de-synchronisation attack modelling in real-time protocols

30
The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol James Wright Dr. Stephen Wolthusen Information Security Group Royal Holloway University of London [email protected] & [email protected] October 10, 2017 De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol J. Wright 1/21

Upload: others

Post on 18-Apr-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

De-Synchronisation Attack Modelling in Real-TimeProtocols Using Queue Networks: Attacking the ISO/IEC

61850 Substation Automation Protocol

James WrightDr. Stephen Wolthusen

Information Security GroupRoyal Holloway University of London

[email protected]

&

[email protected]

October 10, 2017

De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol –J. Wright 1/21

Page 2: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Table of Contents

1 The Problem

2 Queuing Theory in Security

3 Queuing Theory Framework

4 De-synchronisation attack

5 Future Direction

J. Wright 2/21

Page 3: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Defining our Problem

Does the IEC 61850 and IEC 62351 standards meet the security and quality ofservice (QoS) promises laid out in its specification?

If there are omissions, can they be exploited?

Can these attacks still occur in a fully compliant implementation of the protocol?

J. Wright 3/21

Page 4: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Protocol Problem

The assumption in the research community is that the security and QoS promisesof Smart Grid communications protocols are consistent throughout. However,there is little work on verifying them.

No one has checked if the security promises come into conflict with the QoSrequirements.

Making sure that these promises are true could prevent some theorised attacks.

J. Wright 4/21

Page 5: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Table of Contents

1 The Problem

2 Queuing Theory in Security

3 Queuing Theory Framework

4 De-synchronisation attack

5 Future Direction

J. Wright 5/21

Page 6: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Queuing Theory in Security

Queuing theory is good tool for modelling Denial of Service (DoS) attacks.

Most DoS models provide limited insight as most of them rely on M/M/1 queuesor Jackson Networks.

However, there have been some features from the literature that have beenincluded in the framework that is being developed.

1 Split state spaces

2 Limited capacity queues

3 Non-exponential probability distributions.

J. Wright 6/21

Page 7: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Queuing Theory in Security

Queuing theory is good tool for modelling Denial of Service (DoS) attacks.

Most DoS models provide limited insight as most of them rely on M/M/1 queuesor Jackson Networks.

However, there have been some features from the literature that have beenincluded in the framework that is being developed.

1 Split state spaces

2 Limited capacity queues

3 Non-exponential probability distributions.

J. Wright 6/21

Page 8: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Table of Contents

1 The Problem

2 Queuing Theory in Security

3 Queuing Theory Framework

4 De-synchronisation attack

5 Future Direction

J. Wright 7/21

Page 9: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Overview

The framework uses a network of truncated M/M/1/K queues, which providesprobabilistic state exploration methodology. The probabilities of which iscalculated using continuous time Markov Chains (CTMC).

The assumptions made by the framework are:-

1 First-In-First-Out (FIFO) discipline for processing packets.2 Uses the Blocked-at-Service discipline.3 The effective probability distribution describing the rate at which packets are

processed and unblocked are exponential distributions, but the sum of thedistributions isn’t.

4 That the transition between states is memoryless.

J. Wright 8/21

Page 10: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Overview

The framework uses a network of truncated M/M/1/K queues, which providesprobabilistic state exploration methodology. The probabilities of which iscalculated using continuous time Markov Chains (CTMC).

The assumptions made by the framework are:-

1 First-In-First-Out (FIFO) discipline for processing packets.2 Uses the Blocked-at-Service discipline.3 The effective probability distribution describing the rate at which packets are

processed and unblocked are exponential distributions, but the sum of thedistributions isn’t.

