SCADA Cyber Security Testbed Development
SCADA Cyber Security Testbed Development
Abstract- New technologies are increasing the vulnerability B. Future SCADA Architecture
of the power system to cyber security threats. Dealing with ...
these threats and determining vulnerabilities is an important task
for utilities. This paper presents the development of a testbed
Presen ilities are tructurediverydier
have been in the past. The transmission system allows open
an they
designed to assess the vulnerabilities introduced by using public access, meaning that anyone owning a generator is allowed
networks for communication. to supply power to the grid. Markets have been set up to
decide which generators are used instead of the utility owning
I. INTRODUCTION generation and determining dispatch. These changes mean
The proliferation of new computer technologies in the power the transmission system is used in a very different way. The
system has brought many advantages and risks. Increasingly, changes in the operation of the transmission system make it
powerful computers are becoming prevalent not just in control more important to securely share data among system operators,
centers in offices but also in the field in the form of IEDs while ensuring that only the appropriate market insensitive
(Intelligent Electronic Devices). These new devices allow for data can be accessed by marketeers. Thus, the restructuring of
efficient network based communications, the use of next gen- the utility industry has resulted in the need for varying levels
eration Supervisory Control and Data Acquisition (SCADA) of information access [1].
protocols, and more intelligent behavior. Unfortunately, using There is also a shift in the nature of SCADA systems.
these new devices also has a down side. Using standard The old-style vendor-specific SCADA protocols are being
networks and protocols opens the devices to possible cyber replaced by next generation standards based protocols like
attacks. IEC 61850. These next generation protocols are based on a
To address these new vulnerabilities, the TCIP (Trustworthy common information models (CIM) [2]. Common information
Cyber Infrastructure for the Power grid) project has been models are used to associate devices with services. This kind
started under the ITI (Information Trust Institute). TCIP is an of abstraction, made possible by the improved computational
NSF funded project consisting of researchers in various areas power of new SCADA hardware, allows for useful features like
of computer security and power systems. device discovery. Instead of micro-controller based hardware
Determining the vulnerabilities of systems using these programmed in assembly language, present day hardware
devices is a complicated process because of the complex runs more advanced real-time operating operating systems
hardware and software interactions that must be considered. (e.g. real-time Linux and vxWorks) [3]. Not only are the
One approach is to build a comparatively simple system that protocols and hardware changing, but the communications
captures the relevant complexity, i.e., a testbed. This work first links are evolving as well. Expensive dedicated phone lines
presents motivations for developing a testbed in the form of a and microwave links are being replaced by data networks [4].
brief review of cyber security basics. Next, several components C. Threats
developed for use in the testbed environment are discussed. In
the final section, the pieces are put together and a simulation There are many threats facing critical infrastructure today.
Of a cyber attack scenario is presented. Currently, the most famous threats are the threats posed by
terrorist groups and hostile nation states. These are organized
II. CYBER SECURITY BACKGROUND groups with a clear goal and some level of sophistication.
A. Traditional SCADA Architecture There is also a threat posed by a company's own employ-
ees. Company insiders have access to internal controls and
Historically electric utilities have been regulated, vertically data, and, either by accident or malicious intent, can cause
integrated monopolies. One company owned and controlled equipment outages. A third category of threat is the threat
everything from the generators to the distribution system. posed by casual hackers, known as "script kiddies". These are
Utilities knew their systems very well and data was shared people without great computer ability who download and use
only on a limited basis. SCADA systems often communicated prepackaged tools.
Over dedicated communication links like phone lines and mi-
crowave radio links. The SCADA system hardware possessed D. Vulnerabilities
limited processing power and often utilized vendor-specific The term vulnerabilities is used to refer to equipment that is
protocols. vulnerable to attack. This notion is distinct from threats. For
483
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
example, a vulnerability would be a hole in the fence, whereas 2) Capabilities: The client currently has the following key
a threat would be the person who wants to get through the capabilities:
fence. Power systems face a new array of cyber vulnerabilities . The client provides a graphical view of power system
as new equipment, running more standard, real-time operating states. The information used to drive the display is
systems, is phased in. These standard operating systems are obtained via TCP/IP from a server (see Section III-C
subject to a greater number of well known attacks. The below for a description of the protocol used). This mimics
Cyber Emergency Response Team (CERT) has been tracking a control room display that is obtaining SCADA data
computer vulnerabilities since the late 1980s. Their statistics from the power grid over a communications network.
show that the number of vulnerabilities has been increasing . The ability to control (rather than simply view) power
dramatically in recent years [5]. system elements is also a key component of real power
system operation. The client supports control actions,
E. Countermeasures such as opening and closing of lines, in addition to simple
To address vulnerabilities present in the power system, the isplay of data.
