SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Enhancing Cyber Security in Industrial
Control Systems and Critical Infrastructure
with Dynamic Endpoint Modeling
Executive summary
Cyber attacks against Industrial Control
Systems (ICS) are on the rise, putting na-
tions’ critical infrastructure at risk. In a par-
adigm shift from the traditional network
security systems, a new approach — Dy-
namic Endpoint Modeling — learns and
models the behavior of all devices on the
network and triggers alerts when algo-
rithms detect changes in learned behavior.
by Daniel Paillet
Schneider Electric White Paper 2
Dynamic End Point Modeling for Securing Industrial Control Systems and Critical Infrastructure
As the barriers between Information Technology (IT) and Operations Technology
(OT) disappear, Industrial Control Systems (ICS) environments are increasingly
exposed to cyber attacks. The U.S. Department of Homeland Security’s ICS Cyber
Emergency Response Team noted a 20% increase in ICS-related attacks in 2015,
across a wide range of industry sectors. See Figure 1. As supervisory control and
data acquisition (SCADA) systems, distributed control systems (DCS), and other
control systems become connected to the Internet to allow greater business
efficiency (remote process monitoring, system maintenance, process control and
production data analysis), they also make the business more vulnerable to threats.
with the potential to seriously affect a nation’s critical ICS and power infrastructure.1
This paper discusses a newly emerging technology that could be of great benefit in
adding a layer of cyber security as well as a cost-effective solution in securing
critical infrastructure networks: Dynamic Endpoint Modeling.
1
http://www.reuters.com/article/us-usa-cybersecurity-infrastructure-idUSKCN0UR2CX20160113
http://www.claimsjournal.com/news/national/2016/01/20/268254.htm
http://www.v3.co.uk/v3-uk/news/2399334/us-industrial-control-systems-attacked-245-times-in-12-
months
Introduction
Figure 1
Breakdown by sector of
ICS cyber attacks in the
United States in 2015
Schneider Electric White Paper 3
Dynamic End Point Modeling for Securing Industrial Control Systems and Critical Infrastructure
Dynamic Endpoint Modeling is a unique technology that constructs a software-
based model of a network and its devices, learning the roles and behaviors of all
the endpoints on the network. Dynamic Endpoint Modeling is a paradigm shift from
the traditional network security systems. Dynamic Endpoint Modeling is not:
• a firewall protecting the network perimeter
• a signature or anomaly-based Intrusion Detection System
• a web application (Layer 7) firewall filtering network flows
• reliant on host agents
Dynamic Endpoint Modeling performs a passive collection of IP (Internet protocol)
“metadata,” which includes IP addresses, ports, and other flags, from the network.
Typically, network Dynamic Endpoint Modeling has sensors connected to a switch
or a stack of switches. These switches are configured, depending on the vendor,
with a port set to spanning or mirroring to provide data flows from the switches to
the sensors. Importantly, this is a one-way data connection. Once the data is
received by the sensor, it extracts the metadata and forwards it to the modeling
analysis and subsequently to a dashboard for user analysis. To allow for these
communications, one network port on the sensor is configured in promiscuous
mode for collecting data, while the other port is configured for forwarding this data
to a dashboard residing in the cloud.
Dynamic Endpoint Modeling learns and models the behavior of all devices on the
network, including how the device connects, to where, what and to whom a connec-
tion is made. It establishes a baseline behavioral model, and any changes that
divert from the baseline will alert that a possible compromise or malicious activity
has occurred on the endpoint. Dynamic Endpoint Modeling does not depend on
payloads or known signatures to determine anomalies. Therefore, it is not ham-
pered by encryption, unlike traditional Intrusion Detections Prevention Systems
(IDPS) and Next-Generation Firewalls.
Dynamic Endpoint Modeling sends real-time alerts when a system or systems
diverge from learned roles or when suspicious traffic is detected, and uses the
following five analysis dimensions when building its behavioral models:
1. ROLE Dynamic algorithms are used to recognize device roles to analyze and
detect activities that divert from the learned baseline.
2. GROUP Algorithms assess the devices for known learned behavior by com-
paring them to other like devices.
3. CONSISTENCY Algorithms detect when a device has changed from its
known behavior, including traffic streams and access.
4. RULES Algorithms detect changes in known patterns by endpoints such as
protocols, ports, and blacklisting communications.
5. FORECAST Algorithms forecast learned behavior from past behavior and
analysis. An assessment is performed against the learned systems for predic-
tive forecasting.
The aforementioned security dimensions allow the Dynamic Endpoint Modeling
system to know when a new device appears on the network or accesses the
Internet for the first time. It also alerts if a device behaves outside the learned
behavior patterns on the network. This can be important especially if an ICS device
is accessible from the Internet, since legacy ICS devices are susceptible to attacks
Dynamic End-
point Modeling
explained
Related resource
For more information on
network intrusion detection
systems, see the Schneider
Electric white paper Network
Intrusion Detection Systems for
Critical Infrastructure
Schneider Electric White Paper 4
Dynamic End Point Modeling for Securing Industrial Control Systems and Critical Infrastructure
due to their lack of cyber security robustness. Figure 2 shows the placement of the
endpoint modeling sensors in an Industrial Control System Network.
Endpoint Modeling offers a quick and cost-effective deployment in a passive mode
without any impact to network performance. Unlike traditional Intrusion Detection
Preventions Systems, the skill sets needed to deploy and maintain such a solution
are not demanding, and the costs for implementing are extremely cost effective.
Also unlike these legacy security approaches, endpoint modeling is very low noise,
thereby minimizing distraction. This solution provides another dimension to a well-
planned defense-in-depth strategy.
About the author
Daniel Paillet is currently Cyber Security Lead Architect within the Schneider Electric, Partner
Business. His background includes working in the US Department of Defense on various security
projects. He has over 15 years of security experience in Information Technology, Operational
Technology, Retail, Banking and Point-of-Sale. He holds the CISSP, CEH and other agnostic and
vendor specific certifications. His current role is to architect, improve, and develop secure
solutions and offerings within Schneider Electric.
Figure 2
Placement of the
endpoint modeling
sensors in an ICS
network.
Conclusion
998-2095-05-17-16AR0©2016SchneiderElectric.Allrightsreserved.

