SCADA Forensics
SCADA Forensics
SECURITY STRATEGIES
FOR SCADA NETWORKS
Abstract SCADA systems have historically been isolated from other computing
resources. However, the use of TCP/IP as a carrier protocol and the
trend to interconnect SCADA systems with enterprise networks intro-
duce serious security threats. This paper describes two strategies for
securing SCADA networks, both of which have been implemented in
a laboratory-scale Modbus network. The first utilizes a security ser-
vices suite that minimizes the impact on time-critical industrial process
systems while adhering to industry standards. The second engages a
sophisticated forensic system for SCADA network traffic collection and
analysis. The forensic system supports the post mortem analysis of secu-
rity breaches and the monitoring of process behavior to optimize plant
performance.
1. Introduction
Industrial control systems, also known as SCADA systems, typically in-
corporate sensors, actuators and control software that are deployed in widely
dispersed locations. SCADA systems originally employed relatively primitive
serial protocols and communications infrastructures to link SCADA compo-
nents and to transport control and data messages. Also, they favored oper-
ational requirements over security because SCADA equipment was physically
and logically isolated from other networks.
To increase efficiency, enhance interconnectivity, and leverage COTS (com-
mercial off-the-shelf) hardware and software, most major industrial control pro-
tocols now include standards for transporting SCADA messages using TCP/IP.
The Modbus-TCP and DNP3-over-LAN/WAN specifications are a clear indi-
cation that TCP/IP is becoming the predominant carrier protocol in modern
SCADA networks. Meanwhile, TCP/IP is also facilitating interconnections
Chandia, R., Gonzalez, J., Kilpatrick, T., Papa, M. and Shenoi, S., 2008, in IFIP Interna-
tional Federation for Information Processing, Volume 253, Critical Infrastructure Protection,
eds. E. Goetz and S. Shenoi; (Boston: Springer), pp. 117–131.
118 CRITICAL INFRASTRUCTURE PROTECTION
communicate with each other using the management network, and with the
plant (Sites A to F) and other SCADA networks using SCADA servers. De-
pending on their lower-level protocols, SCADA servers are usually implemented
with vendor-specific software and their services are often based on the OPC
standard [8].
A control network (e.g., Control Network A) has three types of components:
control devices, I/O devices and a SCADA gateway. Control devices, which
include programmable logic controllers (PLCs), remote terminal units (RTUs),
input/output controllers (IOCs) and intelligent electronic devices (IEDs), im-
plement the process control logic. These devices interface with and manipulate
I/O devices (sensors and actuators). Sensors measure specific process parame-
ters (e.g., temperature or pressure). Actuators perform control actions (e.g.,
open or close a valve) to effect the desired changes to the process parameters.
A SCADA gateway interfaces control network components that cannot com-
municate directly with the SCADA server. Depending on its functionality, any
control device can serve as a SCADA gateway. Special units called front-end
processors (FEPs) are commonly used as SCADA gateways in industrial control
environments.
Human operators in the control center use human machine interfaces (HMIs)
to interact with industrial process systems. Engineering workstation operators,
on the other hand, have more authority over the SCADA network; they can
reconfigure HMIs and control devices, and modify control algorithms (e.g.,
ladder logic).
120 CRITICAL INFRASTRUCTURE PROTECTION
A database housed in the control center records data about process parame-
ters and control actions. Engineering workstation and HMI operators interact
with the database to access and modify process data and control variables. His-
torians archive data about SCADA network activities, including sensor data,
control actions initiated by engineering workstation and HMI operators, and
management network logs.
The management network contains various shared resources (e.g., printers,
fax machines and file servers), but these are typically not considered part of the
SCADA network. However, it is increasingly common for corporate networks
to interconnect with SCADA networks.
and plant performance evaluations. In fact, our architecture makes use of the
regularity of traffic in SCADA networks to minimize the volume of data col-
lected for forensic analysis and incident response.
