Itc16 PLC
Itc16 PLC
Itc16 PLC
Abstract—The modernization of Industrial Control Systems general purpose Commercial-Off-The-Shelf (COTS) hardware
(ICS), primarily targeting increased efficiency and controllability and software [2]. A contemporary ICS typically incorporates
through integration of Information Technologies (IT), introduced microcontrollers and common-architecture embedded micro-
the unwanted side effect of extending the ICS cyber-security
threat landscape. ICS are facing new security challenges and processors (e.g., ARM-based) running commodity operating
are exposed to the same vulnerabilities that plague IT, as systems, such as Windriver’s VXworks, MentorGraphics’ Nu-
demonstrated by the increasing number of incidents targeting cleus and Unix-based Real Time Operating Systems (RTOS).
ICS. Due to the criticality and unique nature of these systems, it Other advanced features include web servers with graphical
is important to devise novel defense mechanisms that incorporate user interfaces for configuration and monitoring, File Transfer
knowledge of the underlying physical model, and can detect
attacks in early phases. To this end, we study a benchmark Protocol (FTP) servers, common networking standards, and
chemical process, and enumerate the various categories of attack remote maintenance capabilities [3].
vectors and their practical applicability on hardware controllers The use of COTS components in critical infrastructure
in a Hardware-In-The-Loop testbed. Leveraging the observed im- settings is attractive since it provides the immediate benefit
plications of the categorized attacks on the process, as well as the of robust hardware and stable, readily available software
profile of typical disturbances, we follow a data-driven approach
to detect anomalies that are early indicators of malicious activity. modules. At the same time, however, vulnerabilities discov-
ered in COTS products can be promptly ported to industrial
environments, extending the cyber-security threat landscape
I. I NTRODUCTION of ICS [4]. In addition, common IT protocols used for ICS
Automatic control systems ensure the stable operation of communication have known vulnerabilities and exploitation
industrial environments and provide monitoring and manage- techniques, enabling elaborate attacks. Even the assurances of
ment capabilities for the underlying physical processes. Exam- air-gap networks are not adequate against motivated attackers,
ples of industrial environments include water treatment and as demonstrated by Stuxnet [5]. Cyber-attacks against ICS are
water desalination plants, assembly lines and manufacturing happening at an alarming pace. In 2014, the ICS Cyber Emer-
processes, chemical processes, and electric power systems. gency Response Team (ICS-CERT) received and responded
The nature and significance of these environments render them to 245 incidents in the US, whereas in 2015 the number of
parts of critical infrastructure. incidents reported grew to 295 [6], [7]. At the same time, the
These industrial processes and their associated control sys- ICS security market is expected to grow to $11.29 billion by
tems are typically referred to as Industrial Control Systems 2019 [8]. Table I aggregates information on high-impact ICS
(ICS). The two major types of ICS with regards to the attacks from 2000 to date.
nature and topology of the controlled industrial process are: ICS security has been traditionally handled using network
i) Distributed Control System (DCS), where the system is security and conventional IT security practices. ICS security
divided into distributed and decentralized subsystems each goals, however, differ greatly from traditional IT security
responsible for its own local process, and ii) Supervisory goals. Straightforward adoption of IT security solutions fails
Control and Data Acquisition (SCADA), where the control to address the coupling between the cyber and physical
of the entire system is centralized and the system typically components in an ICS [14], as well as the demand for high
spans over a large geographical area [1]. availability of the monitoring and control functions [15]. For
Over the past years the hardware and software components example, while an email system can afford short delays in
of ICS are being upgraded, towards a more modern and delivering messages, a short disruption of the control process
“smart” critical infrastructure that has increased efficiency, in an ICS can have devastating effects ranging from environ-
controllability, and reliability. The addition of computing ca- mental disasters to significant financial losses, or even loss of
pabilities and inter/intra-connectivity to ICS promise lower life.
production and maintenance costs, faster emergency response In this paper, in order to address the cyber and physical
times, fewer incidents, and shorter downtimes. This mod- coupling in ICS, we develop a process-aware supervised
ernization trend is enabled by the proliferation of cheap learning defense strategy that takes into consideration the
following subsections, we present attack examples, as well the control law itself. For example, modifying the controller
as their impact for all three categories. We utilize reactor PID gains directly influences controller performance, and will
pressure as a case study, as it is one of the most important possibly result in deterioration of the overall performance of
variables of the TE process. Variability in reactor pressure the process. In our case, the attack designer may change either
and temperature can result in instability of the process. Small the proportional or integral gain of one of the PI controllers of
increases in pressure can halt the entire process, since the the TE process. One example would be a change in the gains
optimal operational value for minimizing production cost is by a multiplication factor:
set to 2800 kPa, very close to the shut down limit of 3000 kPa.
k̃i = λki . (2)
Decreasing the reactor pressure leads to increased production
costs. These factors render the reactor pressure control loop where λ is a constant, ki is the original designed gain, and k̃i
attractive for attackers interested in negatively affecting the is the modified gain value.
