Top Banner
SCADA Network Forensics of the PCCC Protocol Department of Computer Science Greater New Orleans Center for Information Assurance University of New Orleans Saranyan Senthivel, Dr.Irfan Ahmed, Dr. Vassil Roussev 1
32

SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Apr 03, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

SCADA Network Forensics of the PCCC Protocol

Department of Computer Science

Greater New Orleans Center for Information Assurance

University of New Orleans

Saranyan Senthivel, Dr.Irfan Ahmed, Dr. Vassil Roussev

1

Page 2: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Agenda

• Insight to SCADA & PCCC• Implementation• Finding Digital Artifacts • Evaluation• Conclusion

2

Page 3: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Geographically Dispersed Assets

3

Page 4: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

SCADA Systems

• SCADA Supervisory Control and Data Acquisition

• Are highly distributed systems • Provides centralized data acquisition,

monitoring, and control in real time• Program PLC’s using Ladder logic or

control logic

4

Page 5: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

SCADA System Overview

5

Page 6: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Attacker on SCADA Network

6

Page 7: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Network Monitoring

Forensic Analysis of the Network Traffic

7

Page 8: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Goals

• Explore the transfer process of control logic to a PLC o using PCCC protocol.

• Identify digital artifacts for forensic analysis.

• Develop a protocol specific network forensic tool, Cutter

8

Page 9: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Learning the Protocol

• Allen Bradley DF1 protocol and Command Seto http://literature.rockwellautomation.com/idc/

groups/literature/documents/rm/1770-rm516_-en-p.pdf

• PLC’s using the protocol ?o Allen Bradley Micrologix 1400 B

9

Page 10: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

PCCC Message

PCCC data field for FNC code 0xA2 and 0xAA to read/write to a PLC

10

Page 11: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Experimental Setup

• PCCC - Programmable Controller Communication Commands

• PLC - Allen-Bradley Micrologix 1400 B• RSLogix 500 Programming S/W

11

Page 12: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

RSLogix IDE

• No low-level representation of a ladder logic program after compilation

• During a logic transfer,oOperational mode is changed from RUN to

PROGRAM mode

12

Page 13: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

RSLogix IDE

• 30 types of files are transferred to PLC oDuring ladder logic transfer

• File types of data files are known• Other unknown types are

o System configurationo Ladder logic

13

Page 14: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Implementation

14

Page 15: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Cutter tool – Modules

15

Page 16: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Cutter tool – Modules

• Identify the boundary of the logic transfer

16

• Filter Irrelevant messages

Page 17: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Cutter tool – Modules

17

• Assemble the write messages into files o File number(xx) and Filetype(yy) combination is

used to create a unique file name file:xx-Type:yy

Page 18: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Unknown File types

18

Page 19: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Unknown file type Identification

19

Page 20: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Unknown file type Identification

• Test cases

20

Page 21: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Classified File Types

21

File Type Classification ( Based on Content)

0x22 Ladder Logic – Control Logic Program

0x03 Main Configuration file

0x47 DF1 ( Channel 0 ) Configuration

0x49 Ethernet Configuration

0x4D DNP3 Configuration

0x4C SMTP Configuration

0x92 Message

0x93 PID

0x94 Programmable Limit Switch

0x95 Routing Information

0x96 Extended Routing Information

Page 22: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Evaluation

22

Page 23: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Experimental Settings

23

Page 24: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Compare Two Ladder Programs

24

Page 25: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Compare Two Ladder Programs

• Program 1: Original program in PLC• Program 2: Found in a network traffic log

25

Program 1 Program 2

Different?

Compare

Normal No Yes Suspicious

Identify the Change

Page 26: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Compare Two Ladder Programs

26

Page 27: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Compare Two SMTP Files

27

Page 28: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Compare Two SMTP Files

28

• SMTP Config 1: Original configuration in PLC• SMTP Config 2: Found in a network traffic log

Page 29: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Performance Evaluation

29

Page 30: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Conclusion & Future Work

• Framework developed for SCADA forensic analysis

• Future Workso Parsing the assembled binary file into human

Readable format• Includes disassembling the Ladder logic file 0x22

o Framework could be developed for universal applicability

• Modbus, DNP3 etc.,

30

Page 31: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Questions

31

• Tool will be available at https://gitlab.cs.uno.edu/ssenthiv/PLC_Forensics.git

Page 32: SCADA Network Forensics of the PCCC Protocol · SCADA Network Forensics of the PCCC Protocol Department of Computer Science ... •SCADA Supervisory Control and Data Acquisition •Are

Thank You

32