SlideShare una empresa de Scribd logo
1 de 34
SMART GRID
SECURITY
Who am I ?

   Falgun Rathod
    A Security Researcher
    An Investigator
    Managing Director & Founder – Cyber Octet
    (P) Ltd.
   Co-Chairman – PR Group of Companies
    (Cyber Octet (P) Ltd. & Elecorev Technogies
    (P) Ltd.)
       (IT & Security)       (Electronics & AI)
SCADA
Automated Metering Infra
What‟s a “Smart Grid?”
   Smart Grid is a developing Network of new
    Technologies, equipment, and controls working
    together to respond immediately to our 21st
    Century demand for electricity.
   Technology Used
     Integrated Communication
     Sensing
     Smart Meters
     Phasor Measurement Units
     Advanced Components
     Advanced Control
     Decision Support System
     Smart Power Generation
What‟s a “Smart Grid?”
SmartGrid
GAO Report – Released January 2011
Another View – Smart Grid
   Communications Network
                         Sensors                     Regulatory Policy
                           and                       and Rule- making
                       Grid Control                                                       Enhanced
    Plug In Electric                                                                 Flexibility & Control   Congestion
    Hybrid Vehicles                                                                                          Management

                                                      Guided By…
  Distributed
And Renewable
    Energy
                                                                                                                Energy
                                                       SGCN                                     Results…       Efficiency


       Demand
      Response
                                                     Supported By…
                                                                                                             Data, Analytics,
                                                                                                             and Information
  Smart Meters and
  Communications                                   Security
                                                                     Open and
                                                                     Ubiquitous
                            New                                      Communication
                           Devices                                                                           Voltage
                             and
                           Systems                                                                           Stability
                                      Generation        Custom
                                                      Applications                          Enterprise
                                                                                            Integration
Evolution of Electrical Utility Risks
        PAST                        PRESENT                      NEAR FUTURE
 HARD-WIRED CONTROL             SCADA / RF ENABLED          SMART GRID / RF PERVASIVE


 Most controls are “hard        Intense financial          Control inside-the-home of all
  wired” AND require              pressure to reduce          appliances
  manual intervention             staffing; hence more       Wide use of 802.x, ZigBee, X10
                                  “remote” RF                 methodologies
 Lesser public
  availability of RF             Computerization and RF     Uncertain Software Provenance,
  devices                         control common in all       Packaged Code and Offshore
                                  industries                  Development Zero-Day Attacks
 Little capability for
  damage to or financial         Project implementation     Increased organized crime/
  benefit from RF attacks         excellence not always       terrorist focus
                                  followed by outstanding
 Cost-plus charging – “If        security operations        Potential for damage to, and
  we need it, we‟ll do it! If                                 “net” theft by, every customer
  we can‟t do it, we‟ll buy      SCADA hacking can
  it!”                            cause                      Revenue/Risk Asymmetry for
                                  „ “wholesale” damage        each customer
 Clear regulatory and             to neighborhoods and      Transition to IP and Windows
 financial landscape              equipment                   “Monoculture” for RF devices
                                 Uncertain regulatory,      Increased public and regulatory
                                  audit, and liability        Scrutiny
                                  landscape
GRIDS can be Hacked :P
Overview of Cyber Security – Threats


                                                                Admin        Operator
     Perform
       SQL
                                                                Admin
    ARP Scan
      EXEC
                                                            Opens Email
        Send e-mail
                                                            with Malware
        with malware




                                                                  Acct       Operator
                             Internet



4. 1. Hacker sends anan ARP (Address
    Hacker performs e-mail with malware
    Resolution Protocol) Scan                                                Master
   2.E-mail recipient opens the e-mail and the
                                                                             DB
5. Once the Slaveinstalled quietlyfound, hacker
     malware gets Database is
  3. Using the information command
   sends an SQL EXEC that malware                           Slave Database
     gets, hacker is able to take control of the e-
6. Performs another ARP Scan                                                 RTU
     mail recipient‟s PC!
7. Takes control of RTU
        Example from 2006 SANS SCADA Security Summit, INL
Overview of Cyber Security – Threats

             Cyber
           Penetration
                                Attacker                                     Communications
                             Controls the
                               Performs                                         Network
                                                                                (WAN)
                               Head End
                                Remote
                                   AMCC
Attacker                      Disconnect
                             (Advanced Metering
                             Control Computer)                           Communications
                                                                            Network
                                                                            (WAN)                  Retailers
                                                                                                  3rd Parties



