Attacks/Breaches
5/14/2013
02:10 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Algorithm Lets SCADA Devices Detect, Deflect Attacks

Embedded software prototype operates under the 'new normal' that many SCADA environments have already been breached

Researchers have built a prototype that lets SCADA devices police one another in order to catch and cut off a fellow power plant or factory floor device that has been compromised.

The so-called secure distributed control methodology outfits SCADA systems, such as robots or PLCs, with embedded software that uses a specially created algorithm to detect devices behaving badly. The software, which was developed by researchers at NC State University with funding from the National Science Foundation, detects and then isolates a neighboring device that has been compromised.

It uses a reputation manager for the devices, so that if one robot or PLC starts doing something it's not supposed to do -- or exceeds a certain threshold such as improperly accelerating or slowing its speed -- fellow robots or other devices detect the uncharacteristic behavior, sound an alarm, and cut it off from their operations to minimize or stop any damage.

This peer-level SCADA security would augment existing and emerging SCADA security products and features, the researchers say. The algorithm could be added into existing software in control systems, with some minor coding modifications, according to the researchers.

"Commercial SCADA security uses a police car and travels and monitors the area. Ours is more like a community [neighborhood] watch," says Mo-Yuen Chow, a professor of electrical and computer engineering at NC State and co-author of the research. "Each of the devices watch each other and talk to [their] neighbor."

It's a next-generation security technology for the new normal of assuming you've been breached and focusing on minimizing any damage. "Our [technology] assumes the attack is already [occurring] and the device is already compromised," says Wente Zeng, an NC State Ph.D. student who worked on the prototype. "After that, it [focuses on] how can we still make sure the rest of the system can work well" and uninterrupted, he says.

[Industrial control systems vendors are starting to patch security bugs, but actually installing the fixes can invite more trouble. See The SCADA Patch Problem.]

Each local SCADA device monitors the others so that if one device behaves abnormally, the others shut down its communications, Zeng explains. "So we can isolate the attack from the system."

The researchers ran a simulation with robots outfitted with the embedded software and controller. "If one robot is compromised, it will affect other robots, so some of them would go to the wrong place," Zeng says. "With our code, each is monitoring each other, so if this robot behaves weirdly," it is cut off, he says. "There's a controller on the robot ... and they talk to each other with the simple algorithm."

The researchers say they plan to patent the algorithm and explore commercialization prospects for the technology.

But distinguishing between normal and abnormal behavior isn't always so straightforward, and sophisticated attackers could find ways to taint the information in some way, according to some security experts.

The NC State researchers will present their technical paper, "Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS" (PDF), later this month at the IEEE International Symposium on Industrial Electronics in Taipei, Taiwan.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jsabini102
50%
50%
jsabini102,
User Rank: Apprentice
5/17/2013 | 1:57:45 AM
re: New Algorithm Lets SCADA Devices Detect, Deflect Attacks
Neat work as an extension of BFT algos. I wonder how the equlibrium among nodes is maintained I can see some stochastic filtering but it's a bit mysterious as my thesis adviser used to say.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.