dddas for attack detection, isolation, and reconfiguration ... · longer time between false alarms...

27
DDDAS for Attack Detection, Isolation, and Reconfiguration of Control Systems Luis Francisco Combita, Jairo Giraldo, Alvaro A. Cardenas, Nicanor Quijano University of Texas at Dallas Universidad de Los Andes, Colombia InfoSymbiotics/DDDAS August 11, 2016

Upload: others

Post on 21-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

DDDAS for Attack Detection, Isolation, and Reconfiguration of Control Systems

Luis Francisco Combita, Jairo Giraldo, Alvaro A. Cardenas, Nicanor Quijano

University of Texas at Dallas Universidad de Los Andes, Colombia

InfoSymbiotics/DDDAS August 11, 2016

Page 2: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Control Systems

■ Attacks to Regulatory Control ■ A1 and A3 are deception attacks:

the integrity of the signal is compromised

■ A2 and A4 are DoS attacks ■ A5 is a physical attack to the plant

Page 3: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

The Threat is not Hypothetical

Page 4: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Defense in Depth• Security is not only about keeping attackers

out• It is also about

–Mitigating–Detecting–Responding

• to adversaries that have partial access to your system

4

Page 5: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Physical Process(Plant)

Actuators Sensors

Controller

Simulation

vk zk

yk

uk

yk�1

yk

Anomaly Detection (ignore bad

sensors, reconfigure simulation)

rk

Dynamically Request

More Data from Other Systems

Reconfigure Controller

(account for bad actuators)

Reconcile Data

DDDAS Anomaly Detection and Response

Page 6: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Network Intrusion Detection

6[Urbina et al. ACM CCS 2016]

Page 7: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Extracting Sensor and Control Commands from Network Traffic

7

Scapy parser for Modbus• Protocol specification correct but false info

Page 8: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Detection = Simulation + Statistics

813

Page 9: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

LDS Model for Raw Water Tank

9

Page 10: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Implementing the Attack

10

Page 11: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Problem: We Can Always Create Attacks That Are Detected

11

Page 12: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Attackers are More Cunning than Failures (they try to avoid being detected)

12

threshold for raising an alarm

Anomaly Detection Statistic

Page 13: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Undetected Attacks to Water Testbed

13

Page 14: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Our Proposed Metric

14

Less

Impa

ct =

Mor

e Se

cure

Longer time between false alarms = More Usable

Secu

rity

Met

ric:

Impa

ct o

f und

etec

ted

atta

cks

Tradeoff Curve of Anomaly Detector 1

Tradeoff Curve of Anomaly Detector 2

Usability Metric: Time between false alarms

Detector 2 is better than Detector 1:For the same level of false alarms,undetected attackers can causeless damage to the system

Page 15: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Trade-off Curves Can Help us Identify Which Detectors are Better than Others

15

Page 16: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

What Happens After Detection?

• Alert to operator • Automatic Response

• Identify compromised device • Isolate it • Reconfigure the control system

Page 17: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Three Tank Example for Isolation and Response

Pump 1 Pump 2

L1 L2L3

Page 18: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Luenberger vs. Unknown Input Observer (UIO) Estimators

0 200 400 600 800 1000 1200 1400 1600 1800 20000

0.02

0.04

Atta

cks

on s

enso

rs0

0.5

1

Det

ectio

n

Attacks on sensorsDetection

0 200 400 600 800 1000 1200 1400 1600 1800 2000Time (s)

0

0.01

0.02

Atta

ck

0

0.5

1

Det

ectio

nAttack on sensor 1Detection on sensor 1

0 200 400 600 800 1000 1200 1400 1600 1800 2000Time (s)

0

0.02

0.04

Atta

ck

0

0.5

1

Det

ectio

nAttack on sensor 2Detection on sensor 2

Luenberger Detects Attacks Faster with Little False Alarms, but difficult to identify source of attack

UIO identify source of anomaly but have higher false alarms / detection delay

Page 19: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Detection (Luenberger) + Isolation (UIO) + Reconfiguration

0 200 400 600 800 1000 1200 1400 1600 1800 2000

0.4

0.42

0.44

0.46

0.48

Leve

l 1 (m

)

Without reconfigurationWith reconfiguration

0 200 400 600 800 1000 1200 1400 1600 1800 2000Time (s)

0.2

0.22

0.24

0.26

0.28

Leve

l 1 (m

)

Without reconfigurationWith reconfiguration

Page 20: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Other DDDAS-Inspired Architectures for Secure/Private Control

Risk-Aware Operation Privacy-Preserving Control

20

Page 21: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Safe Control Under DoS Attacks[Amin, Cardenas, Sastry, HSCC 2009]

Page 22: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

DDDAS-Inspired Risk-Operation

Physical Process(Plant)

Actuators Sensors

Simulation Under

Threat 1

vk zk

ykuk

Dynamically Reconfigure Based

on Threat Level

External Data

Simulation Under

Threat 2

Simulation Under

Threat n

• If there is any indicator “cyber or physical” of potential future attack, then predict attack and operate conservatively

Page 23: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Privacy Guidelines for Smart Grid

• Collect “only ... necessary [data] for Smart Grid operations, including planning and management”

– Perhaps plan and manage better with more data?

• Retain data “only for as long as necessary” – Data for a longer time presumably means better

forecasting?

Page 24: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Microgrid Synchronization with Privacy Sampling

24[Giraldo et al. IEEE CDC 2014]

Page 25: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Reaching consensus independent of sampling rate and time delays

25

Page 26: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

New Sampling Policy: Discretionary Sampling

26

Page 27: DDDAS for Attack Detection, Isolation, and Reconfiguration ... · Longer time between false alarms = More Usable Security Metric: Impact of undetected attacks Tradeoff Curve of Anomaly

Questions?

Alvaro A. Cardenas [email protected]