All data displayed on the client must first be communi-
North American Reliability Council (NERC), working with
the Department of Energy and the Department of Homeland cated over the network from the server to the client. This
Security and their Canadian counterparts, has developed a set decoupling of the display (the network client) from the
data source (the PowerWorld server) enables independent
ofcye seurt
standards....
[6]. These standards are a protocol
requiring companies to identify their vulnerabilities and risks
modification
m and testing of the display, communications
and take steps to mitigate them. This is done in several networks, and power system without affecting other com-
steps. First, the impact of the loss of assets is determined. ponents of the testing environment.
Next, the standard calls for the identification of vulnerabilities. An individual client can access any number of servers,
with a highly configurable scheduling mechanism for
Then, using this information,
. '. . ' companies
can preform risk
.................. . retrieving data. Data retrieval from the server can be
analysis to decide which vulnerabilities are most important aycrono ini.ta retr to oc t regular te
to protect against. Finally, companies decide which defenses
are most cost effective and begin to implement them. Common
intervals. By setting the intervals between retrievals to
defences against cyber attacks include application of firewalls a very small value, it is easy to stress the underlying
and authentication methods [7]. Peer-to-peer overlay routing is communications system to examine bandwidth effects.
another possible defence against Distributed Denial of Servce Suort for maor oeratin sstems Windows Mac OS
(DDoS) attacks [8]. X, Linux)
A sample screen shot of the network client displaying retrieved
III. SIMULATION ARCHITECTURE data for a 7 bus system is shown in Figure 1.
A. Network Client B. PowerWorld Server
1) Purpose: The PowerWorld server serves two purposes
1)ons Purpose.oThplemenetw
client provides several key func-
Q01 MW
i_ 4 Bus 5
-0c& deg. C-'.-
1i01 p_u.
Bu!3~/ Bus~
Bu5~~~~~~~~~~~~~ 4'~~~~~~~~~~~~..
E3u57
7 ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~.vq ~~~~~A..CBF' ;r
Fig. 1. Network client screenshot - opening a line in a 7 bus case Fig. 2. PowerWorld server screenshot -serving data for a 7 bus case
484
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
advantage of the advanced modeling facilities built into - Viewer iSSFNet Network Simulator
the PowerWorld Simulator [9] software. database Emam
The server provides the SCADA data that would typically S U ,,,
be fed into a control center display (represented by the Internet -=:
client). The server provides the simulated data to the DataSeret Simulator
client over a TCP/IP network using a custom networking Manager
protocol (see Section III-C below). 1RNSELbackup instance
2) Controls. The server also accepts control commands
sent by clients, e.g., the opening and closing of lines. The
server continuously solves the power flow, so network flow
impacts are instantly solved and propagated to all connected
clients. The ability to accept control commands from the client Fig. 3. RINSE Architecture
allows us to study the effects of various network attacks on
control actions.
Clients run Network Viewer which connects to the database
3) Data Provided: The server currently provides the fol- through the Data Server and gives each client a separate
lowing data to clients: view of the simulated network. This view the portion of
is
* Bus voltage magnitude and phase angle the simulated network the client is interested in and is able
* Line status to interact with. This feature can be used in exercises like
* Line flow the October 2003 Livewire cyber war exercise which was
* Generator status conducted by the Department of Homeland Security [12].
