SCADA Grid Security Issues v1
SCADA Grid Security Issues v1
1 Introduction
Computer systems and networks constitute a fundamental component of Critical Infrastructure; therefore electronic attacks are
considered nowadays a severe threat. Comprised of fields such as government services, telecommunications, banking and finance,
electrical power, oil and gas refining systems, water supply, transportation and emergency services, Critical Infrastructure is one
of the most important factors supporting a nation's life. Due to its extreme importance Critical Infrastructure could become a
target of antagonists who, besides physical attacks employing traditional weapons, may also use electronic attacks to destroy a
nation's source of living.
These considerations along with actualities such as cyber terrorism make Critical Infrastructure Protection a National Security
issue. SCADA systems are widely deployed in Critical Infrastructure industries where they provide remote supervisory and
control. Despite the relevant importance of SCADA security, SCADA systems are reported to be vulnerable to electronic attacks.
Taking into account the wide deployment of networking technologies in SCADA and a high connectivity of SCADA networks
with other networks such as the corporate intranet or even the internet, SCADA systems are exposed to electronic attacks
nowadays more than ever. For the purpose of implementing an efficient defense of SCADA and Process Control Systems in
general it is necessary to research on novel security approaches, implement them and carefully measure their suitability in terms
of efficiency and overhead.
The figure above gives a general layout of a SCADA system. SCADA (Supervisory Control and Data Acquisition) is a collection
of systems that measure, report, and change in real-time both local and geographically remote distributed processes. It is a
combination of telemetry and data acquisition that enables a user to send commands to distant facilities and collect data from
them. The fundamental components in the above figure are the control center usually computer-based, referred to as MTU
(Master Terminal Unit), RTU (Remote Terminal Unit) or also called as field site, and the communication link between them. The
basic functions MTU issues commands to distant facilities and gathers data from them, interacts with other systems in the
corporate intranet for administrative purposes and interfaces with human operators. In a SCADA system it is the MTU which has
full control on distributed remote processes. An operator can interface with a MTU through an interface device consisting in a
video display unit, a keyboard, etc. Control commands sent by a MTU to distant facilities are triggered by programs in that MTU
which are executed either manually or through a programmable built-in scheduler.
The field sites mentioned above is an integral component of SCADA and is referred to as RTUs (Remote Terminal Units). RTUs
are generally based on microprocessors and are physically placed in remote locations. Their task consists in controlling and
acquiring data from devices such as sensors, actuators, controllers, pulse generators, etc. An MTU communicates with one or
more remote RTUs by sending requests for information that those RTUs gather from devices, or instructions to take an action
such as open and close valves, turn switches on and off, etc. The communications between a MTU and RTUs follow a master-
slave schema, in which the MTU is a master and RTUs are slaves, and only the MTU is allowed to initiate a transaction.
3 SCADA Architecture in detail
Denial of service (DoS): SCADA software could be vulnerable to DoS attacks, resulting in the prevention of authorized
access to a system resource or delaying system operations and functions. They could proactively exploit software bugs
and other vulnerabilities in various systems, either in the corporate network or the SCADA network, to gain
unauthorized access to places such as control center networks, SCADA systems, interconnections, and access links.
Cyber-attacks that are based on denial of service (DoS) mechanisms, and others that spread due to viruses and worms by
causing a traffic avalanche in short durations, can potentially bring down systems and cause a disruption of services and
are known as Flood-based Cyber Attack Types.
Intrusion detection/prevention software not installed: Incidents can result in loss of system availability; the capture,
modification, and deletion of data; and incorrect execution of control commands. IDS/IPS software may stop or prevent
various types of attacks, including DoS attacks, and also identify attacked internal hosts, such as those infected with
worms. IDS/IPS software must be tested prior to deployment to determine that it does not compromise normal operation
of the SCADA.
Malware protection software not installed, definitions not current, implemented without exhaustive testing:
Malicious software can result in performance degradation, loss of system availability, and the capture, modification, or
deletion of data. Malware protection software, such as antivirus software, is needed to prevent systems from being
infected by malicious software. Outdated malware protection software and definitions leave the system open to new
malware threats. Malware protection software deployed without testing could impact normal operation of the SCADA.
