Sie sind auf Seite 1von 6

Proceedings of the 20th World Congress

The International
Proceedings Federation
of the 20th Worldof Congress
Automatic Control
The International
Proceedings Federation
of the 20th9-14,
Worldof Congress
Automatic Control
Toulouse,
The France,
International July
Federation 2017
of Automatic Control
Toulouse, France,Federation
The International July 9-14, 2017 Available online at www.sciencedirect.com
of Automatic Control
Toulouse, France, July 9-14, 2017
Toulouse, France, July 9-14, 2017
ScienceDirect
IFAC PapersOnLine 50-1 (2017) 12179–12184
Cybersecurity
Cybersecurity training in control systems
Cybersecurity training training in in control
control

systems
systems
Cybersecurity using
using real
training
real equipment
in control
equipment 
 systems
using real equipment 
using real equipment
Manuel Domı́nguez ∗ Miguel A. Prada ∗ Perfecto Reguera ∗
∗ ∗ ∗
Manuel
Manuel Domı́nguez
Domı́nguez ∗ Miguel A.
∗∗ Serafı́n A. Prada ∗ ∗ ∗ Perfecto Reguera ∗ ∗

Juan J. Fuertes ∗ Miguel Alonso Prada Perfecto
∗ Antonio MoránReguera ∗
Manuel Juan J. Fuertes ∗∗ Serafı́n
Domı́nguez ∗
Miguel Alonso
A. Prada ∗
∗ Antonio