A sample screen shot of the PowerWorld server providing 2) Capabilities: In addition to parallel real-time large-
client data on the 7 bus case is shown in Figure 2. scale simulation, RINSE is capable of multi-resolution traffic
C. Client-Server Protocol simulation, meaning it can simulate traffic with varying levels
of detail. This makes it suitable for simulating high-volume
The protocol used for communicating between the client traffic and attacks. When traffic is presented and simulated
and server is a simple request/response protocol which uses in a multi-resolution fashion, traffic with important dynamic
the TCP/IP networking protocols. All network communication behavior (foreground traffic) is simulated with high-resolution
is initiated by the client, which can either send or receive an packet-level details whereas traffic showing other activities in
arbitrary amount of data in a single session. the network (background traffic) is simulated using a coarse-
grained fluid model [13] [14] . RINSE uses both resolutions
for different traffic at the same time [15], coupled with a
1) Purpose: The Real-time Immersive Network Simulation fixed point solution technique, resulting in several orders of
Environment for Network Security Exercises (RINSE) is a tool magnitude speed-up in simulation [16] [17]. For attack traffic
for realistic emulation of large networks as well as network (e.g., Denial of Service (DoS) attacks) the details of the traffic
transactions, attacks, and defenses [10]. are of little importance and we are only interested in the
RINSE has unique capabilities which make it suitable for coarse behavior (volume of the traffic). Therefore, a coarser,
cyber security and game-playing exercises including large- multi-resolution model is used to increase the efficiency of
scale real-time human/machine-in-the-loop network simulation simulation and to make real-time simulation possible [18].
support, multi-resolution network traffic models, and novel Another important feature of the RINSE architecture is
routing simulation techniques. the Network Viewer which gives clients the ability to have
RINSE consists of five components: different views of the simulated network and also to issue com-
* the iSSFNet network simulator, mands to the simulator (Figure 4). Five types of commands
* the Simulator Database Manager, are currently supported:
* a database, . Attacks: for initiating attacks (particularly DDoS attacks)
* the Data Server, in the network.
* and client-side Network Viewers . Defenses: for applying countermeasures against attacks.
The internal architecture of RINSE is shown in Figure 3. These commands include filtering packets at routers
The iSSFNet is the core network simulator which is built which can mitigate attack effects.
on top of the Scalable Simulation Framework (iSSF), an . Diagnostic Tools: which simulate common networking
Application Programming Interface (API) for parallel large- utilities such as ping.
scale simulation [11]. In this architecture, the Simulation . Device Controls: for controlling individual devices in the
Database Manager is responsible for collecting simulation data network.
from simulator nodes and putting it into the database. In . Simulator Data: for controlling the output of the simula-
the RINSE architecture, many simulator nodes can work in tor.
parallel to support large-scale real-time network simulation. RINSE is also capable of emulation, i.e., it can represent
485
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
RINSE +VPN Server
Network Cliert
PowerWorld Server
Prox + VPN Ci ent
tunland injesCtsA
thminodtels sModulao usin eomunlato
th PoferWbudsesr1,e2
Forit this scenari, the loadfi pokeenthcnsst
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
Packet Drop Percentage
100/
2 /0Atc
= 80 starts /
6M Th90 , 0/7MWc6 70 -
ZX \ Filtering
69 MW
15 Mvar 3
0 Mvar
S
200 MW4\ 5
\|fgXf O Mvar y a.> 60 )/ i
\starts
g~- 40-
r )30
20-
Fig. 6. Scenario one-line diagram 90 MW bus 1 load o0 - :
Time (s)
- - No Attack -Attack w/o Filter - -Attack with Filter
89MW
16 Mvar
1
3
175 Mvar
200 MW
Fig. 9. Packet drop percentage in simulated network for a lOOs run
141 Mvar
487
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:20 from IEEE Xplore. Restrictions apply.