                   AMI WAN      AMI WAN           AMI WAN




                                                                                              Data Management
                                                                                                  Systems
                                                                                                  (MDM/R)



                                                      U N IV ER S IT Y


                                                                                              Example from AMRA
                                                                                              Webinar, Nov ’06
                                                                                              “The Active Attacker”
Cyber Security Challenges


   The challenge is complex and continuously
    changing
   Legacy systems need to be protected
   Number and geographic location of end points
   Relationship to physical security
   Systems are 7x24 and critical
   The human element / social engineering
Cyber Solutions - Defense in Depth
   Perimeter Protection
       Firewall, IPS, VPN, AV
       Host IDS, Host AV
       DMZ
       Physical Security
   Interior Security
       Firewall, IDS, VPN, AV
       Host IDS, Host AV
       IEEE P1711 (Serial Connections)
       NAC
       Scanning                IDS     Intrusion Detection System
                                 IPS     Intrusion Prevention System
   Monitoring
                                 DMZ     DeMilitarized Zone
   Management                   VPN     Virtual Private Network (encrypted)
   Processes                    AV      Anti-Virus (anti-malware)
                                 NAC     Network Admission Control
“LAYERS” OF CONCERN
Physical Layer Security
   Natural Disasters
     Snow  Storms
     Hurricanes
     Solar Flares
     Geomagnetic Storms
     Earthquakes
     Flooding
     Volcanoes


   Recognize that Location of the Smart
    Grid Components Can Be Affected by
    the Surrounding Environment
Physical Layer Security (2)
   Steal the Meters – Sell the Devices




                                RESPONSE: METER “LAST
                                  GASP” ALERTS WHEN
                                    DISCONNECTED
Physical Layer Security (3)
   Tamper with the Meter
     Cause   Meter to Stop Reading - Disconnect
     Cause Meter to Mis-Read (or Reverse)

     Inject Malware

     Modify Encryption

     Modify Authentication Mechanism

      • July 2009 – Black Hat Conference
      • IOActive, Seattle InfoSec Firm
      • Proof of Concept – 24 Hours Caused 15,000 of 22,000
        Home Smart Meters Taken Over by Malware/Worm
Physical & Cyber
   Opening the Meter
     Accessing  Exposed Ports and Connectors
     Intercept Data Between Microcontroller and Radio
   Infrared Port Attack/Hack
Cyber Layer Security
   The Biggest Opportunity for Trouble
   “The Last Mile” Issues
   Remember – Added Complexity Causes Concerns
“Last Mile”
   Broadband Power Line
    Systems
   Power Line Carrier
    Systems
   Public Switched
    Telephone Network
    (PSTN)
   Cat5/6 Network
    Connection
   Radio Frequency
       WiMax
       ZigBee
       6LoWPAN
       802.11x
       Cellular
        (CDMA/EVDO,
         GSM, LTE)
Cyber Attacks
   Remember C I A
       Confidentiality Attacks
           Reading, “Sniffing” the data
       Integrity Attacks
           Changing the Data
       Availability Attacks
           Denial of Service – Prevent Use of Service
Confidentiality Attacks
   Buffer Overflow
        Inject Data that is too “Big” for the Meter/System
        Predominantly Caused by Bad Software Development
   Snooping / Sniffing
        Reading / Capturing the Data between Meter and Collector and Vice Versa
        Also Internal to Meter Between Microcontroller and Radio
        A Reason for Encryption – “Cleartext is Bad”
   Hacking the Encryption
        Some Protocols Easy to Break
        Causes – Weak Keys, Weak Protocols, Weak Initialization Vectors
        Man-in-Middle Attack
        “Bit Flipping” Attacks (Weak Integrity Functions)
   Breaking Into Password Storage on Devices
   “Race Condition” Exploits
        A race condition is of interest to a hacker when the race condition
         can be utilized to gain privileged system access.
Integrity Attacks

