SlideShare uma empresa Scribd logo
1 de 26
North American collaborations via
INSPIRE/MASSIF

Luigi Romano
CINI (Consorzio Interuniversitario Nazionale per
l’Informatica)
luigi.romano@uniparthenope.it
     Internet of Services 2011: Collaboration meeting for FP7 projects
                    International Collaboration session
                        Brussels September 29, 2011
Roadmap

 Evidence that Critical Infrastructures (CIs) are vulnerable
 to cyber-attacks
    Focus on Power Grids, but true in general
 How we combined detection, diagnosis, and remediation
 for protecting CIs from cyber-attacks
    The INSPIRE project
 Our experience with International cooperation initiatives
    The INSPIRE INCO project
 Collaboration objectives
    The MASSIF project
 Contact Info
Evidence
that Critical Infrastructures
are vulnerable to cyber-attacks
Basic Concepts

 Power Grid (tentative definition): an interconnected
 network for delivering electricity from suppliers to
 consumers, which is synchronous with a given phase
 Phasor: complex number that represents both the
 magnitude and the phase angle of the sine waves found
 in electricity
 Synchro-Phasors: phasor measurements that occur at
 the same time
 Phasor Measurement Unit (PMU): device which
 collects Synchro-Phasors to determine the health of the
 power grid (using a GPS radio clock)
Results in a nutshell

                               1
                                               Administrator

                2                                              4
                                        LAN




Power       Synchro Phasor                            Phasor
 Grid           device     3                     Data Concentrator

 1) Password Eavesdropping
 2) Weak Policies on Password selection/maintenance, device
    fingerprinting possible (and relatively easy)
 3) Unreliable channels (wrt both integrity and availability)
 4) Poor input validation
Security Analysis of a commercial Synchro-
Phasor - Passwords

 Password Management
   Multilevel Security:
   0, 1, B, P, A, O, 2, C
   After a pre-defined time, security level is downgraded to 0
   (def. 5 min)
 Security evaluation results
   Default passwords are simple and can be found in most
   common dictionaries
   No constraints for password selection
       All levels can share the same password
        No aging mechanism
   All passwords can be manually reset
Security Analysis of a commercial Synchro-
Phasor - Communication

 Communications are in clear: ftp, telnet, IEEE C37.118,
 proprietary protocols
    Passwords can be easily intercepted
    Data can be easily intercepted
    Data can be altered
                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   2b   40   00   80 06 62 50 c0 a8 01 01 c0 a8   .).+@...bP......
                                 0020   01   02   04   76   00   17   a8 64 9c b4 11 74 59 af 50 18   ...v...d...tY.P.
                                 0030   00   fe   22   b0   00   00   54                              .."...T

                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   2e   40   00   80 06 62 4d c0 a8 01 01 c0 a8   .)..@...bM......
                                 0020   01   02   04   76   00   17   a8 64 9c b5 11 74 59 b0 50 18   ...v...d...tY.P.
                                 0030   00   fe   35   ae   00   00   41                              ..5...A

                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   2f   40   00   80 06 62 4c c0 a8 01 01 c0 a8   .)./@...bL......
                                 0020   01   02   04   76   00   17   a8 64 9c b6 11 74 59 b1 50 18   ...v...d...tY.P.
                                 0030   00   fe   2d   ac   00   00   49                              ..-...I

                                 0000   00   30   a7   02   1c   52   00 1d 92 9c 23 7c 08 00 45 00   .0...R....#|..E.
                                 0010   00   29   15   31   40   00   80 06 62 4a c0 a8 01 01 c0 a8   .).1@...bJ......
                                 0020   01   02   04   76   00   17   a8 64 9c b7 11 74 59 b2 50 18   ...v...d...tY.P.
                                 0030   00   fe   2a   aa   00   00   4c                              ..*...L
SQL Injection attack
 to an Open Source PDC
protected override void ProcessMeasurements(IMeasurement[] measurement {
               foreach (IMeasurement measurement in measurements)
               {
                   // Create the command string to insert the measurement as a
   record in the table.
                   StringBuilder commandString = new
            StringBuilder ("INSERT INTO Measurement VALUES ('");
                   commandString.Append (measurement.SignalID);
                   commandString.Append ("','");
                   commandString.Append ((long)measurement.Timestamp);
                   commandString.Append ("',");
                   commandString.Append (measurement.AdjustedValue);
                   commandString.Append (')');

