Title :
Towards secure monitoring and control systems: Diversify!
Author :
Cotroneo, Domenico ; Pecchia, Antonio ; Russo, S.
Author_Institution :
Dipt. di Ing. Elettr. e delle Tecnol. dell´Inf. (DIETI), Univ. degli Studi di Napoli Federico II, Naples, Italy
Abstract :
Cyber attacks have become surprisingly sophisticated over the past fifteen years. While early infections mostly targeted individual machines, recent threats leverage the widespread network connectivity to develop complex and highly coordinated attacks involving several distributed nodes [1]. Attackers are currently targeting very diverse domains, e.g., e-commerce systems, corporate networks, datacenter facilities and industrial systems, to achieve a variety of objectives, which range from credentials compromise to sabotage of physical devices, by means of smarter and smarter worms and rootkits. Stuxnet is a recent worm that well emphasizes the strong technical advances achieved by the attackers´ community. It was discovered in July 2010 and firstly affected Iranian nuclear plants [2]. Stuxnet compromises the regular behavior of the supervisory control and data acquisition (SCADA) system by reprogramming the code of programmable logic controllers (PLC). Once compromised, PLCs can progressively destroy a device (e.g., components of a centrifuge, such as the case of the Iranian plant) by sending malicious control signals. Stuxnet combines a relevant number of challenging features: it exploits zero-days vulnerabilities of the Windows OS to affect the nodes connected to the PLC; it propagates either locally (e.g., by means of USB sticks) or remotely (e.g., via shared folders or the print spooler vulnerability); it is able to modify its behavior during the progression of the attack, and communicates with a remote command and control server. More importantly, Stuxnet can remain undetected for many months [3] because it is able to fool the SCADA system by emulating regular monitoring signals.
Keywords :
SCADA systems; computerised monitoring; invasive software; programmable controllers; PLC code reprogramming; SCADA system; Stuxnet; Windows OS; cyber attacks; malicious control signals; network connectivity; programmable logic controllers; remote command and control server; secure control systems; secure monitoring systems; supervisory control and data acquisition system; zero-day vulnerabilities; Monitoring; Proposals; SCADA systems; Security; Sensors; Smart grids;
Conference_Titel :
Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on
Conference_Location :
Budapest
Print_ISBN :
978-1-4673-6471-3
DOI :
10.1109/DSN.2013.6575341