Perfecto MoránReguera ∗


Juan J. Fuertes ∗ Serafı́n Alonso ∗ Antonio Morán ∗
∗ Juan J. Fuertes Serafı́n Alonso Antonio Morán
∗ SUPPRESS research group, University of León, Escuela de
∗ SUPPRESS research group,
∗Ingenierı́as, group, University
University of
of León,
León, Escuela
Escuela de
de
SUPPRESSCampus
∗Ingenierı́as, researchde
Campus de Vegazana
Vegazana s/n,
s/n, León,
León, Spain
Spain (e-mail:
(e-mail:
SUPPRESS
Ingenierı́as,
manuel.dominguez,researchdegroup,
Campus Vegazana
ma.prada,University of
s/n, León,
prega, León,
Spain
jj.fuertes, Escuela
(e-mail:
saloc, de
manuel.dominguez,
Ingenierı́as, Campus
manuel.dominguez, dema.prada,
Vegazana prega,
ma.prada, jj.fuertes,
s/n, León,
prega, Spainsaloc,
jj.fuertes, (e-mail:
saloc,
a.moran@unileon.es)
a.moran@unileon.es)
manuel.dominguez, ma.prada, prega, jj.fuertes, saloc,
a.moran@unileon.es)
a.moran@unileon.es)
Abstract:
Abstract: The relevance
relevance of of cybersecurity
cybersecurity in in the
the field
field of of critical
critical infrastructures
infrastructures has been
Abstract: inThe
reinforced The the last years,
relevance ofas a result
cybersecurity of thein increased
the field number
of critical of incidents.
infrastructures The
has
has been
Europeanbeen
reinforced
Abstract:
reinforced inThe the last
last years,
the relevance
indeveloped years, ofas aa result
ascybersecurity
result to of
of the
thein increased
the field
increased number
of critical
number of incidents.
incidents.inThe
infrastructures
ofeducation The European
has been
European
Union
Union has
has policies oriented promote research and security and
reinforced
Union
critical has indeveloped
developed
infrastructure
policies
policiesas oriented
the last protection.
years, a It
result
oriented is
to
to
widely
promote
of the
promoteincreased
recognized
research
researchnumber
that
and
and
there ofeducation
incidents.
education
is a
in
inThe
shortage
security
European
security
of qualified
and
and
critical
Union infrastructure
has developed
critical infrastructure protection.
policies
protection. It
oriented
Ittheis widely
to recognized
promote
is increasing
widely recognized researchthat
that there
and
there is a
education shortage
is a shortage in of qualified
security
of qualified and
cybersecurity
cybersecurity professionals
professionals due
due to
to the increasing demand.
demand. The
The situation
situation is
is even
even more
more serious
serious
critical
cybersecurity
in the area infrastructure
of professionals
cybersecurityprotection.
due
of It is widely
to the infrastructures,
critical recognized
increasing demand. due that
The
to there
thesituation is
special a shortage of
is even more serious
characteristics qualified
of the
in
in the
the area
cybersecurity
area of
of cybersecurity
professionals
cybersecurity of
of critical
due to
critical the infrastructures,
increasing
infrastructures, due
due to
demand. The
to the special
special characteristics
thesituation is evenis more
characteristics of
of the
serious
the
control
control and
and monitoring
monitoring systems
systems needed
needed for
for their
their operation.
operation. Furthermore,
Furthermore, there
there is a knowledge
in the
control
gap area
and of
between the cybersecurity
monitoring
industrial systems of critical
control needed
experts,infrastructures,
forwho
their due
operation.
generally have to the received
special characteristics
Furthermore,
not there
training is aainknowledgeof the
knowledge
computer
gap
gap between
control and
between the
the industrial
monitoring
industrial control
systems
control experts,
needed
experts, forwho
their
who generally
operation.
generally have not
not received
haveFurthermore,received training
there
training is ain computer
inknowledge
computer
security,
security, and
and the
the cybersecurity
cybersecurity experts,
experts, who
who ignore
ignore the
the operation
operation of
of industrial
industrial control
control systems.
systems.
gap
It is between
security,
therefore the
and the industrial
cybersecurity
necessary to control
create experts,
experts, who
who ignore
educational generally have
the operation
environments not
that received
of industrial
support training
trainingcontrol in
and computer
systems.
research
It
It is therefore
security, and
is therefore necessary
the
necessary to
cybersecurity create
to without.
create educational
experts, environments
who reason,
educational ignore the
environments that
operation
that support
of industrial
support training
trainingcontroland research
andofsystems.
research
oriented
oriented to
to bridge
bridge this
this gap
gap without. For
For that
that reason, this
this paper
paper presents
presents a
a Laboratory
Laboratory of Critical
Critical
It is therefore
oriented
Infrastructuresto bridge necessary
this gap
Cybersecurity to without.
create
(CICLab)educational
For that that environments
reason,
is flexiblethis enough
paper that support
presents
to create training settings
a Laboratory
different andofresearch
Critical
that
Infrastructures
oriented
Infrastructuresto bridge Cybersecurity
this gap
Cybersecurity (CICLab)
without.
(CICLab) For that
that is flexible
reason, this
that is flexible controlenough
paper to create
presents
enough systems.
to create For a different
Laboratory
different settings
of
settings that
Critical
that
simulate
simulate real
real situations
situations on
on the
the critical
critical infrastructure
infrastructure control systems. For that
that purpose,
purpose, the
the
Infrastructures
simulate real
laboratory includesCybersecurity
situations on the
different (CICLab)
field,critical
control thatandis flexible
infrastructure
monitoring enough
control to create
systems. For
technologies different
that that
are settings
purpose,
widely that
the
used
laboratory
simulate
laboratory includes
real situations
includes different
onenergy
different thefield,
field, control
critical
control and monitoring
infrastructure
and building
monitoring control technologies
systems.and
technologies that
For
that are
that widely
are purpose,
widely Some used
the
used
in
in four
four sectors: industry, management, management smart cities.
four sectors:
laboratory
in
educational includes
sectors: industry,
different
industry,
activities are
energy
energyfield,management,
presented control
management,
in the and building
framework monitoring
building of
management
technologies
management
this laboratory.
and
andthat smart
are cities.
smart widely Some
cities. used
Some
educational
in four sectors:
educational activities
industry,
activities are
are presented
energy management,