4 That the transition between states is memoryless.

J. Wright 8/21

Page 11: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Probability of Queuing Theory

The unique probabilities of the steady state of the network can be found using theglobal balance equation, assuming the system’s state is:-

1 Independent of time.2 Independent of the initial state vector.3 The system is ergodic. ∑

j∈Iπjqji = πj

∑j∈I

qij (1)

0 = πQ0 = πQ0 = πQ (2)

∑πi = 1. (3)

J. Wright 9/21

Page 12: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Probability of Queuing Theory

The unique probabilities of the steady state of the network can be found using theglobal balance equation, assuming the system’s state is:-

1 Independent of time.2 Independent of the initial state vector.3 The system is ergodic.

∑j∈I

πjqji = πj

∑j∈I

qij (1)

0 = πQ0 = πQ0 = πQ (2)

∑πi = 1. (3)

J. Wright 9/21

Page 13: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Probability of Queuing Theory

The unique probabilities of the steady state of the network can be found using theglobal balance equation, assuming the system’s state is:-

1 Independent of time.2 Independent of the initial state vector.3 The system is ergodic. ∑

j∈Iπjqji = πj

∑j∈I

qij (1)

0 = πQ0 = πQ0 = πQ (2)

∑πi = 1. (3)

J. Wright 9/21

Page 14: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Topological Space

The framework must calculate the parameters that govern how each queue in thenetwork performs.

The framework assumes for each queue that a + b ≤ c & a + b + w ≤ K . As wellas packets not returning to previous queues.

The exogenous parameters must be set for each node. They are:

Parameter Description

Ki Maximum capacityµi Service rateγi External arrival rateφ(i , 1) Average number of distinct target queuespij Probability of packet transmission

J. Wright 10/21

Page 15: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Topological Space

The framework must calculate the parameters that govern how each queue in thenetwork performs.

The framework assumes for each queue that a + b ≤ c & a + b + w ≤ K . As wellas packets not returning to previous queues.

The exogenous parameters must be set for each node. They are:

Parameter Description

Ki Maximum capacityµi Service rateγi External arrival rateφ(i , 1) Average number of distinct target queuespij Probability of packet transmission

J. Wright 10/21

Page 16: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Topological Space continued

The endogenous variables can be calculated using the non-linear equations:

Variable Description

P(Ni = Ki ) =(1−ρi )ρ

Kii

1−ρKi +1

i

Probability of being full

λi =λeff

i1−P(Ni =Ki )

Total arrival rate

λeffi = γi (1− P(Ni = Ki )) +

∑j pjiλ

effj Effective arrival rate

Pi =∑

j pijP(Nj = Kj ) Probability being blocked

1

µ̃ai

=∑

j∈I+

λeffj

λeffi µeff

j

Common acceptance rate

1µeff

i

= 1µi

+ Pi

µ̃ai φ(i ,1)

Effective service rate

J. Wright 11/21

Page 17: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Topological Space continued

The endogenous variables can be calculated using the non-linear equations:

Variable Description

P(Ni = Ki ) =(1−ρi )ρ

Kii

1−ρKi +1

i

Probability of being full

λi =λeff

i1−P(Ni =Ki )

Total arrival rate

λeffi = γi (1− P(Ni = Ki )) +

∑j pjiλ

effj Effective arrival rate

Pi =∑

j pijP(Nj = Kj ) Probability being blocked

1

µ̃ai

=∑

j∈I+

λeffj

λeffi µeff

j

Common acceptance rate

1µeff

i

= 1µi

+ Pi

µ̃ai φ(i ,1)

Effective service rate

J. Wright 11/21

Page 18: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The State Space

The framework state space shows the probability of the each queue having aspecific number of packets.

I = {(k1, ..., kN) ∈ NN} (4)

In this state space there are three types of transitions between states:

Initial state s New state t Rate qst Conditions

(i , ...) (i + 1, ...) λi p0i 6= 0 & Ni ≤ ki − 1(..., i) (..., i − 1) µeff

i p0i 6= 0 & Ni ≥ 1(..., i , ..., j , ...) (..., i − 1, ..., j + 1, ...) µeff

i pij 6= 0 & Ni ≥ 1 & Nj ≤ ki − 1

The marginal probability in this state space is

πi (k) =∑

π(k1, ..., kN) (5)

J. Wright 12/21

Page 19: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The State Space

The framework state space shows the probability of the each queue having aspecific number of packets.

