320 likes | 409 Views
AMI Threats Intrusion detection requirements deployment recommendations. David Grochocki et al. Why security?. Lures Potential attackers Smartmeters do two way communication Millions of Meters has to be replaced Serious damages just a click away. Paper description. Survey Various Threats.
E N D
AMI ThreatsIntrusion detection requirements deployment recommendations David Grochocki et al
Why security? • Lures Potential attackers • Smartmeters do two way communication • Millions of Meters has to be replaced • Serious damages just a click away
Paper description Survey Various Threats Identify the required information which would detech the attacks Identify Common Attack Techniques Model an IDS Decompose the data to form a Attack Tree
Ami architecture • Communication between NAN and Gateway (DCU) – Mostly 802.15.4 or sometimes 802.11 • Communication between Gateway (DCU) and Utility company – 3G, Edge, WiMax. • NAN Mesh offers reliability and robustness • But., • Complicates Security Monitoring Solution • Few smart meter vendors distribute meters which can report to the utility company directly through user’s home internet.
Attack motivation • Access to a communication infrastructure other than Internet • Access to millions of low computation devices • Access to sensitive customer information • High visibility and Impact • Financial Value of Consumption data
Attack survey • 5 Attack motivations • 30 Unique attack techniques • Relevant ones to AMI are alone considered
Paper description Survey Various Threats Identify the required information which would detech the attacks Identify Common Attack Techniques Model an IDS Decompose the data to form a Attack Tree
Decomposed attack cases • DDoS attack • Stealing Customer Information • Remote Disconnection
DDoS against dcu • Why? • Results in data outage for many Meters • How? • Install malware on meter or remote network exploit • Co-ordinate DDoS among compromised meters • Flood DCU with large packets
Stealing customer info • Why? • Eavesdropping, Social Engineering • How? • Stealing encryption keys of the smart meter by physically tampering or bruteforcing the cryptosystem • Capture AMI traffic • Decrypt to obtain clear text information
Remote disconnect • Why? • Distrupt Business, Inflict loss • How? • Installing malware on the DCU through physical tampering or by exploiting a network vulnerability • Identify the meters with corresponding address information • Use that information to disconnect targeted users
Paper description Survey Various Threats Identify the required information which would detech the attacks Identify Common Attack Techniques Model an IDS Decompose the data to form a Attack Tree
Information required • System Information • CPU Usage, Battery Level, Firmware Intergrity, Clock Synchronisation • Network Information • NAN Collision rate, Packet loss • Policy Information • Authorized AMI devices, Authorized Updates, Address Mappings, Authorized services
Paper description Survey Various Threats Identify the required information which would detech the attacks Identify Common Attack Techniques Model an IDS Decompose the data to form a Attack Tree
IDS Models • Centralized IDS Model Utility Company DCU IDS
Centralized ids • Can detect attacks against Utility network • But, will miss attacks against smart meters
Embedded ids Meter Meter+IDS Meter DCU Meter + IDS Meter + IDS Meter
Embedded ids • Will have access to meter specific information • But., • Attacks on DCU cannot be detected • Functioning both as a meter and IDS can be resource intensive • Keys of all other meters have to be stored in Meter + IDS devices to inspect data • Not a good idea to store some one’s decryption key on some one else’s meter
Dedicated ids sensors Meter IDS Meter DCU IDS Meter Meter
Dedicated ids sensors • More processing power • Less number of IDS sensors required • So less number of places where keys are stored • But still, Attacks on DCU are not detected
Hybrid sensors Meter IDS Meter DCU IDS Meter Meter IDS Utility Company
Hybrid sensors • Either Centralized + Embedded or Centralized + Dedicated sensors • Can detect both attacks at both (DCS and NAN) ends
Anything else? • According to the architecure discussed in this paper, DCU is the device which is more likely to have a Public IP address • Smart meter vendors or third parties may soon start integrating 802.11 or GSM/3G into smart meters • But, why?
So what? • Banner Grabbing! • SHODAN – Exponse Online Devices • Ipv4 computer search engine • Webcams, Routers, Power Plants, iPhones, Wind Turbines, Refrigerators, VoIP Phones