presented in
in the
the framework
frameworkbuilding of
of this laboratory.
management
this laboratory.and smart cities. Some
© 2017, IFACactivities
educational (International Federation of
are presented in Automatic
the framework Control) of Hosting by Elsevier Ltd. All rights reserved.
this laboratory.
Keywords:
Keywords: Cybersecurity,
Cybersecurity, Industrial Control
Industrial Control Systems,
Systems, Laboratory,
Laboratory, Education
Education
Keywords: Cybersecurity, Industrial Control Systems, Laboratory, Education
Keywords: Cybersecurity, Industrial Control Systems, Laboratory, Education
1. INTRODUCTION
1. INTRODUCTION
INTRODUCTION doubled the rate of all other information technology jobs
1. doubled
doubled the rate
rate of
the reports of all
all other
other information
information technology
technology jobs
jobs
and
and several
several reports state
state that
that there
there is
is a
a great
great industry
industry
The world is 1.
experiencing INTRODUCTION doubled
and
shortage the
severalof rate
reports
computer of all
stateother
securitythat information
there
professionals.is a technology
great
Some jobs
industry
reports
The world
The world is experiencing aa
is experiencing new
a new industrial
new industrial transformation.
industrial transformation.
transformation. and shortage
shortageseveralof
of computer
reports
computer security
state
securitythat professionals.
there is
professionals. Some
a great reports
Someindustry
reports
Some experts compare the current situation with the in- estimate that the shortage of security professionals in the
Some
The world
Some experts compare the
is experiencing
experts compare thea new
current
current situation
industrial
situation with the
transformation.
with in- estimate
the in- shortage
estimate that
of
that the
the shortage
computer security
shortage of
ofofsecurity
professionals.
security professionals in
in the
Some(Wright,
professionals reports
the
dustrial revolution that happened two centuries ago (Bret- world job market would be around 1 million
dustrial
Some
dustrial
tel et
revolution
experts compare
revolution
al., 2014). In
that the
that happened
current
happened
short, this
two
two centuries
situation
centuries
transformation withagothe
ago
is in- world
(Bret-
(Bret-
driven, estimate
world
2015).
job
job
If
market
that
market
data the would
shortage
wouldskills
science
be
beofof
ofarearound
security
around 11 million
professionals
considered million
as
(Wright,
in the
(Wright,
well, the
tel et al.,
dustrial al., 2014). In
revolution Inthat
short, this transformation
happened transformation
two centuries is driven,
ago driven,
(Bret- 2015).
world
2015). If
job
If data
market
data science
would
science skills
be
skills ofare
are considered
around
considered1 as
million
as well,
(Wright,
well, the
the
tel
on et
one 2014).
hand, by the short,
Internet thisand its related is shortage of professionals increases
technologies shortage of professionals increases significantly. In Spain, significantly. In Spain,
on one
tel one
on hand,
etonal., by the
2014).
hand, by the
In Internet
short,
Internet thisand
and its related
related technologies
transformation
its is driven, 2015).
technologies shortage If ofdata science
professionals skills are
increases considered
significantly. as In
well, the
Spain,
and, the other, by the use of the information contained the
the Plan
Plan forfor Trust
Trust in in the
the Digital
Digital Environment
Environment included
included as
as aa
and,
on
and,oneon the
hand,
on the other,
by
other, by by
the the
Internet
theall use
usetheof
andthe
of the information
its related
information contained
technologies
contained core shortage of professionals increases significantly. In Spain,
in data obtained from levels of the production the
core idea
Plan
idea the
for
the development
Trust in the Digital
development of
of aa Cybersecurity
Environment included Programme as a
in
and,
in data
on the
data
processes.
obtained
obtained
This
from
other,transformation
by
from all
theall the
usethe levels
of the of the
information
levels
already of the production
affects
production
contained
relevant the
core
with Plan
idea
the for
the
aim Trust in the Digital
development
to encourage a Cybersecurity
ofthe Environment
Cybersecurity
promotion,
Programme
included
Programme
identificationas a
processes.
in data
processes. This transformation
obtained
This transformation
from all the already
levels
already of affects
the
affects relevant with
production
relevant core
with the
idea
the aim
the
aim to
to encourage
development
encourage ofthe
a
the promotion,
Cybersecurity
promotion, identification
Programme
identification
industrial sectors such as energy or transport. However, and
and retention
retention of
of talent. Since then, grants and incentives
industrial
processes. to
industrial
according
sectors
This
sectors
the
such as
such
experts,
as energy
transformationwe
energyalready
are
or transport.
or
only
transport.
in itsaffects
first
However,
However,
stage and, with
relevant and
are the to
used aim
retention to talent.
of
promote encourage
talent. the
Since
Since the
training
then,
then, of
grants
promotion,
grants
new
and
and
experts.
incentives
identification
incentives
according
industrial to the
sectors experts,
such as we are
energy only
or in its
transport.first stage
However,and, are
and used to promote the training
are used to promote the training of new experts.incentives
retention of talent. Since then, of new
grants experts.
and
according
therefore, to
it the
is experts, we
necessary to are only in its
introduce majorfirstchanges
stage and, in
therefore, it the
is necessary
necessary to are
introduce major changes in The relevance of
according to
therefore,
structures it
and is experts, we
organizations to only
introduce
(Lee et in its
al., majorfirstchanges
2014). stage and, in are
Theused to promote
relevance of cybersecurity
the trainingin
cybersecurity inof the
newfield
the field of
of industrial
experts. industrial
structures
therefore, it
structures and
and organizations
is organizations
necessary to (Lee (Lee et
introduce al., 2014).
et al.,major
2014).changes in control control
The systems
relevance of has been
cybersecurity reinforced in in
the the
field last years,
of industrial as
The
control systems
relevance
systems of has been
cybersecurity reinforced
has been reinforced in in
the the
field last years,
the last industrial
inincidents of years, as
as
One of
structures theandmajor challenges
organizations is
(Lee that
et al., of the
2014). cybersecu- aa result
result of
of the
the increased
