G%RIPCK=G%
RUCK=6339%RUD=I)
Figure 5, after overcurrent is picked up, DecIED instances imitating
Base IED
IE(R=Y%DFI=N%T=72%CD=Z)
SEQ(SP=CD%GCD=1%ISR=D6%TI=I%CI=I%II=I%TS=U)
𝐼𝐸𝐷 0 start sending GOOSE messages to report circuit breaker fail-
ECN(R=N) ure (around time 9.7s). The figure is showing the network trace as
T1(R=Y%DF=N%T=72%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N) well as the number of GOOSE messages for each 0.001s time slot.
T3(R=N)
T4(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) As can be seen, DecIED instances are sending GOOSE messages in
T5(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) a random order. The time duration from the first to the last DecIED
T7(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
U1(R=Y%DF=N%T=72%IPL=240%UN=0%RIPL=G%RID=G%RIPCK=G%
on average was 0.067s in the case of 50 instances. When we run
RUCK=6339%RUD=I)
IE(R=Y%DFI=N%T=72%CD=Z)
200 instances, the duration becomes 0.51s on average. This may
Mininet IED SEQ( SP=106 %GCD=1% ISR=10E%TI=Z %CI=I%II=I% TS=8 ) be caused by the limitation in the number of concurrent processes
OPS(O1=M5B4ST11NW9%O2=M5B4ST11NW9%O3=M5B4NNT11NW9% as well as the single NIC (network interface controller). However,
O4=M5B4ST11NW9%O5=M5B4ST11NW9%O6=M5B4ST11) the IED’s operation typically involves interaction with physical
WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120) systems, and actuation latency will be involved. For instance, to
ECN(R=Y%DF=Y%T=40%W=7210%O=M5B4NNSNW9%CC=Y%Q=) open/close circuit breaker, based on our observation in the testbed,
T1(R=Y% DF=Y%T=40 %S=O%A=S+%F=AS%RD=0%Q=) it takes in the order of second, which outweighs the aforementioned
T2(R=N)
T3(R=N) timing difference.
T4(R=Y% DF=Y%T=40 %W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
Because we were not able to conduct experiments emulating
T5(R=Y% DF=Y%T=40 %W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
the breaker failure scenario on EPIC testbed, we cannot compare
T6(R=Y% DF=Y%T=40 %W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
T7(R=Y% DF=Y%T=40 %W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
DecIED with the real IED deployed there. However, one measure-
U1(R=Y% DF=N%T=40%IPL=164 %UN=0%RIPL=G%RID=G%RIPCK=G% ment in a similar setting was found in [63], which showed that
RUCK=G%RUD=G ) the latency of between the receipt of alarm and announcement of
IE(R=Y%DFI=N% T=40%CD=S ) circuit breaker status update measured on a real, commercial IED
was 783.385ms on average with standard deviation 125.277ms. By
configuring artificial delay on DecIED, we can overlap this duration
7.2 Indistinguishability in Communication with the real IED to make them indistinguishable. As future work,
Models we plan to conduct rigorous evaluations in terms of similarity in
In this section we present the network traffic generated by our communication patterns and behaviors, once we establish our own
DecIED prototype as a preliminary evaluation. According to the testbed for measurements.
specification (see also Section 3), DecIED generates periodic GOOSE
7.3 Scalability (and sequentially to fly under the radar), the success probability for
In order to evaluate the scalability of DecIED, we conducted ex- him is 𝑘1 . In other words, the probability that the first attempt is
periments to run a different number of DecIED instances on an flagged by our deception appliance is 1 − 𝑘1 , which is translated, in
industrial with varying resource configuration. Our evaluation here the case of 20-anonymity setup, to 95%.
is based on whether DecIED instances can generate the expected It might be argued that a committed attacker would send the
number of periodic GOOSE messages (e.g., 3 GOOSE messages for same malicious commands (in particular, control commands) to all
each interval per instance). If the number of observed GOOSE mes- of them, including a base IED and DecIED instances. If all com-
sages is significantly below the expected number, we conclude that mands are sent out at the same time, the malicious control command
the number of DecIED instances exceeds the capacity. would be executed before being reported by DecIED. However, such
We have conducted a series of experiments with different num- a traffic pattern (i.e., simultaneously sending the same commands to
bers of DecIED instances for 6 minutes with various periodic GOOSE multiple DecIED instances) can be detected or blocked by intrusion
messaging interval (5, 3, and 1 second(s)). 5-second interval is the detection/prevention systems. If the commands are sent sequen-
default interval used in libIEC61850 [8] while 3-second interval is tially, DecIED still can report the incident before the base IED is
found in EPIC testbed [6]. All the GOOSE messages are captured by affected by the attacker’s command as discussed earlier, by work-
Wireshark, and the numbers of messages observed in each second ing with, for instance, intrusion prevention systems. We note that
are recorded. We ran all experiments on 3 industrial PCs: “high”- DecIED is not intended to be a standalone, self-contained security
end one with Intel Core i7-7700 and 32GB RAM, “middle”-end one solution. The primary purpose of DecIED is enhancing capability
with Intel Core i7-3610QE with 16GB RAM, and “low”-end one with to capture activities by attackers in pre-attack phase, and, DecIED
Intel Celeron J1900 with 4GB RAM. The results are summarized can increase the probability of detection.