                  MySqlCommand command = new MySqlCommand
   (commandString.ToString(),
   m_connection);
                  command.ExecuteNonQuery();
              }
              m_measurementCount += measurements.Length;
          }
If you don’t trust me ... then trust them
How we combined detection,
diagnosis, and remediation for
protecting CIs from cyber-
attacks
Typical architecture of a
SCADA system
A bird’s eye view of INSPIRE
 Peer-to-peer
  overlays



                                   P2P
                          MPLS
                                         Wireless Sensor
                                            Networks




                Offline Security
                  Framework
INSPIRE main results

 Analyzed vulnerabilities which affect SCADA systems
 Analyzed dependencies between CIs and the underlying
 communication networks
 Designed a self-reconfigurable architecture, suited for
 SCADA systems
 Developed diagnosis and recovery techniques, suited for
 SCADA systems
 Provided SCADA traffic with Quality of Service (QoS)
 guarantees
Our experience with
International cooperation
initiatives
INSPIRE-INCO in a nutshell

 Proposal: 248737
 Acronym: INSPIRE-International (Cooperation)
 Program: FP7
 Call: FP7-ICT-2009-4
 Funding scheme: Small or medium-scale focused
 research project -STREP - CP-FP-INFSO
 Duration: 12 months (October 1, 2009 - September 30,
 2010)
 Activity: ICT-4-9.2 - Supplements to support International
 Cooperation between ongoing projects
The Consortium

 Europe (INSPIRE):
   CINI, Consorzio Interuniversitario Nazionale per l’Informatica -
   Coordinator (Italy)
   TUD, Technical University of Darmstadt (Germany)
   ITTI, ITTI Sp.zo.o. (Poland)


 http://www.inspire-strep.eu/

  US (GridStat):
    WSU, Washington State University (USA)

 http://www.gridstat.net/
The Funding Scheme

                        Funding for International             Funding for Research:
Funding for Research:
                             Cooperation:                       EC Grant 225553
 NSF Grant 0326006
                        Extension to NSF Grant
                               0326006
                                              Funding for
                                               Mobility:
                                            EC Grant 248737
Mutual Benefits – Sharing Data




  INSPIRE Experimental Testbed
Mutual Benefits – Sharing
Experiences
Mutual Benefits – Sharing Ideas
The MASSIF project
 Multi-domain
parallel-running                                                                                                 Alert and reaction
  processes          Highly-scalable, dependable and                     Predictive security analysis               generation
                        multi-level event collection
                                                                                                                                            Actions and
                                                                                                                                             Counter-
                                                                                                                                             measures




Olympic Games                                                                                               Trustworthy event collection

                                                                     Multi-level security event modeling

                                  Languages
                                                                                                                                              Security
                                                                                                                                            analysis and
                       EVENTS           POLICIES                                                                                             notification
 Mobile money
transfer service                RELATIONS          REACTIONS




                                Multi-level event
                                                                             Process and attack
                                  correlation
                                                                                 simulation
                                                                                                                Resilient framework
  CI Process                                                                                                       architecture
 Control (Dam)                                                                                                                             Security-aware
                                                                                                                                             processes




    Managed
Enterprise Service           Event and                                Event, Process Models and
 Infrastructures       Information Collection                               Attack Models

                                                               Resilient event processing and integration
  Scenarios
  Prototypes                                             Advanced SIEM Framework
Collaboration Status