   Key: Change the Data
   Replay Attacks (Man-in-the-
    Middle)
   Why?
       Change the Bill (Up or Down)
       Modify Usage Data
       Use Data for Fraud
       Use as Alias
           “Gee Officer, I wasn‟t home that night!”
Availability Attacks
   Denial of Service (DoS) Attacks
        Examples: Georgia Cyber War, Estonia Cyber War
   Spoofing
        Pretending You are Another Meter
   Meter Authentication Weaknesses
        Manipulate Meter to Collector
    Or
        Manipulate Collector to Meter
   Name Resolution Attacks
        Meter Name Cache Poisoning
        Denial of Service Attacks Against DNS Servers
        Reroute Meter Traffic to Another Meter or Collector or Network
   Hold Ransom
        Before Super Bowl?
        Over a Community/Neighborhood?
   Wartime Reserve
        Chipset Backdoor “Pre-Attack” in Smart Meters


                                                               http://www.aclaratech.com/AclaraRF/PublishingI
                                                               mages/starsystem_th.jpg
Privacy Attacks




            http://www.dora.state.co.us/puc/DocketsDecisions/DocketFilings/09I-593EG/09I-593EG_Spring2009Report-SmartGridPrivacy.pdf
Privacy Attacks (2)
   Determine Lifestyles
   Determine Best Time to Rob
   Use Info to “Sell” Services (e.g., “I‟m here to fix your broken
    refrigerator, Ma‟m!)




                                             http://www.baystatetech.org/graphics/major-app.jpg
STORAGE ISSUES
  A Paradigm Shift                                Microsoft Clip Art Online




                                                                                                        www.smartgridnews.com
Today’s Environment                                                           The Future Smart Grid
Analog Meters or Simple Digital Meters                                        “Smart” Digital Meters & “Smart”
Manually Read or Use “Drive By” Reading                                       Sensors

Read Monthly (or Less Frequently)                                             Automatic Reading

                                                                              Read Every ~15 Minutes or More
Minimal Data Accumulation
                                                                              Frequently
Simple Data Fields – KWH Used Since                                           “Data Avalanche!” – Numerous Data
Last Reading                                                                  Fields and Classes




                                                                                                  www.smartgridnews.com
                                Circuit Breaker             Relays – ENHayden
                               ENHayden - Used                  -- Used with
                                with Permission                  Permission
Storage Considerations

Costs for More Data Centers and Storage
Error Handling
Data Analytics and Business Intelligence Resources
Security of Data – Static and Dynamic…
Stored or in Transit
Privacy of Data – Consider EU Privacy Laws
Consumer Education Requirements
Auditing, Reporting, Regulatory Impacts
What To Do?
   #1:  DON‟T GIVE UP!
   #2:  DON‟T IGNORE THE THREATS!
   #3:  LEARN AND STUDY – DO THREAT MODELING
   #4: INCLUDE SECURITY, IT, UTILITY OPERATIONS
        IN PLANNING AND SOLUTION DEVELOPMENT
   #5: WORK WITH SECURITY EXPERTS
        & CONSULTANTS
   #6: ASK HARD QUESTIONS
   #7: BUILD DEFENSE-IN-DEPTH IN EVERY PHASE
    OF
        YOUR SMART GRID SOLUTION
   #8: INCIDENT RESPONSE SET UP, PRACTICED
   #9: STORAGE – PLAN, IDENTIFY CONTINGENCIES,
        LOOK OUTSIDE THE BOX
   #10: INCLUDE SECURITY EARLY, OFTEN
QUESTIONS?
Thanks
   You can mail me on falgun911@gmail.com for
    related queries.

Más contenido relacionado

La actualidad más candente

Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...sidhota
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense NESslides
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDSiva Sasthri
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power gridP K Agarwal
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityBoston Global Forum
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Power System Operation
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Schneider Electric
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationFaizal Faizi
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...Michael Smith
 
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Schneider Electric
 

La actualidad más candente (20)

Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
Cyber security for smart grid
Cyber security for smart grid Cyber security for smart grid
Cyber security for smart grid
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
1678 1683
1678 16831678 1683
1678 1683
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
 
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
 

Destacado

SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010Andy Bochman
 
Rest api 테스트 수행가이드
Rest api 테스트 수행가이드Rest api 테스트 수행가이드
Rest api 테스트 수행가이드SangIn Choung
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Gridnickitran
 
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES UPES Dehradun
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresP K Agarwal
 

Destacado (7)

SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
 
Rest api 테스트 수행가이드
Rest api 테스트 수행가이드Rest api 테스트 수행가이드
Rest api 테스트 수행가이드
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
 
ppt on Smart Grid
ppt on Smart Gridppt on Smart Grid
ppt on Smart Grid
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructures
 
Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
 

Similar a Smart Grid Security by Falgun Rathod

Cisco Connected Grid Solutions
Cisco Connected Grid SolutionsCisco Connected Grid Solutions
Cisco Connected Grid SolutionsAmos Simoes
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation processAjay Ohri
 
2 roberto - mining - presentation-v3
2   roberto  - mining - presentation-v32   roberto  - mining - presentation-v3
2 roberto - mining - presentation-v3GE_Energy
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesNir Cohen
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJuniper Networks
 
Axial What We Do
Axial What We DoAxial What We Do
Axial What We Dodmcleodglas
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Zigbee Wireless Sensor Network - RTLS and Automation
Zigbee Wireless Sensor Network - RTLS and AutomationZigbee Wireless Sensor Network - RTLS and Automation
Zigbee Wireless Sensor Network - RTLS and AutomationJose María Carazo Cepedano
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessJuniper Networks
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centersscarisbrick
 

Similar a Smart Grid Security by Falgun Rathod (20)

Cisco Connected Grid Solutions
Cisco Connected Grid SolutionsCisco Connected Grid Solutions
Cisco Connected Grid Solutions
 
Sdnhpkorea
SdnhpkoreaSdnhpkorea
Sdnhpkorea
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
2 roberto - mining - presentation-v3
2   roberto  - mining - presentation-v32   roberto  - mining - presentation-v3
2 roberto - mining - presentation-v3
 
Veena kakati
Veena kakatiVeena kakati
Veena kakati
 
Ams Oncor March 2010
Ams Oncor March 2010Ams Oncor March 2010
Ams Oncor March 2010
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
1678 1683
1678 16831678 1683
1678 1683
 
391 394
391 394391 394
391 394
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
Axial What We Do
Axial What We DoAxial What We Do
Axial What We Do
 
smart grid
smart gridsmart grid
smart grid
 
RF_NEC
RF_NECRF_NEC
RF_NEC
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Zigbee Wireless Sensor Network - RTLS and Automation
Zigbee Wireless Sensor Network - RTLS and AutomationZigbee Wireless Sensor Network - RTLS and Automation
Zigbee Wireless Sensor Network - RTLS and Automation
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centers
 
10 fn s32
10 fn s3210 fn s32
10 fn s32
 

Más de ClubHack

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014ClubHack
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreClubHack
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber InsuranceClubHack
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatClubHack
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleClubHack
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...ClubHack
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanClubHack
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaClubHack
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiClubHack
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012ClubHack
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)ClubHack
 

Más de ClubHack (20)

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threat
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep Kamble
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan Joshi
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)
 