Mais conteúdo relacionado

Mais de Mead O'Brien, Inc.

Steam Trapping and Steam Tracing Equipment
Steam Trapping and Steam Tracing EquipmentSteam Trapping and Steam Tracing Equipment
Steam Trapping and Steam Tracing Equipment
Mead O'Brien, Inc.
 

Mais de Mead O'Brien, Inc. (20)

Intrusive vs. Non-Intrusive Electric Actuators: Which option is right for you...
Intrusive vs. Non-Intrusive Electric Actuators: Which option is right for you...Intrusive vs. Non-Intrusive Electric Actuators: Which option is right for you...
Intrusive vs. Non-Intrusive Electric Actuators: Which option is right for you...
 
Industrial Boiler and Burner Limit Control Switches
Industrial Boiler and Burner Limit Control SwitchesIndustrial Boiler and Burner Limit Control Switches
Industrial Boiler and Burner Limit Control Switches
 
Metso Neles Flow Control Solutions: Valves, Actuation, and Automation
Metso Neles Flow Control Solutions: Valves, Actuation, and AutomationMetso Neles Flow Control Solutions: Valves, Actuation, and Automation
Metso Neles Flow Control Solutions: Valves, Actuation, and Automation
 
Ashcroft Corrosion Guide
Ashcroft Corrosion GuideAshcroft Corrosion Guide
Ashcroft Corrosion Guide
 
How Your Steam Trap Selection Affects Your Bottom Line Profits: Inverted Buck...
How Your Steam Trap Selection Affects Your Bottom Line Profits: Inverted Buck...How Your Steam Trap Selection Affects Your Bottom Line Profits: Inverted Buck...
How Your Steam Trap Selection Affects Your Bottom Line Profits: Inverted Buck...
 
Steam Trapping and Steam Tracing Equipment
Steam Trapping and Steam Tracing EquipmentSteam Trapping and Steam Tracing Equipment
Steam Trapping and Steam Tracing Equipment
 
Limitorque WG Series Installation, Operation, and Maintenance
Limitorque WG Series Installation, Operation, and MaintenanceLimitorque WG Series Installation, Operation, and Maintenance
Limitorque WG Series Installation, Operation, and Maintenance
 
Metso Neles T5 Series Top Entry Rotary Ball Valves
Metso Neles T5 Series Top Entry Rotary Ball ValvesMetso Neles T5 Series Top Entry Rotary Ball Valves
Metso Neles T5 Series Top Entry Rotary Ball Valves
 