 Luigi Romano and Salvatore D'Antonio, participated
 in the "Trustworthy Networks and Services" session
 on March 24th with two talks, titled "Detection,
 Diagnosis, and Remediation: Three Pillars for
 Protecting Critical Infrastructures from Cyber-
 Attacks" and "Effective Countermeasures Against
 Emerging Threats in the Future Internet" .
 Bell Canada has shown great interest in the MASSIF
 Project and Craig Gibson (Senior Security Advisor)
 joined the MASSIF Technical Advisory Board
Collaboration Status


 Craig Gibson Proposed potential use cases for
 the MASSIF project:

 Craig Gibson participated MASSIF EB Meeting
 in Naples 14-15 September providing early
 feedbacks about the project and proposing to
 extend the scope of MASSIF to wireless,
 wireline, video and mobile applications.
Collaborations Plan

     Among the scenarios proposed by Bell Canada we plan
     to investigate the consequences of GPS spoofing
     against Synchrophasor devices.
  GPS satellite




GPS spoofer
                  GPS receiver
                                                Internet

                                 SyncroPhasor
                                                           DB
Contact Info
More Info

Luigi Romano
  luigi.romano@uniparthenope.it
  The Fault and Intrusion Tolerant Networked SystemS
  (FITNESS)
  research group Web site:
http://www.dit.uniparthenope.it/FITNESS/


The INSPIRE and INSPIRE INCO project Web sites:
  http://www.inspire-strep.eu
  http://www.inspire-inco.eu/

   The MASSIF project Web site:
   http://www.massif-project.eu

Mais conteúdo relacionado

Semelhante a North American collaborations via INSPIRE/MASSIF

Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent MonitoringIntelie
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldIRJET Journal
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningIRJET Journal
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET Journal
 
IRJET - Bridge Monitoring System using IoT
IRJET -  	  Bridge Monitoring System using IoTIRJET -  	  Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoTIRJET Journal
 
Capacity Planning for Linux Systems
Capacity Planning for Linux SystemsCapacity Planning for Linux Systems
Capacity Planning for Linux SystemsRodrigo Campos
 
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNINGA SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNINGIRJET Journal
 
Aplications for machine learning in IoT
Aplications for machine learning in IoTAplications for machine learning in IoT
Aplications for machine learning in IoTYashesh Shroff
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET Journal
 
Automated traffic sign board
Automated traffic sign boardAutomated traffic sign board
Automated traffic sign boardijcsa
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET Journal
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET Journal
 
IRJET- Public Garden Automation System
IRJET-  	  Public Garden Automation SystemIRJET-  	  Public Garden Automation System
IRJET- Public Garden Automation SystemIRJET Journal
 
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 

Semelhante a North American collaborations via INSPIRE/MASSIF (20)

Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent Monitoring
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time World
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine Learning
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb People
 
IRJET - Bridge Monitoring System using IoT
IRJET -  	  Bridge Monitoring System using IoTIRJET -  	  Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoT
 
Capacity Planning for Linux Systems
Capacity Planning for Linux SystemsCapacity Planning for Linux Systems
Capacity Planning for Linux Systems
 
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNINGA SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
A SURVEY ON KIDNEY STONE DETECTION USING IMAGE PROCESSING AND DEEP LEARNING
 
Aplications for machine learning in IoT
Aplications for machine learning in IoTAplications for machine learning in IoT
Aplications for machine learning in IoT
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
AF-2599-P.docx
AF-2599-P.docxAF-2599-P.docx
AF-2599-P.docx
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
 
Automated traffic sign board
Automated traffic sign boardAutomated traffic sign board
Automated traffic sign board
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga Instructor
 
IRJET- Public Garden Automation System
IRJET-  	  Public Garden Automation SystemIRJET-  	  Public Garden Automation System
IRJET- Public Garden Automation System
 
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 

Último

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Último (20)

