DOI QR코드

DOI QR Code

A security study for Control Network: Security Threat Using Control Protocol

제어 네트워크의 프로토콜을 이용한 보안 위협 연구

  • Choi, DongJun (Department of Convergence Security, Chung-Ang University) ;
  • Lee, JaeWoo (Department of Industrial Security, Chung-Ang University)
  • Received : 2020.04.06
  • Accepted : 2020.05.18
  • Published : 2020.05.31

Abstract

Unlike a general IT environment, an industrial control system is an environment where stability and continuity are more important than security. In the event of a security accident in the industrial control system, physical motion can be controlled, so physical damage can occur and physical damage can even result in personal injury. Cyber attacks on industrial control systems are not simply cyber damage, but terrorism. However, the security of industrial control systems has not been strengthened yet, and many vulnerabilities are actually occurring. This paper shows that the PLC can be remotely controlled by analyzing the connection process and packets for the PLC protocol used in the industrial control system and bypassing the security mechanism existing in the protocol. Through this, we intend to raise the security awareness of the industrial control system.

산업제어 시스템은 일반적인 IT 환경과는 다르게 보안성보다 안전성, 연속성이 중요시 되는 환경이다. 산업제어 시스템에 보안 사고가 발생할 경우 물리적인 동작을 컨트롤 할 수 있으므로 안전성과 연속성을 보장받을 수 없다. 따라서 물리적인 피해가 발생할 수 있고, 물리적인 피해가 인명피해까지 초래할 수 있다. 산업제어 시스템에 대한 사이버 공격은 단순히 사이버 피해라고 볼 수 없으며 테러라고 볼 수 있다. 그러나 아직까지 산업제어 시스템에 대한 보안이 많이 강화되지 않은 상태이고 실제로 많은 취약점들이 발생하고 있다. 본 논문에서는 산업제어시스템에서 사용하는 PLC 프로토콜을 대상으로 연결과정 및 패킷을 분석하고 프로토콜에 존재하는 보안 메커니즘을 우회하여 PLC를 원격에서 컨트롤 할 수 있음을 보인다. 이를 통해 산업제어 시스템에 대한 보안 경각심 제고를 하고자 한다.

Keywords

References

  1. Aura, T., "Strategies against replay attacks," In Proceedings of the 10th IEEE Computer Society Foundations Workshop, Rockport, MA, IEEE Computer Society Press, pp. 59-68, 1997.
  2. Denning, D. and Sacco, G., "Timestamps in key distribution protocols," Communications of the ACM, Vol. 24, No. 8, pp. 553-536, 1981. https://doi.org/10.1145/358746.358747
  3. FA Journal, "Siemens wins with TIA Portal," 2013.
  4. Gong, L. and Syverson, P., "Fail-stop protocols: An approach to designing secure protocols," In 5th International Working Conference on Dependable Computing for Critical Applications, pp. 44-55, 1995.
  5. Jung, I. K., "A Development Method of Web System Combining Service Oriented Architecture with Multi-Software Product Line," The Journal of Society for e-Business Studies, Vol. 24, No. 3, pp. 53-71, 2019.
  6. Kim, J. Y., "Understanding and importance of industrial control system security," SK Infosec Official Blog, 2016.
  7. Kwon, J. W. and Park, J. H., "The new paradigm of malware, Stuxnet," AhnLab Special Report 3, 2010.
  8. Lee, J. H. and Kim, U.-N., "Standard Introduction-Industrial Control System Security Requirements," TTA Journal, Serial No. 173, pp. 62-66, 2017.
  9. Lei, C.., Donghong, L.., and Liang, M., "The spear to break the security wall of S7 CommPlus," BlackHat.
  10. Malladi, S., Alves-Foss, J., and Heckendorn, R. B., "On Preventing Replay Attacks on Security Protocols," Proc. International Conference on Security and Management, 2002.
  11. Monn, G. Y., "Stuxnet's Resurrection? Iran claims Israel has attacked," security news, 2018.
  12. Na, J. H., "Safe firmware update of ITU-T SG17 industrial control system," TTA ICT Standard Weekly, 2016.
  13. Sohn, J. M., Lee, I. T., and Lim, H. C., "Enhancement of Industrial Control Systems(ICS) Security for Service Company," The Korea Service Management Society, Vol. 20, No. 4, pp. 183-200, 2019. https://doi.org/10.15706/jksms.2019.20.4.010
  14. Spenneberg, R., Bruggemann, M., and Schwartke, H., "PLC-blaster: a worm living solely in the PLC," in: Black Hat Asia 2016, Singapore, p. 16, 2016.
  15. Syverson., P., "A taxonomy of replay attacks," In Proceedings of the Computer Security Foundations Workshop(CSFW97), pp. 187-191, 1994.
  16. Wire Shark Wiki, https://wiki.wireshark.org/S7comm.
  17. Xu, Y., Yang, Y., Li, T., Ju, J., and Wang, Q., "Review on cyber vulnerabilities of communication protocols in industrial control systems," 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, pp. 1-6, 2017.