Smart Grid Security by Falgun Rathod

  • 2. Who am I ?  Falgun Rathod  A Security Researcher  An Investigator  Managing Director & Founder – Cyber Octet (P) Ltd.  Co-Chairman – PR Group of Companies (Cyber Octet (P) Ltd. & Elecorev Technogies (P) Ltd.) (IT & Security) (Electronics & AI)
  • 5. What‟s a “Smart Grid?”  Smart Grid is a developing Network of new Technologies, equipment, and controls working together to respond immediately to our 21st Century demand for electricity.  Technology Used  Integrated Communication  Sensing  Smart Meters  Phasor Measurement Units  Advanced Components  Advanced Control  Decision Support System  Smart Power Generation
  • 8. GAO Report – Released January 2011
  • 9. Another View – Smart Grid Communications Network Sensors Regulatory Policy and and Rule- making Grid Control Enhanced Plug In Electric Flexibility & Control Congestion Hybrid Vehicles Management Guided By… Distributed And Renewable Energy Energy SGCN Results… Efficiency Demand Response Supported By… Data, Analytics, and Information Smart Meters and Communications Security Open and Ubiquitous New Communication Devices Voltage and Systems Stability Generation Custom Applications Enterprise Integration
  • 10. Evolution of Electrical Utility Risks PAST PRESENT NEAR FUTURE HARD-WIRED CONTROL SCADA / RF ENABLED SMART GRID / RF PERVASIVE  Most controls are “hard  Intense financial  Control inside-the-home of all wired” AND require pressure to reduce appliances manual intervention staffing; hence more  Wide use of 802.x, ZigBee, X10 “remote” RF methodologies  Lesser public availability of RF  Computerization and RF  Uncertain Software Provenance, devices control common in all Packaged Code and Offshore industries Development Zero-Day Attacks  Little capability for damage to or financial  Project implementation  Increased organized crime/ benefit from RF attacks excellence not always terrorist focus followed by outstanding  Cost-plus charging – “If security operations  Potential for damage to, and we need it, we‟ll do it! If “net” theft by, every customer we can‟t do it, we‟ll buy  SCADA hacking can it!” cause  Revenue/Risk Asymmetry for „ “wholesale” damage each customer  Clear regulatory and to neighborhoods and  Transition to IP and Windows financial landscape equipment “Monoculture” for RF devices  Uncertain regulatory,  Increased public and regulatory audit, and liability Scrutiny landscape
  • 11. GRIDS can be Hacked :P
  • 12. Overview of Cyber Security – Threats Admin Operator Perform SQL Admin ARP Scan EXEC Opens Email Send e-mail with Malware with malware Acct Operator Internet 4. 1. Hacker sends anan ARP (Address Hacker performs e-mail with malware Resolution Protocol) Scan Master 2.E-mail recipient opens the e-mail and the DB 5. Once the Slaveinstalled quietlyfound, hacker malware gets Database is 3. Using the information command sends an SQL EXEC that malware Slave Database gets, hacker is able to take control of the e- 6. Performs another ARP Scan RTU mail recipient‟s PC! 7. Takes control of RTU Example from 2006 SANS SCADA Security Summit, INL
  • 13. Overview of Cyber Security – Threats Cyber Penetration Attacker Communications Controls the Performs Network (WAN) Head End Remote AMCC Attacker Disconnect (Advanced Metering Control Computer) Communications Network (WAN) Retailers 3rd Parties AMI WAN AMI WAN AMI WAN Data Management Systems (MDM/R) U N IV ER S IT Y Example from AMRA Webinar, Nov ’06 “The Active Attacker”
  • 14. Cyber Security Challenges  The challenge is complex and continuously changing  Legacy systems need to be protected  Number and geographic location of end points  Relationship to physical security  Systems are 7x24 and critical  The human element / social engineering
  • 15. Cyber Solutions - Defense in Depth  Perimeter Protection  Firewall, IPS, VPN, AV  Host IDS, Host AV  DMZ  Physical Security  Interior Security  Firewall, IDS, VPN, AV  Host IDS, Host AV  IEEE P1711 (Serial Connections)  NAC  Scanning IDS Intrusion Detection System IPS Intrusion Prevention System  Monitoring DMZ DeMilitarized Zone  Management VPN Virtual Private Network (encrypted)  Processes AV Anti-Virus (anti-malware) NAC Network Admission Control
  • 17. Physical Layer Security  Natural Disasters  Snow Storms  Hurricanes  Solar Flares  Geomagnetic Storms  Earthquakes  Flooding  Volcanoes  Recognize that Location of the Smart Grid Components Can Be Affected by the Surrounding Environment
  • 18. Physical Layer Security (2)  Steal the Meters – Sell the Devices RESPONSE: METER “LAST GASP” ALERTS WHEN DISCONNECTED