Foxboro IMT23 Transmitter Operation, Configuration, and Calibration
Foxboro IMT23 Transmitter Operation, Configuration, and CalibrationFoxboro IMT23 Transmitter Operation, Configuration, and Calibration
Foxboro IMT23 Transmitter Operation, Configuration, and Calibration
 
Water Cooled Portable Air Conditioners
Water Cooled Portable Air ConditionersWater Cooled Portable Air Conditioners
Water Cooled Portable Air Conditioners
 
VERIS Accelabar Flow Meter
VERIS Accelabar Flow MeterVERIS Accelabar Flow Meter
VERIS Accelabar Flow Meter
 
Limitorque QX Electronic Actuator User Instructions
Limitorque QX Electronic Actuator User InstructionsLimitorque QX Electronic Actuator User Instructions
Limitorque QX Electronic Actuator User Instructions
 
Steam Conservation Guidelines for Condensate Drainage
Steam Conservation Guidelines for Condensate DrainageSteam Conservation Guidelines for Condensate Drainage
Steam Conservation Guidelines for Condensate Drainage
 
Neles Triple Eccentric Disc Valve, Metal Seated with Flow Balancing Trim
Neles Triple Eccentric Disc Valve, Metal Seated with Flow Balancing TrimNeles Triple Eccentric Disc Valve, Metal Seated with Flow Balancing Trim
Neles Triple Eccentric Disc Valve, Metal Seated with Flow Balancing Trim
 
Wireless Steam Trap Monitor: Theory of Operation
Wireless Steam Trap Monitor: Theory of OperationWireless Steam Trap Monitor: Theory of Operation
Wireless Steam Trap Monitor: Theory of Operation
 
Explanation of the Types of Pressure Measurements Used in Process Control
Explanation of the Types of Pressure Measurements Used in Process ControlExplanation of the Types of Pressure Measurements Used in Process Control
Explanation of the Types of Pressure Measurements Used in Process Control
 
NRC Course on Motor Operated Valves and Limitorque
NRC Course on Motor Operated Valves and LimitorqueNRC Course on Motor Operated Valves and Limitorque
NRC Course on Motor Operated Valves and Limitorque
 
Foxboro Pneumatic Instruments
Foxboro Pneumatic InstrumentsFoxboro Pneumatic Instruments
Foxboro Pneumatic Instruments
 
Steam Trap Testing Guide for Energy Conservation
Steam Trap Testing Guide for Energy ConservationSteam Trap Testing Guide for Energy Conservation
Steam Trap Testing Guide for Energy Conservation
 
Basic Heat Transfer Concepts
Basic Heat Transfer ConceptsBasic Heat Transfer Concepts
Basic Heat Transfer Concepts
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Último (20)

Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

Enhancing Cyber Security in Industrial Control Systems and Critical Infrastructure with Dynamic Endpoint Modeling