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

North American collaborations via INSPIRE/MASSIF

  • 1. North American collaborations via INSPIRE/MASSIF Luigi Romano CINI (Consorzio Interuniversitario Nazionale per l’Informatica) luigi.romano@uniparthenope.it Internet of Services 2011: Collaboration meeting for FP7 projects International Collaboration session Brussels September 29, 2011
  • 2. Roadmap Evidence that Critical Infrastructures (CIs) are vulnerable to cyber-attacks Focus on Power Grids, but true in general How we combined detection, diagnosis, and remediation for protecting CIs from cyber-attacks The INSPIRE project Our experience with International cooperation initiatives The INSPIRE INCO project Collaboration objectives The MASSIF project Contact Info
  • 3. Evidence that Critical Infrastructures are vulnerable to cyber-attacks
  • 4. Basic Concepts Power Grid (tentative definition): an interconnected network for delivering electricity from suppliers to consumers, which is synchronous with a given phase Phasor: complex number that represents both the magnitude and the phase angle of the sine waves found in electricity Synchro-Phasors: phasor measurements that occur at the same time Phasor Measurement Unit (PMU): device which collects Synchro-Phasors to determine the health of the power grid (using a GPS radio clock)
  • 5. Results in a nutshell 1 Administrator 2 4 LAN Power Synchro Phasor Phasor Grid device 3 Data Concentrator 1) Password Eavesdropping 2) Weak Policies on Password selection/maintenance, device fingerprinting possible (and relatively easy) 3) Unreliable channels (wrt both integrity and availability) 4) Poor input validation
  • 6. Security Analysis of a commercial Synchro- Phasor - Passwords Password Management Multilevel Security: 0, 1, B, P, A, O, 2, C After a pre-defined time, security level is downgraded to 0 (def. 5 min) Security evaluation results Default passwords are simple and can be found in most common dictionaries No constraints for password selection All levels can share the same password No aging mechanism All passwords can be manually reset
  • 7. Security Analysis of a commercial Synchro- Phasor - Communication Communications are in clear: ftp, telnet, IEEE C37.118, proprietary protocols Passwords can be easily intercepted Data can be easily intercepted Data can be altered 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 2b 40 00 80 06 62 50 c0 a8 01 01 c0 a8 .).+@...bP...... 0020 01 02 04 76 00 17 a8 64 9c b4 11 74 59 af 50 18 ...v...d...tY.P. 0030 00 fe 22 b0 00 00 54 .."...T 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 2e 40 00 80 06 62 4d c0 a8 01 01 c0 a8 .)..@...bM...... 0020 01 02 04 76 00 17 a8 64 9c b5 11 74 59 b0 50 18 ...v...d...tY.P. 0030 00 fe 35 ae 00 00 41 ..5...A 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 2f 40 00 80 06 62 4c c0 a8 01 01 c0 a8 .)./@...bL...... 0020 01 02 04 76 00 17 a8 64 9c b6 11 74 59 b1 50 18 ...v...d...tY.P. 0030 00 fe 2d ac 00 00 49 ..-...I 0000 00 30 a7 02 1c 52 00 1d 92 9c 23 7c 08 00 45 00 .0...R....#|..E. 0010 00 29 15 31 40 00 80 06 62 4a c0 a8 01 01 c0 a8 .).1@...bJ...... 0020 01 02 04 76 00 17 a8 64 9c b7 11 74 59 b2 50 18 ...v...d...tY.P. 0030 00 fe 2a aa 00 00 4c ..*...L
  • 8. SQL Injection attack to an Open Source PDC protected override void ProcessMeasurements(IMeasurement[] measurement { foreach (IMeasurement measurement in measurements) { // Create the command string to insert the measurement as a record in the table. StringBuilder commandString = new StringBuilder ("INSERT INTO Measurement VALUES ('"); commandString.Append (measurement.SignalID); commandString.Append ("','"); commandString.Append ((long)measurement.Timestamp); commandString.Append ("',"); commandString.Append (measurement.AdjustedValue); commandString.Append (')'); MySqlCommand command = new MySqlCommand (commandString.ToString(), m_connection); command.ExecuteNonQuery(); } m_measurementCount += measurements.Length; }