increased number
number of
of incidents and
and their
their
One
One of the major
ofindustrial-related challenges
the major challenges is that
is that of of the
the cybersecu-
cybersecu- acontrol
resulttosystems
ofcritical has
the increased been reinforced of inincidents
number(Nicholson the last years,
and as
their
rity of infrastructures and obviously the impact infrastructures et al., 2012).
rity
One of
rity ofofindustrial-related
industrial-related
the major challenges infrastructures
is that
infrastructures andthe
of
and obviously
cybersecu-
obviously the aimpact
the result
impact to critical
toofreason,
critical infrastructures
the increased
infrastructuresnumberUnion (Nicholson
of incidents
(Nicholson et
et al.,
and2012).
al., their
2012).
training of students and workers in these fields. Several For that the European has developed in
training
training
reports
of students
of
from
students and
rity of industrial-related
international
andinfrastructures
workers in
workers
consulting
in these
these
firms
fields.
andfields.
obviously
agree the For
Several
Several
on the impact
For
the
that
last
reason,
criticalathe
thattodecade
reason, the
set
European
infrastructures
European
of
Union
(Nicholson
Union
communications
has
hasand developed
et al.,
developed
directives
in
2012).
in
reports from
training from international
ofdemand
students and consulting
workers firms
in these agree on the the
For last decade
that decade
reason, a
atheset of communications
European Union and
hasand directives
developed in
reports
increasing international
of competent consulting firmsfields.
professionals agree
in Several
on the the
cyberse- last
oriented to improve setthe of protection
communications of critical directives
infrastruc-
increasing
reports demand
from of competent
international competent professionals
consulting firms in cyberse-
agree cyberse-
on the oriented
the last
oriented to
decade
to improve
improve a set the
theof protection
communications
protection of
of critical
and
critical infrastruc-
directives
infrastruc-
increasing
curity, demand
because these of skills are professionals
currently scarce inin the job tures. The European Commission published in 2004 the
curity,
increasing
curity, because
demand
because these
these skills
ofofcompetent
skills are currently
are currently
professionalsscarceinin
scarce incyberse-
the job tures.
the job oriented
tures. The
The to European
improve
European Commission
the protection
Commission published
of critical
published in 2004
ininfrastruc-
2004 the
the
market. The growth employment in cybersecurity has Communication
Communication ”Critical
”Critical Infrastructure
Infrastructure Protection
Protection in
in the
market.
curity,
market. The
because
The growth
these
growth of
of employment
skills are
employment currentlyin
in cybersecurity
scarce
cybersecurity in the has
job
has tures. The
Communication European ”Critical Commission
Infrastructure published in
Protection 2004in the
the
 This work was supported by the Spanish Secretary of State fight
fight against
against terrorism”
terrorism” (COM/2004/0702)
(COM/2004/0702) and
and in
in 2006
2006
market.
 This work Thewas growth of employment
supported by the Spanish in cybersecurity
Secretary of State has fight Communication
against
presented the ”Critical (COM/2004/0702)
terrorism”
European Infrastructure
Programme for Protection in2006
and inInfras-
Critical the
 presented the European Programme for Critical
forThis
for
Research,
work was
Research,
 This
Development
supportedand
Development and by Innovation
the Spanish
Innovation
(Ministry
Secretary
(Ministry
of Economy
of of State
Economy fight against
presented
tructure the terrorism”
ProtectionEuropean (COM/2004/0702)
Programme
(COM/2006/786). for and
Critical
This inInfras-
2006
Infras-
programme
for work was
and Research,
Competitivity), supported
under grant
Development and by Innovation
the Spanish
UNLE13-3E-1578 Secretary
(Ministry of the of State
National
of Economy tructure Protection (COM/2006/786).
and
for Competitivity),
Research, under grant
Development UNLE13-3E-1578
and Innovation (Ministry of the National
of Technical
Economy
presented
tructure
established the
ProtectionEuropean
aa global framework Programme
(COM/2006/786). for the forThis
This
protection
programme
Critical Infras-
programme
of critical
Programme
and for
Competitivity), Fostering Excellence
under grant in Scientific
UNLE13-3E-1578 ofand
the National established global framework for the protection of critical
Programme for
and Competitivity),
Research
Programme -FEDER
Fostering
under
funds,
for Fostering and
Excellence
grant
by the
in Scientific
UNLE13-3E-1578
Excellence Spanish Nationalofand
in Scientific
and Technical
the Technical
National
Cybersecurity
tructure
established Protection
infrastructures. a global
Later, (COM/2006/786).
framework
in 2009, for
the the This
Communication programme
protection of critical COM
Research -FEDER funds, and by the Spanish Nationaland Cybersecurity infrastructures.
established
infrastructures. Later,
a global
Later, in
framework 2009,
2009,for
incybersecuritythe
thethe Communication
protection
Communication of COM
critical
COM
Programme
Research for Fostering
Institute (INCIBE),
-FEDER through
funds, and Excellence
the 17th
by the in Scientific
Addendum
Spanish Nationalof the Technical
Framework
Cybersecurity 2009/149
2009/149 discussed
discussed the
the cybersecurity threats
threats in
in this
this area
area
Institute (INCIBE), through the 17th Addendum of the Framework infrastructures. Later, incybersecurity
2009, the Communication COM
Research (INCIBE),
Agreement
Institute
Agreement
-FEDER
betweenfunds,
between
INCIBE and the
through
INCIBE
by the
and
and
theSpanish
17th
the
University
Addendum
University
National
ofofLeón.
of
Cybersecurity
the
León.
Framework 2009/149 discussed the threats in this area
Institute (INCIBE), through the 17th Addendum
Agreement between INCIBE and the University of León. of the Framework 2009/149 discussed the cybersecurity threats in this area
Agreement between INCIBE and the University of León.
Copyright © 2017 IFAC 12690
Copyright
2405-8963 © 2017 IFAC 12690
Copyright © 2017, IFAC (International Federation of Automatic Control)
2017 IFAC 12690Hosting by Elsevier Ltd. All rights reserved.
Peer review©under
Copyright 2017 responsibility
IFAC of International Federation of Automatic
12690Control.
10.1016/j.ifacol.2017.08.2151
Proceedings of the 20th IFAC World Congress
12180
Toulouse, France, July 9-14, 2017 Manuel Domínguez et al. / IFAC PapersOnLine 50-1 (2017) 12179–12184