efficiency and stability of the system. For all ensuing scenarios The effects of one such controller attack, where the propor-
in this section, G production setpoint and production rate tional gain of the reactor pressure PI controller is multiplied
setpoint are set to 53.8% and 23m3 /h respectively, and all with a constant numerical value, are shown in Fig. 5 and
attacks are launched at t = 10h. Fig. 6. The attack results in decrease of the reactor pressure,
which has a direct negative effect on the operating cost of
A. Sensor Attacks
the process. Although this attack does not have a large impact
In sensor attacks, the attacker modifies/spoofs a sensor on the product quality, it significantly increases the operating
reading to affect closed-loop system operation. One exam- cost.
ple of such an attack is modification of the sensor value
in a continuous manner, starting with a slow increase, and C. Actuator Attacks
increasing the rate of variation while the attack progresses. The final category of attacks targets actuator values, in
The mathematical model of such an attack is: which the payload modifies the actuator values to disrupt
the system’s operation in a manner difficult to detect, since
ỹ(t) = ysp + αeβ(t−τ ) (1) the actuator values are typically the ones sent to the control
where ysp is setpoint value of the output, τ is the launched center for monitoring purposes. One example of an actuator
attack time, and α and β are tuning constants. targeting payload is the addition of a small time-varying
Fig. 3 and Fig. 4 show the effects of a payload falling bias to the actual actuator value to disguise the attack, and
under this category, launched against the stripper level sensor. slowly deteriorate the system performance without causing
The attack influences the process slowly at first, but its any instability outside the process’s operational boundaries.
effect increases exponentially over time. Under this attack, The mathematical model of such a payload is:
the stripper level reaches the high shutdown limit after 5.65h. ũ(t) = u(t) + a sin(ωt) (3)
Moreover, the production rate and operation cost deviate from
their setpoints during the attack. Note that maintaining G where a and ω are constant values, u(t) is actual actuator
production percentage and production flow rate constant, while value, and ũ(t) is the modified actuator value.
satisfying safety constraints, are important objectives of the TE The effects of this attack on the separator level control
process. loop are shown in Fig. 7 and Fig. 8. The percentage of G
production, which is the product quality metric, has oscillatory
B. Controller Attacks response under this attack model. Product quality oscillation is
The second category of payloads targets controllers, and a very undesirable process behavior. Additionally, minimizing
modifies the control parameters of the process, or ultimately valve movements is one of the control objectives of the TE
Fig. 6. Performance indices of the system under controller attack Fig. 8. Performance indices of the system under actuator attack
process. This attack model causes an oscillatory response for hardware in the experimental setup enables a more thorough
the separator flow valve position (shown in Fig. 7), which investigation of the system’s security, as well as formulation
will result in faster wear-out of the valve and subsequent of complete attack vectors, including payload delivery mecha-
decommission. The characteristics of this attack are similar nisms [18]. For the aforementioned reasons, we adopt a HITL
to the ones of Stuxnet’s payload that destroyed centrifuges by experimental setup in this work.
forcing an oscillatory response, reducing their life-span. The experimental HITL testbed we developed for studying
the TE process is depicted in Fig. 9. The Simulink model
VI. E XPERIMENTAL SETUP : HITL TESTBED described in Section IV was modified by removing one of its
An important consideration when performing vulnerability control loops, and implementing the equivalent model on a
assessments is proper selection of the assessment environ- PLC unit. The control loop offloaded to the hardware PLC
ment. Assessment environments may include software-only is a cascade of two PI controllers driven by two sensors, re-
simulation models, production testing, or setup replication, sponsible for controlling the reactor’s pressure and purge rate.
each with its advantages and disadvantages. For example, The cascaded PI-to-PI controller implemented on the PLC was
while production testing and setup replication provide the tuned to closely match the behavior of its computer-simulated
most accurate results, they are not viable options for ICS. analog. The numerical results from the HITL simulator for
The former is inherently hazardous, given the interactions of any process initial condition and disturbance conditions are
ICS with the physical world, and the latter is cost prohibitive very similar to the pure simulation, but also include noise
as it requires duplication of every component in the system. and errors due to multiple practically relevant hardware-related
Software simulations have very low design costs, but fail to effects (e.g., random noise, baseline drift on analog signal
capture the complexity of ICS and cannot recreate the real- lines, quantization effects on analog I/Os).
world conditions and interactions of cyber-physical systems. In terms of hardware, the primary PLC unit used in the
Hybrid methods try to address this trade-off by including HITL testbed is the Wago 750-881, because it is a good ex-
one or more hardware components connected to a software ample of the transition from legacy-based structures to modern
simulation model in a HITL setup. This approach inherits technologies. The Wago 750-881 features a 32-bit ARM CPU
the low design cost benefit of software simulations and the running a Nucleus RTOS, and a 32KB non-volatile memory
realistic disturbances that hardware inclusion contributes to a which holds the ladder logic files. The RTOS includes a web-
system. Moreover, from a security perspective, existence of server and FTP service. In terms of networking, the Wago
Fig. 12. SVM based attack detection under sensor attack; Process disturbance
injected between 7h and 8h, attack injected at 15h.