  • 9. If you don’t trust me ... then trust them
  • 10. How we combined detection, diagnosis, and remediation for protecting CIs from cyber- attacks
  • 11. Typical architecture of a SCADA system
  • 12. A bird’s eye view of INSPIRE Peer-to-peer overlays P2P MPLS Wireless Sensor Networks Offline Security Framework
  • 13. INSPIRE main results Analyzed vulnerabilities which affect SCADA systems Analyzed dependencies between CIs and the underlying communication networks Designed a self-reconfigurable architecture, suited for SCADA systems Developed diagnosis and recovery techniques, suited for SCADA systems Provided SCADA traffic with Quality of Service (QoS) guarantees
  • 14. Our experience with International cooperation initiatives
  • 15. INSPIRE-INCO in a nutshell Proposal: 248737 Acronym: INSPIRE-International (Cooperation) Program: FP7 Call: FP7-ICT-2009-4 Funding scheme: Small or medium-scale focused research project -STREP - CP-FP-INFSO Duration: 12 months (October 1, 2009 - September 30, 2010) Activity: ICT-4-9.2 - Supplements to support International Cooperation between ongoing projects
  • 16. The Consortium Europe (INSPIRE): CINI, Consorzio Interuniversitario Nazionale per l’Informatica - Coordinator (Italy) TUD, Technical University of Darmstadt (Germany) ITTI, ITTI Sp.zo.o. (Poland) http://www.inspire-strep.eu/ US (GridStat): WSU, Washington State University (USA) http://www.gridstat.net/
  • 17. The Funding Scheme Funding for International Funding for Research: Funding for Research: Cooperation: EC Grant 225553 NSF Grant 0326006 Extension to NSF Grant 0326006 Funding for Mobility: EC Grant 248737
  • 18. Mutual Benefits – Sharing Data INSPIRE Experimental Testbed
  • 19. Mutual Benefits – Sharing Experiences
  • 20. Mutual Benefits – Sharing Ideas
  • 21. The MASSIF project Multi-domain parallel-running Alert and reaction processes Highly-scalable, dependable and Predictive security analysis generation multi-level event collection Actions and Counter- measures Olympic Games Trustworthy event collection Multi-level security event modeling Languages Security analysis and EVENTS POLICIES notification Mobile money transfer service RELATIONS REACTIONS Multi-level event Process and attack correlation simulation Resilient framework CI Process architecture Control (Dam) Security-aware processes Managed Enterprise Service Event and Event, Process Models and Infrastructures Information Collection Attack Models Resilient event processing and integration Scenarios Prototypes Advanced SIEM Framework
  • 22. Collaboration Status Luigi Romano and Salvatore D'Antonio, participated in the "Trustworthy Networks and Services" session on March 24th with two talks, titled "Detection, Diagnosis, and Remediation: Three Pillars for Protecting Critical Infrastructures from Cyber- Attacks" and "Effective Countermeasures Against Emerging Threats in the Future Internet" . Bell Canada has shown great interest in the MASSIF Project and Craig Gibson (Senior Security Advisor) joined the MASSIF Technical Advisory Board
  • 23. Collaboration Status Craig Gibson Proposed potential use cases for the MASSIF project: Craig Gibson participated MASSIF EB Meeting in Naples 14-15 September providing early feedbacks about the project and proposing to extend the scope of MASSIF to wireless, wireline, video and mobile applications.
  • 24. Collaborations Plan Among the scenarios proposed by Bell Canada we plan to investigate the consequences of GPS spoofing against Synchrophasor devices. GPS satellite GPS spoofer GPS receiver Internet SyncroPhasor DB
  • 26. More Info Luigi Romano luigi.romano@uniparthenope.it The Fault and Intrusion Tolerant Networked SystemS (FITNESS) research group Web site: http://www.dit.uniparthenope.it/FITNESS/ The INSPIRE and INSPIRE INCO project Web sites: http://www.inspire-strep.eu http://www.inspire-inco.eu/ The MASSIF project Web site: http://www.massif-project.eu