The SCADA systems are built using public or proprietary communication protocols which are used for communicating between
an MTU and one or more RTUs. The SCADA protocols provide transmission specifications to interconnect substation computers,
RTUs, IEDs, and the master station. The most common protocol is DNP3 or Distributed Network Protocol Version 3.3. It was
developed to achieve interoperability among systems in the electric utility.
The following list presents features of DNP3 that provide benefits to the user:
Open standard
Interoperability between multi-vendor devices
A protocol that is supported by a large and increasing number of equipment manufacturers
Layered architecture conforming to IEC enhanced performance architecture model
Optimized for reliable and efficient SCADA communications
Supported by comprehensive implementation testing standards
The ability to select from multiple vendors for future system expansion and modification
Passive Network Reconnaissance: An attacker with the appropriate access captures and analyzes DNP3 messages. This
attack provides the attacker with information about network topology, device functionality, memory addresses and other
data.
Baseline Response Replay: An attacker with knowledge of normal DNP3 traffic patterns simulates responses to the
master while sending fabricated messages to outstation devices.
Rogue Interloper: An attacker installs a “man-in-the-middle” device between the master and outstations that can read
modify and fabricate DNP3 messages and/or network traffic.
Length Overflow and DFC Flag Attack: These attacks either inserts an incorrect value in the Length field that affects
message processing or sets the DFC flag, which causes an outstation device to appear busy to the master. These attacks
can result in data corruption, unexpected actions and device crashes.
Reset Function and unavailable function Attack: This attack sends a DNP3 message with Function Code 1 (reset user
process) to the targeted outstation. The attack causes the targeted device to restart, rendering it unavailable for a period
of time and possibly restoring it to an inconsistent state. Examples are interruption of an outstation and modification of
an outstation. In unavailable function attack, the attacker sends a DNP3 message with Function Code 14 or 15, which
indicates that a service is not functioning or is not implemented in an outstation device. The attack causes the master not
to send requests to the targeted outstation because it assumes that the service is unavailable.
Destination Address Alteration: By changing the destination address field, an attacker can reroute requests or replies to
other devices causing unexpected results. An attacker can also use the broadcast address 0xFFFF to send erroneous
requests to all the outstation devices; this attack is difficult to detect because (by default) no result messages are returned
to a broadcast request.
Fragmented Message Interruption: The FIR and FIN flags indicate the first and final frames of a fragmented message,
respectively. When a message with the FIR flag arrives, all previously-received incomplete fragments are discarded.
Inserting a message with the FIR flag set after the beginning of a transmission of a fragmented message causes the
reassembly of a valid message to be disrupted. Inserting a message with the FIN flag set terminates message reassembly
early, resulting in an error during the processing of the partially-completed message.
Transport Sequence Modification: The Sequence field is used to ensure in-order delivery of fragmented messages. The
sequence number increments with each fragment sent, so predicting the next value is trivial. An attacker who inserts
fabricated messages into a sequence of fragments can inject any data and/or cause processing errors.
Outstation Data Reset: This attack sends a DNP3 message with Function Code 15. The attack causes an outstation
device to reinitialize data objects to values inconsistent with the state of the system. Examples of this attack are
interruption and modification of an outstation.
Outstation Application Termination: This attack sends a DNP3 message with Function Code 18, which is used to
terminate applications running on outstations. A message with this function code causes a device to become
unresponsive to normal requests from the master. Examples of this kind of attacks are interruption and modification of
an outstation.
6 References
1) Guide to Industrial Control Systems (ICS) Security, National Institute of standards and technology.
2) A taxonomy of attacks of the DNP3 protocol, Samuel East, Jonathan Butts, Mauricio Papa and Sujeet Shenoi
3) Critical Infrastructure Protection, Challenges in Securing Control Systems.
4) Investigating the security of Electrical Power Systems SCADA, Edward Chikuni, and Maxwell Dondo.