in Figure 6. In the figure, solid and dashed lines represent ethe As discussed in Section 5, by overhearing broadcast process-bus
xpected number of GOOSE messages per second, and in order to communication (IEC 61850 GOOSE and SV), DecIED shares power
judge the scalability, we evaluated whether DecIED instances are grid status and measurements with the real IED, and thus, DecIED
catching up with this expected rate. For instance, in the case of can generate the traffic like the real IED in both station bus (IEC
1-second interval, high-end and middle-end ones can support up 61850 MMS) and process bus (IEC 61850 GOOSE). Given that our
to 200 instances while with 5-second interval, they support up to attacker model does not exclude attackers who can access to the
500 instances and even the low-end one can support 200 instances. process-bus network, let us discuss the case where attackers may
The max number of instances supported for each setting as well as inject maliciously-crafted messages there. Even when an attacker
resource consumption are summarized in Table 3. at process bus would inject fake GOOSE or SV messages, because
Combined with the observation in Section 7.2, we claim that at DecIED is designed to process the message according to the same
least 200 DecIED instances can be run on a single industrial PC logic as the real IED, the impact of such messages is the same on
without losing indistinguishability in the communication models, both, which thus makes them indistinguishable. Note that detection
which meets our design goal. or prevention of malicious message injection itself is not the goal
of the deception technology. It is possible to implement some sort
Table 3: Summary of Scalability Evaluation of bad data detection mechanism on the DecIED appliance, and it
Time In- PC Grade Number of CPU Usage Memory Usage is part of our future work.
terval(s) DecIEDs Regarding the countermeasures against device/OS fingerprinting,
"high" 200 61% 0.3226% there are other types of techniques, such as ones based on latency
1 "medium" 200 99.1% 1.3548% between a certain request and response [31] and clock skew [36].
"low" 50 99.4% 2.7027% We admit that Honeyd is not the universal solution to counter them.
"high" 450 66% 1.5974% For instance, to counter latency-based fingerprinting, we need to
3 "medium" 350 99.4% 2.3226% carefully measure and model the latency of the real device, and the
"low" 50 99.8% 3.2432% countermeasure for the latter may require radical implementation
"high" 500 70% 1.631% change. Evaluation with such techniques and implementation of
5 "medium" 500 98.9% 3.1613%
the evading mechanism is part of our future work.
"low" 100 99% 5.6757%
In our prototype implementation, we focused on popular logic
related to circuit breaker control. There should be other logic as-
7.4 Security Discussion sociated with other types of power grid physical components, and
Our goal in this paper is to practically implement deception IEDs studying feasibility to implement such logic is part of our future
that offer “𝑘-anonymous smokescreen” to deceive such attackers. work. However, circuit breakers are one of the most critical power
If we configure 20-anonymity (e.g., by deploying 200 DecIED in- grid components that significantly influence power grid stability,
stances for EPIC testbed [6]), attackers in the substation system and it is usually the first priority for attackers, as was the case in
(either at station bus or process bus) will see 20 devices that look Ukraine power plant attack [66]. Thus, our proof-of-concept fo-
and behave indistinguishably. Thus, passive attackers cannot distin- cused on circuit breaker control still demonstrates the feasibility to
guish which of the 20 devices is the real IED and cannot learn which implement additional lines of defence of real-world importance. Val-
one to target when he mounts an attack against the infrastructure. idation of a real power grid system under various attack scenarios
An attacker may send out innocuous control commands for probing. is planned in our future work.
When an attacker sends an IEC 61850 MMS commend randomly
The scalability tests
900
expected rate for T=1s
expected rate for T=3s
expected rate for T=5s
800 observed rate for "high", time interval=1s
observed rate for "middle",time interval=1s
expected and observed rate (number of packets / second)
400
300
200
100
0
50 100 150 200 250 300 350 400 450 500
The number of DecIEDs
Figure 6: Scalability evaluation with different GOOSE messaging interval (T) in different industrial PCs