and action plan to improve prevention, response and re- education and real practice in applied cybersecurity for
covery. Finally, the Directive 2016/1148 ”concerning mea- critical infrastructures.
sures for a high common level of Security of Network and
Information Systems across the Union” (NIS) establishes From an educational point of view, the laboratory also
minimum security requirements for the operators of essen- uses the technological platform and functionalities of the
tial services. At a national level, the Spanish Law 8/2011 Remote Laboratory of Automatic Control of the Univer-
established the regulatory framework for critical infras- sity of León, http://lra.unileon.es (Prada et al., 2015).
tructure protection, defining them and creating a National The remote laboratory, which was also developed by the
Centre for Critical Infrastructure Protection (CNPIC) to SUPPRESS research group, is a platform that enables the
be in charge of the initiative, coordination and monitoring remote interaction with industrial physical systems, either
of the actions related to the protection of the national crit- real or simulated, to students, faculty, researchers or pro-
ical infrastructures. The CNPIC have presented since 2014 fessionals interested in automation, control and monitoring
strategic sector plans for the following sectors: electricity, systems. Moreover, the remote laboratory provides a set
gas, oil, nuclear, finance, water, transport, space, and of tools that enable their collaborative use. The remote
chemical industry. Likewise, the European Union included laboratory has already been used for limited experiences
the security as one of the 7 challenges of its Framework in the field of cybersecurity of industrial control systems
Programme for Research and Technological Development (Canto et al., 2015).
2014-2020 (Horizon 2020), emphasizing the protection of Regarding the educational needs in the cybersecurity field,
critical infrastructures and the cybersecurity. the proposed laboratory makes it possible to test architec-
The cause of this recent effort is that industrial control sys- tures in the four fields described above, test the vulnera-
tems (ICS), which control the operation of industries and bilities of devices, protocols and software, use intelligent
infrastructures of the aforementioned critical sectors, were data analysis to detect attacks, apply forensic analysis to
usually designed for an isolated operation. As a result, the industrial equipment or test the identification and removal
security aspects were ignored by the ICS staff and control of specific malware.
systems traditionally lacked security measures to protect The paper is structured as follows: The research and edu-
them from external threats, caused by the interconnection cational aims are exposed in Section 2. The architecture of
to other systems. However, the development of information the laboratory is described in Section 3. In section 4, some
and communication technologies has led to a wider connec- educational activities with the laboratory are presented.
tivity of control systems and devices that work along with Finally, conclusions are discussed in Section 5.
potentially remote software for Supervisory Control and
Data Acquisition (SCADA). This interconnection exposes
them to external threats that were not previously consid- 2. RESEARCH AND EDUCATIONAL GOALS
ered (Knapp and Langill, 2016; Stouffer et al., 2011).
With these premises and as a consequence of the projects The Laboratory of Critical Infrastructure Cybersecurity
developed for the National Institute of Cybersecurity (IN- (CICLab) is oriented to both research and education, as
CIBE), the SUPPRESS research group of the University can be expected from a university laboratory. The research
of León applied for a research infrastructure to develop objectives of the laboratory follow those stated in the
a Laboratory for Research on Critical Infrastructure Cy- Horizon 2020 Programme and the Spanish National R&D
bersecurity (CICLab) in the context of the R&D National plan 2013-2016 in the area of cybersecurity.
Plan of 2013. This laboratory was granted by the Secretary
of State for Research, Development and Innovation in The Horizon 2020 work programme proposes to study the
November 19, 2014. dependencies between critical infrastructures, communica-
tion networks and the control and monitoring information
The laboratory was designed to allow flexibility for the ex- systems. The aim is focused on the analysis and proposal
perimentation in cybersecurity of both the specific devices of strategies for the evaluation of critical services, on the
and communication networks and the general solutions analysis of the cascade effects caused by an incident, and
and configurations of control and monitoring systems. For on anomaly detection. The work programme also states
that reason, different field, control and monitoring tech- the need for field tests and the adaptation of general well-
nologies have been included in the laboratory, all of them known security solutions into specific ones for industrial
widely used in four sectors: industry, energy management, control systems. The work programme emphasizes as well
building management and smart cities. The diversity of the security challenges posed by the proliferation of smart
equipment and the adaptability of the management tools meters in energy distribution networks or smart grids. On
make it possible to create different settings that simulate the other hand, the Spanish Plan of Scientific and Tech-
real situations on the critical infrastructure control sys- nical Research and Innovation 2013-2016 also considers
tems. Specifically, it is possible to set up configurations cybersecurity in control centers and critical infrastructures
that use typical communication protocols at the different an important security challenge.
levels of automation of industrial control systems, energy
management systems or building management systems. As a result, the following research lines are proposed in
Furthermore, the laboratory has all the needed elements to the framework of the cybersecurity laboratory:
perform vulnerability analyses, penetration testing, traffic (1) To conduct experimental studies about cybersecu-
monitoring, etc. in different points of the automation, rity in industrial control systems and to develop a
locally or remotely. The ability to perform practical tasks methodology for vulnerability evaluation in devices,
on real equipment and systems narrows the gap between protocols and dedicated software.

