• Title/Summary/Keyword: DNP vulnerability

Search Result 3, Processing Time 0.017 seconds

전력 제어시스템에서 안전한 보안 인증을 위한 메커니즘 소개

  • Park, Jun Yong;Min, Nam-Hong;Ha, Gi-Ung;Yu, Ki-Soon;Song, Kyoung-Young
    • Review of KIISC
    • /
    • v.24 no.3
    • /
    • pp.44-53
    • /
    • 2014
  • 최근 전력 제어시스템의 자동화 효율(Automation Efficiency)과 상호운용성(Interoperability)을 높이기 위해 공개된 표준 프로토콜과 상용 시스템을 사용하게 되었고 외부망과의 연결 필요성이 증가됨에 따라 SCADA 시스템에 대한 공격 위협성이 증가하고 있다. 그러나 전력 제어시스템의 중앙제어장치(Master)와 현장 운영장치(Outstation) 간 데이터를 교환하기 위한 통신 규격인 DNP(Distributed Network Protocol) 프로토콜은 보안을 고려하지 않고 개발되어 통신규격 자체에 보안 취약점을 가지고 있었고, 제어시스템에 대한 사이버 위협 요소도 크게 증가하고 있다. 정보통신 기술의 발전과 개방형 망이 갖는 장점을 취하기 위하여 DNP3 프로토콜은 TCP/IP 네트워크를 지원하게 되었고, TCP/IP 네트워크가 가지고 있는 기존의 보안 취약점(Vulnerability)이 전력 제어시스템 및 통신망에 그대로 이전되고 있어 중앙제어장치와 현장운영장치 간에 DNP3 표준에서 제시한 사항 외에 추가적인 보안 메커니즘이 요구된다. 본 논문에서는 SCADA 시스템이 보안성을 갖고 안전하게 운용되기 위한 IEEE DNP3 표준과 ISO/IEC TC57 WG15에서 권고하고 있는 IEC 62351 표준의 인증 및 암호화 메커니즘을 소개한다.

A study on vulnerabilities of serial based DNP in power control fields (전력 제어시스템의 시리얼 기반 DNP통신 취약점에 관한 연구)

  • Jang, Ji Woong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1143-1156
    • /
    • 2013
  • Power control system like SCADA(Supervisory Control And Data Acquisition) is gathering information using RS232C and low-speed analog communication network. In general, these methods are known as secure because of the secure characteristics from the analog based communication network and serial communication. In this study, first we build DNP communication environment using commercial power control simulator and find some vulnerabilities by testing from the viewpoint of confidentiality, integrity and availability. Consequently, we see the necessity of a valid method for authentication and data encryption when gathering information, even though that is known as secure so far. Discussion of needs of DNP authentication and data encryption is started about several years ago, but there is still nowhere applied that on real environment because the current methods can not fully meet the security requirements of the real environment. This paper suggests a solution to the vulnerabilities, and propose some considerations for enhancing power control system's security level by applying DNP authentication and data encryption.

Vulnerability Discovery Method Based on Control Protocol Fuzzing for a Railway SCADA System (제어프로토콜 퍼징 기반 열차제어시스템 취약점 검출 기법)

  • Kim, Woo-Nyon;Jang, Moon-Su;Seo, Jeongtaek;Kim, Sangwook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.362-369
    • /
    • 2014
  • A railway SCADA system is a control systems that provide the trains with the electricity. A railway SCADA system sends commands to the RTUs(remote terminal unit) and then it gathers status information of the field devices in the RTUs or controls field devices connected with the RTUs. The RTU can controls input output modules directly, gathers the status information of the field devices connected with it, and send the information to the control center. In this way, a railway SCADA system monitors and controls the electricity power for running trains. The cyber attackers may use some vulnerabilities in the railway SCADA system software to attack critical infrastructures. The vulnerabilities might be created in the railway software development process. Therefore it need to detect and remove the vulnerabilities in the control system. In this paper we propose a new control protocol fuzzing method to detect the vulnerabilities in the DNP3 protocol based application running on VxWorks in RTU(Remote Terminal Unit) that is a component of the centralized traffic control system for railway. Debug-channel based fuzzing method is required to obtain process status information from the VxWorks.