  • 19. Physical Layer Security (3)  Tamper with the Meter  Cause Meter to Stop Reading - Disconnect  Cause Meter to Mis-Read (or Reverse)  Inject Malware  Modify Encryption  Modify Authentication Mechanism • July 2009 – Black Hat Conference • IOActive, Seattle InfoSec Firm • Proof of Concept – 24 Hours Caused 15,000 of 22,000 Home Smart Meters Taken Over by Malware/Worm
  • 20. Physical & Cyber  Opening the Meter  Accessing Exposed Ports and Connectors  Intercept Data Between Microcontroller and Radio  Infrared Port Attack/Hack
  • 21. Cyber Layer Security  The Biggest Opportunity for Trouble  “The Last Mile” Issues  Remember – Added Complexity Causes Concerns
  • 22. “Last Mile”  Broadband Power Line Systems  Power Line Carrier Systems  Public Switched Telephone Network (PSTN)  Cat5/6 Network Connection  Radio Frequency  WiMax  ZigBee  6LoWPAN  802.11x  Cellular (CDMA/EVDO, GSM, LTE)
  • 23.
  • 24. Cyber Attacks  Remember C I A  Confidentiality Attacks  Reading, “Sniffing” the data  Integrity Attacks  Changing the Data  Availability Attacks  Denial of Service – Prevent Use of Service
  • 25. Confidentiality Attacks  Buffer Overflow  Inject Data that is too “Big” for the Meter/System  Predominantly Caused by Bad Software Development  Snooping / Sniffing  Reading / Capturing the Data between Meter and Collector and Vice Versa  Also Internal to Meter Between Microcontroller and Radio  A Reason for Encryption – “Cleartext is Bad”  Hacking the Encryption  Some Protocols Easy to Break  Causes – Weak Keys, Weak Protocols, Weak Initialization Vectors  Man-in-Middle Attack  “Bit Flipping” Attacks (Weak Integrity Functions)  Breaking Into Password Storage on Devices  “Race Condition” Exploits  A race condition is of interest to a hacker when the race condition can be utilized to gain privileged system access.
  • 26. Integrity Attacks  Key: Change the Data  Replay Attacks (Man-in-the- Middle)  Why?  Change the Bill (Up or Down)  Modify Usage Data  Use Data for Fraud  Use as Alias  “Gee Officer, I wasn‟t home that night!”
  • 27. Availability Attacks  Denial of Service (DoS) Attacks  Examples: Georgia Cyber War, Estonia Cyber War  Spoofing  Pretending You are Another Meter  Meter Authentication Weaknesses  Manipulate Meter to Collector Or  Manipulate Collector to Meter  Name Resolution Attacks  Meter Name Cache Poisoning  Denial of Service Attacks Against DNS Servers  Reroute Meter Traffic to Another Meter or Collector or Network  Hold Ransom  Before Super Bowl?  Over a Community/Neighborhood?  Wartime Reserve  Chipset Backdoor “Pre-Attack” in Smart Meters http://www.aclaratech.com/AclaraRF/PublishingI mages/starsystem_th.jpg
  • 28. Privacy Attacks http://www.dora.state.co.us/puc/DocketsDecisions/DocketFilings/09I-593EG/09I-593EG_Spring2009Report-SmartGridPrivacy.pdf
  • 29. Privacy Attacks (2)  Determine Lifestyles  Determine Best Time to Rob  Use Info to “Sell” Services (e.g., “I‟m here to fix your broken refrigerator, Ma‟m!) http://www.baystatetech.org/graphics/major-app.jpg
  • 30. STORAGE ISSUES A Paradigm Shift Microsoft Clip Art Online www.smartgridnews.com Today’s Environment The Future Smart Grid Analog Meters or Simple Digital Meters “Smart” Digital Meters & “Smart” Manually Read or Use “Drive By” Reading Sensors Read Monthly (or Less Frequently) Automatic Reading Read Every ~15 Minutes or More Minimal Data Accumulation Frequently Simple Data Fields – KWH Used Since “Data Avalanche!” – Numerous Data Last Reading Fields and Classes www.smartgridnews.com Circuit Breaker Relays – ENHayden ENHayden - Used -- Used with with Permission Permission
  • 31. Storage Considerations Costs for More Data Centers and Storage Error Handling Data Analytics and Business Intelligence Resources Security of Data – Static and Dynamic… Stored or in Transit Privacy of Data – Consider EU Privacy Laws Consumer Education Requirements Auditing, Reporting, Regulatory Impacts
  • 32. What To Do?  #1: DON‟T GIVE UP!  #2: DON‟T IGNORE THE THREATS!  #3: LEARN AND STUDY – DO THREAT MODELING  #4: INCLUDE SECURITY, IT, UTILITY OPERATIONS IN PLANNING AND SOLUTION DEVELOPMENT  #5: WORK WITH SECURITY EXPERTS & CONSULTANTS  #6: ASK HARD QUESTIONS  #7: BUILD DEFENSE-IN-DEPTH IN EVERY PHASE OF YOUR SMART GRID SOLUTION  #8: INCIDENT RESPONSE SET UP, PRACTICED  #9: STORAGE – PLAN, IDENTIFY CONTINGENCIES, LOOK OUTSIDE THE BOX  #10: INCLUDE SECURITY EARLY, OFTEN
  • 34. Thanks  You can mail me on falgun911@gmail.com for related queries.