12691
Proceedings of the 20th IFAC World Congress

Toulouse, France, July 9-14, 2017 Manuel Domínguez et al. / IFAC PapersOnLine 50-1 (2017) 12179–12184 12181

(2) To develop intelligent data analysis techniques ap- the only university laboratory in that network. The other
plied to cybersecurity of industrial control systems. ones are private laboratories focused on different specific
(3) To develop intrusion and vulnerability detection sys- aspects of industrial systems security. This network might
tems with a passive approach by means of advanced promote technology transfer.
detection rules and well-known open IDS tools.
(4) To develop methods/tools for evidence gathering 3. DESCRIPTION OF THE LABORATORY
from industrial equipment to enable forensic analysis.
(5) To develop methods and procedures for prevention For the design of the laboratory, four scenarios were
and defense from attacks in critical infrastructures. considered for cybersecurity experimentation: industrial
With regard to the educational goals, they are selected to control systems, building management systems, energy
address two challenges: management systems and smart city sensor networks (see
Fig. 1). These subsystems are structured with a common
(1) Training of Master’s degree university students. set of utilities and functionalities. The features of these
(2) Training of qualified professionals (lifelong learning). subsystems are described in the following paragraphs.
In both cases, it is necessary to develop learning envi-
ronments that provide access to real industrial control
systems, which enable realistic practical experiences with- Industrial subsystem: The industrial control system fol-
out safety concerns in equipment or other elements. Of- lows the automation pyramid with the ISA-95 levels from
ten, in this area, simulated systems are used for training field to management (see Fig. 2), including usual devices
and experimentation. Although simulated systems are less and technologies at every level: sensors and transmitters,
costly and easier to manage, they generally constrain the variable frequency drives, PLCs, SCADA and Historian
scope of the experiences and hide certain particularities software, etc. The control structure of this subsystem uses
of industrial control systems. The use of a comprehensive a main ring with two PLCs. The PLCs are connected to
infrastructure based on real and commonly used elements their remote input/output devices, exchanging informa-
is advisable to improve the versatility of the laboratory tion by means of different industrial Ethernet protocols,
and to narrow the knowledge gap between IT and in- such as Modbus TCP, Ethernet/IP, Profinet, etc. The
dustrial professionals (Morris et al., 2011a). Indeed, the remote devices manage transmitters and actuators that
pedagogical impact of these testbeds has been reported to are either directly wired or connected through different
be significant by other authors (Morris et al., 2011b). fieldbuses: Modbus RTU, ASi, DeviceNet, etc. Further-
more, additional secondary rings are created to manage
Due to the aforementioned reasons, the use of a laboratory protocol exchanges by means of a set of gateways. An
with real industrial equipment and software is the pro- industrial SCADA systems monitors the controllers. A
posed approach to fulfill the following educational goals: specific data historian software can be used to aggregate
and analyze data. A flexible routing/firewalling structure
(1) Introduction to industrial control systems: This goal
enables different network setups enforcing zone separation
is interesting for master’s degree students, who gen-
and deep packet inspection. A picture of the devices used
erally have a general information technology back-
in the industrial subsystem is shown in Fig. 3.
ground. Acquiring knowledge about the elements and
concepts used in control systems might help to bridge
the gap with ICS staff. Building management subsystem: This subsystem also
(2) Introduction to cybersecurity: This must be an edu- replicates the complete architecture of a typical BMS. Sev-
cational goal of the continuing education courses for eral technologies have been included: LonWorks, BACnet,
professionals. The first step of any lifelong learning KNX, EnOcean, Zigbee, etc. For that purpose, sensors,
programme in cybersecurity for critical infrastruc- actuators, controllers, gateways and software are available.
tures must be focused on introducing the basic se- A specific SCADA for building is used for monitoring. The
curity concepts, practices and tools. devices included in the building management system are
(3) Understanding common vulnerabilities in critical in- shown in Fig. 4.
frastructures: Both from a global perspective and
focused on the four environments included in the
laboratory. Energy management subsystem: This subsystem has been
(4) Learning to identify threats and deploy countermea- designed to simulate different parts of the electricity grid,
sures: A student should learn to assess the vulnera- such as distribution and electricity end-use. On the one
bilities that affect each asset, to isolate those assets hand, it implements the control and monitoring archi-
into securable groups and to establish the appropriate tecture of a distribution system, including a distribution
security controls to enforce the expected behavior. substation and a transformer station. In the distribution
(5) Learning to monitor security events: A student should substation, a communication ring based on IEC 61850
understand how to passively collect information from protocol has been deployed in order to link electricity
the network and analyze it. analyzers, advanced meters, protection relays, switchgear
The CICLab has been included in the Spanish Network of devices and remotely-controlled management relays.
Industrial Laboratories (https://rnli.incibe.es/), led by the On the other hand, the transformer substation consists
Spanish Institute of Cybersecurity (INCIBE), whose aim of two main parts. The first one is operated by the
is to gather those laboratories that can be used for security electricity supplier and includes energy meters, protection
experimentation in the area of critical infrastructures. It is and management relays, which are remotely controlled