I = {(k1, ..., kN) ∈ NN} (4)

In this state space there are three types of transitions between states:

Initial state s New state t Rate qst Conditions

(i , ...) (i + 1, ...) λi p0i 6= 0 & Ni ≤ ki − 1(..., i) (..., i − 1) µeff

i p0i 6= 0 & Ni ≥ 1(..., i , ..., j , ...) (..., i − 1, ..., j + 1, ...) µeff

i pij 6= 0 & Ni ≥ 1 & Nj ≤ ki − 1

The marginal probability in this state space is

πi (k) =∑

π(k1, ..., kN) (5)

J. Wright 12/21

Page 20: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The State Space

The framework state space shows the probability of the each queue having aspecific number of packets.

I = {(k1, ..., kN) ∈ NN} (4)

In this state space there are three types of transitions between states:

Initial state s New state t Rate qst Conditions

(i , ...) (i + 1, ...) λi p0i 6= 0 & Ni ≤ ki − 1(..., i) (..., i − 1) µeff

i p0i 6= 0 & Ni ≥ 1(..., i , ..., j , ...) (..., i − 1, ..., j + 1, ...) µeff

i pij 6= 0 & Ni ≥ 1 & Nj ≤ ki − 1

The marginal probability in this state space is

πi (k) =∑

π(k1, ..., kN) (5)

J. Wright 12/21

Page 21: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Performance Metrics

From the marginal probabilities performance metrics can be calculated.

Performance Metric Equation

Traffic Intensity ρi =∑k

k=1 πi (k)

Throughput λi =∑k

k=1 πi (k)µeffi

Total Throughput λ =∑N

i=1 λ0i

Mean Number of Packets k̄i =∑k

k=1 kπi (k)

Mean Queue Length q̄i =∑k

k=ci(k − ci )πi (k)

Mean Response Time T̄i = k̄iλi

Mean Wait Time W̄i = T̄i − 1µeff

i

Mean Number of visits ei = λiλ

Relative Utilisation xi = ei

µeffi

J. Wright 13/21

Page 22: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Performance Metrics

From the marginal probabilities performance metrics can be calculated.

Performance Metric Equation

Traffic Intensity ρi =∑k

k=1 πi (k)

Throughput λi =∑k

k=1 πi (k)µeffi

Total Throughput λ =∑N

i=1 λ0i

Mean Number of Packets k̄i =∑k

k=1 kπi (k)

Mean Queue Length q̄i =∑k

k=ci(k − ci )πi (k)

Mean Response Time T̄i = k̄iλi

Mean Wait Time W̄i = T̄i − 1µeff

i

Mean Number of visits ei = λiλ

Relative Utilisation xi = ei

µeffi

J. Wright 13/21

Page 23: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Table of Contents

1 The Problem

2 Queuing Theory in Security

3 Queuing Theory Framework

4 De-synchronisation attack

5 Future Direction

J. Wright 14/21

Page 24: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Setup - Part 1

The attack causes the client’s and server’s state machines to becomede-synchronised.

This is achieved by either increasing or decreasing the rate at which the serverreceives the oper − req[TestOK ] message.

The de-synchronisation of state occurs because the standard can be interpreted asnot requiring the server to send out a timeout message to the client.

The adversary in this attack is the same the symbolic one described by Dolev-Yaomodel.

J. Wright 15/21

Page 25: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Setup - Part 2

Unselectedstart Receive sel sel test

sel fail

sel pass

timeout

Receive Oper − req

Send Oper − resp+

Send Oper − resp−

J. Wright 16/21

Page 26: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

The Result

J. Wright 17/21

Page 27: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Table of Contents

1 The Problem

2 Queuing Theory in Security

3 Queuing Theory Framework

4 De-synchronisation attack

5 Future Direction

J. Wright 18/21

Page 28: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Future Direction-Framework

Include the ability to calculate conditional probabilities of events.

Include state spaces of the possible internal states of each queue.

Include packet dropping in the model.

J. Wright 19/21

Page 29: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Future Direction-Analysis

Develop weaker adversary models.

Generate a taxonomy of attacks against Smart Grid protocols.

Find instances of the attacks with IEC 61850 and IEC 62351.

J. Wright 20/21

Page 30: De-Synchronisation Attack Modelling in Real-Time Protocols

The Problem Queuing Theory in Security Queuing Theory Framework De-synchronisation attack Future Direction

Questions?

J. Wright 21/21