Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access

As fieldbus networks are becoming accessible from the Internet, security mechanisms to grant access only to authorized users and to protect data are becoming essential. This paper proposes a formally based approach to the analysis of such systems, both at the security protocols level and at the system architecture level. This multilevel analysis allows the evaluation of the effects of an attack on the overall system, due to security problems that affect the underlying security protocols. A case study on a typical fieldbus security system validates the approach.

[1]  Bruno Dutertre Formal Modeling and Analysis of the Modbus Protocol , 2007, Critical Infrastructure Protection.

[2]  Vlastimil Klíma,et al.  Attacking RSA-Based Sessions in SSL/TLS , 2003, CHES.

[3]  Jeffrey L. Hieb,et al.  Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.

[4]  Andrew D. Gordon,et al.  Verified Reference Implementations of WS-Security Protocols , 2006, WS-FM.

[5]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[6]  Karen A. Scarfone,et al.  SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) , 2011 .

[7]  Richard Zurawski,et al.  The Industrial Information Technology Handbook , 2004, The Industrial Information Technology Handbook.

[8]  Michael S. DePriest Network security considerations in TCP/IP-based manufacturing automation , 1997 .

[9]  Sujeet Shenoi,et al.  Security Analysis of Multilayer SCADA Protocols , 2007, Critical Infrastructure Protection.

[10]  Kenneth G. Paterson,et al.  Plaintext Recovery Attacks against SSH , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[11]  Martin Naedele,et al.  Security for Process Control Systems: An Overview , 2008, IEEE Security & Privacy Magazine.

[12]  A. Treytl,et al.  Security measures for industrial fieldbus systems - state of the art and solutions for IP-based approaches , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..

[13]  Martín Abadi,et al.  Computer-Assisted Verification of a Protocol for Certified Email , 2003, SAS.

[14]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[15]  Christian Schwaiger,et al.  Achievement of secure Internet access to fieldbus systems , 2002, Microprocess. Microsystems.

[16]  Adriano Valenzano,et al.  Detecting Chains of Vulnerabilities in Industrial Networks , 2009, IEEE Transactions on Industrial Informatics.

[17]  Ann Miller Trends in Process Control Systems Security , 2005, IEEE Secur. Priv..

[18]  M BellovinSteven,et al.  Just fast keying , 2004 .

[19]  Martín Abadi,et al.  Just fast keying in the pi calculus , 2004, TSEC.

[20]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[21]  L. Pietre-Cambacedes,et al.  Cryptographic Key Management for SCADA Systems-Issues and Perspectives , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[22]  Martín Abadi,et al.  Mobile values, new names, and secure communication , 2001, POPL '01.

[23]  John C. Mitchell,et al.  Multiset rewriting and the complexity of bounded security protocols , 2004, J. Comput. Secur..

[24]  Gavin Lowe,et al.  A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.