12692
Proceedings of the 20th IFAC World Congress
12182
Toulouse, France, July 9-14, 2017 Manuel Domínguez et al. / IFAC PapersOnLine 50-1 (2017) 12179–12184

Fig. 1. Cybersecurity lab scenarios: industrial control systems, building management systems, energy management
systems and smart city sensor networks.

Fig. 2. Automation pyramid in industrial control systems.

from the electricity control center using Modbus and


IEC 60870-5-104 communication protocols. The second
one, still incomplete in the laboratory, is operated by
the consumer and incorporates basically protection and
operation switchgears. Consumer facilities can also include
intelligent circuit breakers and protection relays as well as
energy management devices in each internal line.
Also, an electricity control center manages the operation
of the different elements of the distribution infrastructure Fig. 3. Industrial subsystem.
by means of an energy and outage management system
(EMS/OMS), which communicates through IEC 60870-
5-104. The distribution system is linked to both the Finally, a smart meter network that measures power
electricity control center and the final consumers. consumption and monitors energy demand is added. It

12693
Proceedings of the 20th IFAC World Congress
Toulouse, France, July 9-14, 2017 Manuel Domínguez et al. / IFAC PapersOnLine 50-1 (2017) 12179–12184 12183

Fig. 5. Electric cabinet.


4. EDUCATIONAL ACTIVITIES

The Laboratory of Critical Infrastructures Cybersecurity


(CICLab) at the University of León was launched during
the year 2015. A set of hands-on educational activities have
Fig. 4. Building management subsystem. been designed in order to develop the previously discussed
educational goals in the academic year 2016/2017.
includes data concentrators and a central management The variety of software, technologies and devices available
system that communicates using PRIME protocol. in the laboratory makes it possible to design a set of
practical tasks for any introductory course of automation
or control systems, either from a general point of view or
focused on any of the four types of critical infrastructures
Smart city subsystem: The core of this system is a wire- included in the laboratory. The educational activity is
less sensor network that relies on the IEEE 802.15.4 stan- in both cases focused on identifying and understanding
dard. The sensors, physically distributed in and around the elements, network architectures and industrial pro-
the laboratory measure different variables such as noise, tocols/fieldbuses commonly found in automation. These
luminosity, gases (CO2 , CO, N O2 , etc.) or other weather- ideas are consolidated through tasks with the PLC (such
related variables. Other IoT (Internet of things) devices as configuring I/O and network or programming simple
can be added to this subsystem. control strategies) and the SCADA (building and using
monitoring interfaces). These introductory courses are in-
The computing infrastructure has been designed with teresting for cybersecurity specialists without background
the aim to provide enough flexibility for experimentation in automation.
and training. The main goals are: a flexible network
segmentation (so that different zones and conduits can Furthermore, the introduction of cybersecurity concepts in
be established), the ability to run security tests in any a familiar environment, such as the subsystems included in
point of the architecture and the ability to acquire and CICLab, allows a gradual learning by the industrial staff.
store all the potentially interesting information (network E.g., the basic concepts, practices and tools can be shown
traffic captures, events, logs, process operation data, etc.) by means of examples in the industrial control subsystem.
for further analysis. For that purpose, the laboratory This is the target of the activities described in the rest of
has different industrial network devices, including, e.g., the section.
managed and unmanaged switches, firewalls (some with
With regard to the understanding of common vulnerabil-
deep packet inspection capabilities), network taps, etc.
ities, the educational activity is focused on the analysis
Furthermore, the laboratory makes extensive use of server
of industrial-oriented protocols and their security weak-
virtualization, thanks to 6 servers with dual Intel Xeon
nesses. The reason is that the particular nature of the
8-core processors and a large data storage capacity.
communications among their elements is a common source
Additionally, the power supply of the four subsystems of threats to the control systems of critical infrastructures.
described above is performed through 4 power lines (two Besides host-to-host communication using familiar tech-
16A single-phase, one 32A single-phase and one 32A three- nologies in general IT networks, a set of specific industrial
phase) that are replicated to ensure the functional safety network protocols is used at every automation level. The
of the laboratory and their elements. They are managed aim of these protocols is generally oriented to availabil-
by an electric cabinet (see Fig. 5) with includes remotely ity and they usually lack security measures related to
operated switchgears. confidentiality or integrity. For that reason, the proposed

