Skip to feedback

Award Abstract # 1314891
TWC: Option: Medium: Collaborative: Semantic Security Monitoring for Industrial Control Systems

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF ILLINOIS
Initial Amendment Date: June 20, 2013
Latest Amendment Date: June 20, 2013
Award Number: 1314891
Award Instrument: Standard Grant
Program Manager: Nina Amla
namla@nsf.gov
 (703)292-7991
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2013
End Date: May 31, 2018 (Estimated)
Total Intended Award Amount: $898,299.00
Total Awarded Amount to Date: $898,299.00
Funds Obligated to Date: FY 2013 = $898,299.00
History of Investigator:
  • Adam Slagell (Principal Investigator)
    slagell@illinois.edu
  • Ravishankar Iyer (Co-Principal Investigator)
Recipient Sponsored Research Office: University of Illinois at Urbana-Champaign
506 S WRIGHT ST
URBANA
IL  US  61801-3620
(217)333-2187
Sponsor Congressional District: 13
Primary Place of Performance: University of Illinois at Urbana-Champaign
506 S. Wright Street
Urbana
IL  US  61801-3620
Primary Place of Performance
Congressional District:
13
Unique Entity Identifier (UEI): Y8CWNJRCNN91
Parent UEI: V2PHZ2CSCH63
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001314DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7433, 7434, 7924
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Industrial control systems differ significantly from standard, general-purpose computing environments, and they face quite different security challenges. With physical "air gaps" now the exception, our critical infrastructure has become vulnerable to a broad range of potential attackers. In this project we develop novel network monitoring approaches that can detect sophisticated semantic attacks: malicious actions that drive a process into an unsafe state without however exhibiting any obvious protocol-level red flags. In one thrust, we conduct a measurement-centric study of ICS network activity, aimed at developing a deep understanding of operational semantics in terms of actors, workloads, dependencies, and state changes over time. In a second thrust, we develop domain-specific behavior models that abstract from low-level protocol activity to their semantic meaning according to the current state of the processes under control. Our goal is to integrate these models into operationally viable, real-time network monitoring that reports unexpected deviations as indicators of attacks or malfunction. A separate "Transition to Practice" phase advances our research results into deployment-ready technology by integrating it into the open-source Bro network monitor. Overall, our work will improve security and safety of today's critical infrastructure by providing effective, unobtrusive security monitoring tailored to their specific semantics. In addition, we tie a number of educational activities to the research and involve students at all levels.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

D. Had?iosmanovi?, R. Sommer, E. Zambon, P. Hartel "Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes" in the proceedings of the Annual Computer Security Applications Conference , 2014
Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer "Runtime Semantic Security Analysis to Detect and Mitigate Control-related Attacks in Power Grids" IEEE Transactions on Smart Grid , v.PP , 2016 , p.1 10.1109/TSG.2016.2547742
Hui Lin, Chen Chen, Jianhui Wang, Junjian Qi, Dong Jin, Zbigniew Kalbarczyk, Ravishankar K. Iyer "A Self-Healing Mechanism for a Resilient PMU Network of Power Systems" IEEE Transactions on Smart Grid , 2016
Hui Lin, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer "Safety-critical Cyber-physical Attacks: Analysis, Detection, and Mitigation" In Proceedings of the Symposium and Bootcamp on the Science of Security , 2016 http://dx.doi.org/10.1145/2898375.2898391
Key-whan Chung, Valerio Formicola, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer "Attacking Supercomputers through Targeted Alternation of Environmental Control: The Blue Waters Case Study" Proceedings of the CPS-SEC Workshop , 2016
M. Caselli, E. Zambon, J. Amann, R. Sommer, F. Kargl "Specification Mining for Intrusion Detection in Networked Control Systems" in the proceedings of USENIX Security Symposium , 2016
Robin Sommer, Johanna Amann, and Seth Hall "Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data" ACSAC , 2016

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Industrial Control Systems are the special computer systems  and hardware that regulate and control physical systems in the real world. Whether it is the computer in your car that detects and responds to lane drifting, the system that controls the HVAC in your office building, or the devices that control the flow of electricity across your city, these computer systems are everywhere around us.


While ICSs have been an important part of our critical infrastructure and manufacturing for decades, it is only in more recent times that these devices are becoming interconnected around the world through the Internet. In the past you could count on on physical locks, gates, and fences to keep adversaries away, but in the modern world these same devices can be attacked from around the globe. And because we have built our critical infrastructure on these systems it is vitally important to protect them.


Traditional security tools form security companies have focused on your desktops, phones and commodity devices that often run Windows, Android, Mac OS, etc. These devices are not the same though as your typical computer or mobile phone, and most tools for intrusion detection don’t translate reasily to protect the networks these devices are on.


With this work we sought to better understand these systems and how they communicate to build new network intrusion detection tools that exploit some of the differences between these tools and the commodity devices you might find in your home or office. For example, these devices have very special communication protocols and patterns as they aren’t used for general purpose activities like web browsing, and we can use that predictability. And because they interact with the real world, we can look to see where they are misbehaving by comparing actual things like power readings across the grid to what reality should be if these ICS are not tampered with.


Our approach to address these challenges took three thrusts. First, we had to get real traffic data from different utility companies to start analyzing how these devices act in the real world and not just rely in engineering specifications. Simultaneously, we had to build tools to parse and understand the traffic at a deep level. With that semantic understanding in hand and the real world data, we were finally able to start developing methods to detect new kinds of attacks in novel ways.


This led to many concrete accomplishments over the life of the project. By building many of these capabilities into the Bro IDS, we released several new versions with traffic analyzers for ICS protocols such as modbus, DNP3 and Bacnet. Further, we were able to improve a new tool called Spicy that helps create protocol analyzers, making it easier for people to add other protocols to Bro in the future.


We also both discovered new types of attacks against ICS, and we developed new defenses. Using live power analysis we created a way to detect malicious or compromised computer systems in the power grid. Working with Cray and the Blue Waters project ant NCSA we developed a new proof-of-concept attack against Power Distribution Units (PDUs) that could take down a supercomputer. In collaboration with Argonne National Lab we developed something called RAINCOAT, a Moving Target Defense (MTD) using Software Defined Networking (SDN) to make it more difficult for intruders to map your network. And out of all this work we developed a new cyber-physical testbed with the international GENI project that can be used by other researchers to run experiments to defend these networks.


The impact of this work will continue for many years beyond the reach of this project. We supported the PH. D. of a new faculty now working at UN Reno, and built a research testbed that others are still using. We have actively deployed tools from this work monitoring the power plan at the University of Illinois at Urbana-Champaign. And finally, by incorporating much of this work into the Bro IDS, many contractors, security analysts and utility companies are enjoying the benefits of this work.


Last Modified: 08/28/2018
Modified by: Adam J Slagell

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page