  • 1. Enhancing Cyber Security in Industrial Control Systems and Critical Infrastructure with Dynamic Endpoint Modeling Executive summary Cyber attacks against Industrial Control Systems (ICS) are on the rise, putting na- tions’ critical infrastructure at risk. In a par- adigm shift from the traditional network security systems, a new approach — Dy- namic Endpoint Modeling — learns and models the behavior of all devices on the network and triggers alerts when algo- rithms detect changes in learned behavior. by Daniel Paillet
  • 2. Schneider Electric White Paper 2 Dynamic End Point Modeling for Securing Industrial Control Systems and Critical Infrastructure As the barriers between Information Technology (IT) and Operations Technology (OT) disappear, Industrial Control Systems (ICS) environments are increasingly exposed to cyber attacks. The U.S. Department of Homeland Security’s ICS Cyber Emergency Response Team noted a 20% increase in ICS-related attacks in 2015, across a wide range of industry sectors. See Figure 1. As supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control systems become connected to the Internet to allow greater business efficiency (remote process monitoring, system maintenance, process control and production data analysis), they also make the business more vulnerable to threats. with the potential to seriously affect a nation’s critical ICS and power infrastructure.1 This paper discusses a newly emerging technology that could be of great benefit in adding a layer of cyber security as well as a cost-effective solution in securing critical infrastructure networks: Dynamic Endpoint Modeling. 1 http://www.reuters.com/article/us-usa-cybersecurity-infrastructure-idUSKCN0UR2CX20160113 http://www.claimsjournal.com/news/national/2016/01/20/268254.htm http://www.v3.co.uk/v3-uk/news/2399334/us-industrial-control-systems-attacked-245-times-in-12- months Introduction Figure 1 Breakdown by sector of ICS cyber attacks in the United States in 2015
  • 3. Schneider Electric White Paper 3 Dynamic End Point Modeling for Securing Industrial Control Systems and Critical Infrastructure Dynamic Endpoint Modeling is a unique technology that constructs a software- based model of a network and its devices, learning the roles and behaviors of all the endpoints on the network. Dynamic Endpoint Modeling is a paradigm shift from the traditional network security systems. Dynamic Endpoint Modeling is not: • a firewall protecting the network perimeter • a signature or anomaly-based Intrusion Detection System • a web application (Layer 7) firewall filtering network flows • reliant on host agents Dynamic Endpoint Modeling performs a passive collection of IP (Internet protocol) “metadata,” which includes IP addresses, ports, and other flags, from the network. Typically, network Dynamic Endpoint Modeling has sensors connected to a switch or a stack of switches. These switches are configured, depending on the vendor, with a port set to spanning or mirroring to provide data flows from the switches to the sensors. Importantly, this is a one-way data connection. Once the data is received by the sensor, it extracts the metadata and forwards it to the modeling analysis and subsequently to a dashboard for user analysis. To allow for these communications, one network port on the sensor is configured in promiscuous mode for collecting data, while the other port is configured for forwarding this data to a dashboard residing in the cloud. Dynamic Endpoint Modeling learns and models the behavior of all devices on the network, including how the device connects, to where, what and to whom a connec- tion is made. It establishes a baseline behavioral model, and any changes that divert from the baseline will alert that a possible compromise or malicious activity has occurred on the endpoint. Dynamic Endpoint Modeling does not depend on payloads or known signatures to determine anomalies. Therefore, it is not ham- pered by encryption, unlike traditional Intrusion Detections Prevention Systems (IDPS) and Next-Generation Firewalls. Dynamic Endpoint Modeling sends real-time alerts when a system or systems diverge from learned roles or when suspicious traffic is detected, and uses the following five analysis dimensions when building its behavioral models: 1. ROLE Dynamic algorithms are used to recognize device roles to analyze and detect activities that divert from the learned baseline. 2. GROUP Algorithms assess the devices for known learned behavior by com- paring them to other like devices. 3. CONSISTENCY Algorithms detect when a device has changed from its known behavior, including traffic streams and access. 4. RULES Algorithms detect changes in known patterns by endpoints such as protocols, ports, and blacklisting communications. 5. FORECAST Algorithms forecast learned behavior from past behavior and analysis. An assessment is performed against the learned systems for predic- tive forecasting. The aforementioned security dimensions allow the Dynamic Endpoint Modeling system to know when a new device appears on the network or accesses the Internet for the first time. It also alerts if a device behaves outside the learned behavior patterns on the network. This can be important especially if an ICS device is accessible from the Internet, since legacy ICS devices are susceptible to attacks Dynamic End- point Modeling explained Related resource For more information on network intrusion detection systems, see the Schneider Electric white paper Network Intrusion Detection Systems for Critical Infrastructure
  • 4. Schneider Electric White Paper 4 Dynamic End Point Modeling for Securing Industrial Control Systems and Critical Infrastructure due to their lack of cyber security robustness. Figure 2 shows the placement of the endpoint modeling sensors in an Industrial Control System Network. Endpoint Modeling offers a quick and cost-effective deployment in a passive mode without any impact to network performance. Unlike traditional Intrusion Detection Preventions Systems, the skill sets needed to deploy and maintain such a solution are not demanding, and the costs for implementing are extremely cost effective. Also unlike these legacy security approaches, endpoint modeling is very low noise, thereby minimizing distraction. This solution provides another dimension to a well- planned defense-in-depth strategy. About the author Daniel Paillet is currently Cyber Security Lead Architect within the Schneider Electric, Partner Business. His background includes working in the US Department of Defense on various security projects. He has over 15 years of security experience in Information Technology, Operational Technology, Retail, Banking and Point-of-Sale. He holds the CISSP, CEH and other agnostic and vendor specific certifications. His current role is to architect, improve, and develop secure solutions and offerings within Schneider Electric. Figure 2 Placement of the endpoint modeling sensors in an ICS network. Conclusion 998-2095-05-17-16AR0©2016SchneiderElectric.Allrightsreserved.