V. CONCLUSION [4] R. McClanahan, "IEEE industry applications magizine," Mar.-Apr. 2003.
[5] C. E. R. Team. (2006) Cert/cc statistics 1988-2006. [Online]. Available:
The experiment presented in this paper uses the network http://www.cert.org/stats
client to act as a control station, the PowerWorld server to act [6] N. A. E. R. Council. (2006) Critical infrastructure protection. [Online].
as the power system, and RINSE to act as the communication Available: http://www.nerc.com/cip.html
network. This experiment demonstrated the vulnerability of the [7] J. Pollet, "Developing a solid scada security strategy," in Proc. Sensors
for Industry Conference, Houston, TX, USA, 2002, pp. 148-156.
network client to a DDoS attack and the ability of filtering to [8] J. J. Farris and D. M. Nicol, "Evaluation of secure peer-to-peer overlay
mitigate an attack. The attack prevented data from being trans- routing for survivable scada systems," in Proceedings of the 2004 Winter
Simulation Conference, Washington D.C.,USA, Dec. 2004.
mitted across the network, causing the control display to dis- [9] PowerWorld Corporation. [Online]. Available: http://www.powerworld.
play incorrect data. So far this work presents a testbed created com
using only software. The next step is to more accurately model [10] M. Liljenstam, J. Liu, D. Nicol, Y Yuan,, G. Yan, and C. Grier, "Rinse:
the real-time immersive network simulation environment for network
the SCADA system by incorporating actual hardware (RTUs, security exercises," in In Workshop on Principles of Advanced and
relays, etc.) in the simulations. Using the protocol converter Distributed Simulation, 2005.
it is possible already to interface with devices communicating [11] J. Cowie, D. Nicol, and A. Ogielski, "Modeling the global internet,"
using the ModbusTCP protocol. Work is ongoing to implement Computing in Science and Engineering, vol. 1, pp. 42-50, Jan. 1999.
using the ModbusTCP Work Is ongoing to implement [12] A. Press. (2003, Nov.) T. bridis. gov't simulates terrorist cyberattack.
next generation protocols and to extend the functionality of the [Online]. Available: http://www.zone-h.org/en/news/-read/id=3728
network client and PowerWorld server (e.g., provide more data [13] B. Liu, D. R. Figueiredo, Y Guo, J. Kurose, and D. Towsley, "A
and more control commands). In its final form, the testbed will study of networks simulation efficiency: Fluid simulation vs. packet-
level simulation," in In Proceedings of IEEE Infocom, Apr. 2001.
consist of computer simulations, hardware, and people acting [14] G. Kesidis, A. Singh, D. Cheung, and W. Kwok, "Feasibility of
as controllers. fluid-driven simulation for atm network," in In Proceedings of IEEE
Globecom, Nov. 1996.
ACKNOWLEDGMENT [15] D. Nicol and G. Yan, "Discrete event fluid modeling of background
tcp traffic," ACM Transactions on Modeling and Computer Simulation,
The authors would like to thank the NSF for their support vol. 14, pp. 1-39, July 2004.
under award number CNS-0524695. [16] D. Nicol, J. Liu, M. Liljenstam, and G. Yan, "Simulation of large-scale
networks using ssf," in In Winter Simulation Conference (WSC), Dec.
REFERENCES 2003.
[17] D. Nicol and G. Yan, "Simulation of network traffic at coarse time-
[1] G. Zecevic and Z. Jovanovic, "Company intranet access to scada scales," in In Workshop on Principles of Advanced and Distributed
information," in Proc. Budapest International Conference on Electric Simulation, 2005.
Power Engineering, New York City, USA, Aug. 1999, p. 121. [18] , "Discrete event fluid modeling of background tcp traffic," in Proc.
[2] G.-S. Kim and H.-H. Lee, "A study on iec 61850 base communication ACM Workshop on Rapid Malcode, Oct. 2003.
for intellegent electronic devices," in Proc. IEEE 9th Russian-Korean [19] Modbus-IDA. (2005) Modbus-ida:the architecture for distributed
International Symposium on Science and Technology, vol. 1, Novosi- automation. [Online]. Available: http://www.modbus.org
birsk,Russia, Jun.-Jul. 2005, pp. 765-770. [20] D. Wimberger. (2004) jamod. [Online]. Available: http://jamod.
[3] C. Bowen, T. Buennemeyer, and R. Thomas, "Next generation scada sourceforge.net
security: Best practices and client puzzles," in Proc. IEEE Workshop
on Information Assurance and Security, vol. 1, United States Military
Academy, West Point, NY, 2005, pp. 426-427.
488
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:20 from IEEE Xplore. Restrictions apply.