Network
Traffic
Agent
Traffic Buffer
Configuration
Machine
Synopsis Machine
Connection Machine
Data Configuration
Warehouse Interface
tate robust querying, a Level 0 data warehouse must be connected to the data
warehouses of the individual SCADA networks using an isolated network.
The storage machine uses hash tables and a relational database. Each regis-
tered agent has a set of hash tables, which are used to index repetitive signature
data associated with an agent. For example, partial synopses generated during
communications between two devices with largely static-address-oriented data
need not be stored more than once. Instead, a pointer to the entry is used as
the signature (stored in the database) for identifying the communication. The
number of tables associated with an agent depends on the types and quantity
of synopses generated by the agent.
The query interface supports incident reconstruction, system checking and
process trend analysis. The interface provides two SQL-based querying mech-
anisms. One uses a GUI and pre-defined options for routine analysis. The
other provides a console that gives analysts more freedom to specify queries.
Results are presented in reports augmented with graphical information about
the SCADA network, including its component systems, devices and agents.
The query processor fields queries received from a local query interface or
from another SCADA network via the connection machine. The processor
determines whether or not the resolution of the query involves information from
another SCADA network. If this is the case, a query is sent to the appropriate
data warehouse, which in turn dynamically generates and processes a query
whose response is returned to the sender.
6. Conclusions
The security strategies discussed in this paper are promising because they
balance assurance and performance while adhering to SCADA protocols and
standards. The security services solution can be systematically integrated
into process control networks as part of a risk management process without
130 CRITICAL INFRASTRUCTURE PROTECTION
Acknowledgements
This work was partially supported by the Institute for Information Infrastruc-
ture Protection (I3P) under Award 2003-TK-TX-0003 from the Science and
Technology Directorate of the U.S. Department of Homeland Security.
References
[1] American Gas Association, Cryptographic Protection of SCADA Com-
munications; Part 1: Background, Policies and Test Plan, AGA Report
No. 12 (Part 1), Draft 5, Washington, DC (www.gtiservices.org/security/
AGA12Draft5r3.pdf), 2005.
[2] American Gas Association, Cryptographic Protection of SCADA Com-
munications; Part 2: Retrofit Link Encryption for Asynchronous Serial
Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC
(www.gtiservices.org/security/aga-12p2-draft-0512.pdf), 2005.
[3] American Petroleum Institute, API 1164: SCADA Security, Washington,
DC, 2004.
[4] M. Berg and J. Stamp, A reference model for control and automation sys-
tems in electric power, Technical Report SAND2005-1000C, Sandia Na-
tional Laboratories, Albuquerque, New Mexico, 2005.
[5] British Columbia Institute of Technology, Good Practice Guide on Fire-
wall Deployment for SCADA and Process Control Networks, National
Infrastructure Security Co-ordination Centre, London, United Kingdom,
2005.
[6] E. Byres, J. Carter, A. Elramly and D. Hoffman, Worlds in collision: Eth-
ernet on the plant floor, Proceedings of the ISA Emerging Technologies
Conference, 2002.
[7] E. Byres, M. Franz and D. Miller, The use of attack trees in assessing
vulnerabilities in SCADA systems, Proceedings of the International In-
frastructure Survivability Workshop, 2004.
[8] E. Byres and T. Nguyen, Using OPC to integrate control systems from
competing vendors, Proceedings of the Canadian Pulp and Paper Associa-
tion Technical Conference, 2000.
[9] D. Davis and R. Swick, Network security via private key certificates, Op-
erating Systems Review, vol. 24, pp. 64–67, 1990.
[10] J. Graham and S. Patel, Security considerations in SCADA communication
protocols, Technical Report TR-ISRL-04-01, Intelligent System Research
Laboratory, Department of Computer Engineering and Computer Science,
University of Louisville, Louisville, Kentucky, 2004.
Chandia, Gonzalez, Kilpatrick, Papa & Shenoi 131