Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3264888.3264891acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

ACE: Advanced CIP Evaluator

Published: 15 January 2018 Publication History

Abstract

Industrial control systems (ICS) are key enabling systems that drive the productivity and efficiency of omnipresent industries such as power, gas, water treatment, transportation, and manufacturing. These systems consist of interconnected components that communicate over industrial networks using industrial protocols such as the Common Industrial Protocol (CIP). CIP is one of the most commonly used network-based process control protocols, and utilizes an object-oriented communication structure for device to device interaction. Due to this object-oriented structure, CIP communication reveals detailed information about the devices, the communication patterns, and the system, providing an in-depth view of the system. The details from this in-depth system perspective can be utilized as part of a system cybersecurity or discovery approach. However, due to the variety of commands, corresponding parameters, and variable layer structure of the CIP network layer, processing this layer is a challenging task. This paper presents a tool, Advanced CIP Evaluator (ACE), which passively processes the CIP communication layer and automatically extracts device, communication, and system information from observed network traffic. ACE was tested and verified using a representative ICS power generation testbed. Since ACE operates passively, without generating any network traffic of its own, system operations are not disturbed. This novel tool provides ICS information, such as networked devices, communication patterns, and system operation, at a depth and breadth that is unique compared with other known tools.

References

[1]
2007. The CIP Networks Library Volume 1: Common Industrial Protocol (CIP). Open DeviceNet Vendor Association (ODVA), Ann Arbor.
[2]
2007. The CIP Networks Library Volume 2: Ethernet/IP Adaptation of CIP. Open DeviceNet Vendor Association (ODVA), Ann Arbor.
[3]
Advantech. 2015. EtherNet/IP Supported SCADA Manageable ProView Ethernet Switches. (27 5 2015). www.advantech.com/intelligent-transportation/
[4]
Allen-Bradley. 2016. Logix5000 Controllers I/O and Tag Data. Rockwell Automation.
[5]
P Biondi. 2010. Scapy. (22 4 2010). www.secdev.org/projects/scapy/doc/
[6]
Gerald Combs. 1998. Wireshark. (1998). www.wireshark.org/
[7]
iadgov. 2016. GRASSMARLIN. (2 2 2016). github.com/iadgov/GRASSMARLIN
[8]
Marco Caselli; Dina Hadſiosmanovi Emmanuele Zambon; Frank Kargl. 2013. On the Feasibility of Device Fingerprinting in Indsutrial Control Systems. Critical Information Infrastructures Security.
[9]
Perry Kundert. 2013. Communications Protocol Python Parser and Originator. (2013). https://github.com/pjkundert/cpppo
[10]
Fedor V Yarochkin; Ofir Arkin; Meder Kydyraliev; Shih-Yao Dai; Yennun Huang; Sy-Yen Kuo. 2009. Xprobe2++: Low Volume Remote Network Information Gathering Tool. IEEE/IFIP International Conference on Dependable Systems And Networks.
[11]
Gordon Lyon. 1997. Nmap Security Scanner. (9 1997). nmap.org/
[12]
Ryan Grandgenett; Robin Gandhi; William Mahoney. 2014. Exploitation of Allen Bradley's implementation of EtherNet/IP for denial of service against industrial control systems. 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014.
[13]
Tend Micro. 2017. Industrial Control System. (2017). www.trendmicro.com/ vinfo/us/security/definition/industrial-control-system
[14]
D C Miller, B; Rowe. 2012. A Survey of SCADA and Critical Infrastructure Incidents. 1st Annual Conference on Research in Information Technology.
[15]
Bradley Mitchell. 2017. The Layers of the OSI Model Illustrated. (7 4 2017). www.lifewire.com/layers-of-the-osi-model-illustrated-818017
[16]
Neo4J. 2012. Neo4J. (2012). neo4j.com/
[17]
ODVA. 2018. ODVA. (16 8 2018). https://www.odva.org/
[18]
ODVA. 2018. ODVA MultiVendor Demo CIP Security. (16 8 2018). https://www.odva.org/Happenings/News/ID/234/ CIP-Security-to-be-Demonstrated-at-SPS-IPC-Drives-2017
[19]
ODVA. 2018. ODVA Standards. (16 8 2018). https://www. odva.org/Technology-Standards/Common-Industrial-Protocol-CIP/ CIP-Specifications-Library
[20]
ODVA. 2018. ODVA Vendor CIP Security. (16 8 2018). https: //www.odva.org/Portals/0/Library/Conference/2015_ODVA_Conference_ Batke-Wiberg-Dube_CIP-Security-Phase-1.pdf
[21]
Process Online. 2017. Industrial Ethernet and wireless growing in market share according to HMS. (6 3 2017). www.processonline.com.au/content/ industrial-networks-buses/news/
[22]
Franka; Konig Hartmut Paul, Andreas; Schuster. 2017. Network Topology Exploration for Industrial Networks. International Conference on Industrial Networks and Intelligent Systems.
[23]
John Rinaldi. 2010. CIP Assemblies - Revisited. (3 3 2010). www.rtaautomation. com/cip-assemblies-revisited/
[24]
V Schiffer. 2016. The Common Industrial Protocol (CIP) and the Family of CIP Networks. Open DeviceNet Vendor Association (ODVA), Ann Arbor.
[25]
Jason Smith. 2018. ICS-pcap. (16 8 2018). https://github.com/automayt/ICS-pcap
[26]
Tenable. 2018. Nessus. (16 8 2018). https://www.tenable.com/products/nessus/ nessus-professional
[27]
Design World. 2017. How HMIs can solve the industrial Ethernet communication problem. (2 2 2017). www.designworldonline.com/ hmis-can-solve-industrial-ethernet-communication-problem/
[28]
Michal Zalewski. 2012. P0F V3: Passive Fingerprinter. (2012). lcamtuf.coredump. cx/p0f3/README

Cited By

View all
  • (2020)Automated Vulnerability Testing via Executable Attack Graphs2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)10.1109/CyberSecurity49315.2020.9138852(1-10)Online publication date: Jun-2020
  • (2020)Cyber-Resilient SCADA Systems via Secure State RestorationCritical Infrastructure Protection XIV10.1007/978-3-030-62840-6_9(183-207)Online publication date: 15-Dec-2020
  • (2018)SCAPY- A powerful interactive packet manipulation program2018 International Conference on Networking, Embedded and Wireless Systems (ICNEWS)10.1109/ICNEWS.2018.8903954(1-5)Online publication date: Dec-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CPS-SPC '18: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy
October 2018
114 pages
ISBN:9781450359924
DOI:10.1145/3264888
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 January 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. common industrial protocol
  2. industrial control systems
  3. passive network analysis

Qualifiers

  • Research-article

Conference

CCS '18
Sponsor:

Acceptance Rates

CPS-SPC '18 Paper Acceptance Rate 22 of 10 submissions, 220%;
Overall Acceptance Rate 53 of 66 submissions, 80%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Automated Vulnerability Testing via Executable Attack Graphs2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)10.1109/CyberSecurity49315.2020.9138852(1-10)Online publication date: Jun-2020
  • (2020)Cyber-Resilient SCADA Systems via Secure State RestorationCritical Infrastructure Protection XIV10.1007/978-3-030-62840-6_9(183-207)Online publication date: 15-Dec-2020
  • (2018)SCAPY- A powerful interactive packet manipulation program2018 International Conference on Networking, Embedded and Wireless Systems (ICNEWS)10.1109/ICNEWS.2018.8903954(1-5)Online publication date: Dec-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media