12694
Proceedings of the 20th IFAC World Congress
12184
Toulouse, France, July 9-14, 2017 Manuel Domínguez et al. / IFAC PapersOnLine 50-1 (2017) 12179–12184

educational activity is to to sniff a protocol by means of a by the network management tools, allows users to con-
serial/Ethernet tap (such as NetDecoder or CanAnalyzer). figure and simulate realistic security scenarios in control
The students have to interpret the protocol traffic to find systems of critical infrastructures. In this sense, it is pos-
the major weaknesses. Examples of malicious modifica- sible to configure test scenarios on a large set of commu-
tions to the captured frames are explained, showing that nications protocols that are commonly used in industrial
if injected, they can be used to write on PLC output automation, energy management or building management
variables, cause a denial of service (by flooding the network systems. The laboratory users can also work with differ-
or stopping the PLC), etc. ent control and monitoring technologies. Furthermore, the
laboratory includes hardware and software elements to
With regard to the isolation of relevant assets into secur-
enable vulnerability detection in equipment, tracking of
able groups, the students need to understand how to define
the network traffic, intrusion detection, etc. in different
groups by function, process, control loop, etc. There are
points of the critical infrastructures, as well as the ability
several models proposed for this matter, being the most
to perform this tests locally or remotely. Further work
relevant the zone-and-conduit model proposed in the IEC-
includes the assessment of the educational value of the
62443 standard. The flexible structure provided for the
laboratory by means of the analysis of students’ feedback.
laboratory makes it possible that students can propose
different network segmentations according to specific pre-
requisites. REFERENCES

In order to establish the network zones, it is necessary Brettel, M., Friederichsen, N., Keller, M., and Rosenberg,
to apply the appropriate security controls. Generally, fire- M. (2014). How virtualization, decentralization and
walls are used for this purpose. For that reason, another network building change the manufacturing landscape:
activity proposed to the students will be the firewall selec- An industry 4.0 perspective. International Journal of
tion, placement and configuration to enforce the defined Mechanical, Industrial Science and Engineering, 8(1),
requirements. The students can use the available equip- 37–44.
ment: firewalling and routing software, industrial firewall Canto, C.J.D., Prada, M.A., Fuertes, J.J., Alonso,
appliances, or the firewalls with deep packet inspection S., and Domı́nguez, M. (2015). Remote labo-
(DPI, which can filter protocols such as Modbus TCP or ratory for cybersecurity of industrial control sys-
Ethernet/IP at the application layer). To configure the tems. IFAC-PapersOnLine, 48(29), 13 – 18. doi:
firewall, the students need to set the appropriate rules con- http://dx.doi.org/10.1016/j.ifacol.2015.11.206. IFAC
sidering IP addresses, ports or (for the DPI case) protocol Workshop on Internet Based Control Education
codes and variables. IBCE15, Brescia (Italy), November 4-6, 2015.
Knapp, E.D. and Langill, J.T. (2016). Industrial Network
The proposed activities with regard to security informa- Security, Second Edition: Securing critical infrastruc-
tion monitoring are the installation and configuration of ture networks for smart grid, SCADA, and other In-
IDSs (Intrusion Detection Systems, such as Snort or Bro) dustrial Control Systems. Syngress.
and SIEMs (Security Information and Event Management, Lee, J., Kao, H.A., and Yang, S. (2014). Service innovation
such as AlientVault OSSIM). These activities show the and smart analytics for industry 4.0 and big data
students how to detect security-related events in control environment. Procedia CIRP, 16, 3–8.
networks by monitoring security events obtained from traf- Morris, T., Srivastava, A., Reaves, B., Gao, W., Pavurapu,
fic and logs. These systems also enable further analysis of K., and Reddi, R. (2011a). A control system testbed
the stored events, allowing lecturers to introduce the usual to validate critical infrastructure protection concepts.
stages of an attack. International Journal of Critical Infrastructure Protec-
tion, 4(2), 88–103.
5. CONCLUSIONS Morris, T., Vaughn, R., and Dandass, Y.S. (2011b). A
testbed for scada control system cybersecurity research
and pedagogy. In Proceedings of the Seventh Annual
The field of cybersecurity of industrial control systems is Workshop on Cyber Security and Information Intelli-
attracting a growing interest. In this paper, the Critical gence Research, 27. ACM.
Infrastructure Cybersecurity Laboratory at the University Nicholson, A., Webber, S., Dyer, S., Patel, T., and Janicke,
of León has been presented. This laboratory has been H. (2012). SCADA security in the light of cyber-
launched during the year 2015. It has been designed with warfare. Computers & Security, 31(4), 418 – 436. doi:
the aim of achieving flexible experimentation on security http://dx.doi.org/10.1016/j.cose.2012.02.009.
aspects of the equipment, the communication protocols Prada, M.A., Fuertes, J.J., Alonso, S., Garcı́a, S., and
and the whole configuration and operation of control and Domı́nguez, M. (2015). Challenges and solutions in
monitoring systems. The applications of this laboratory remote laboratories. application to a remote laboratory
may range from education to research and testing new of an electro-pneumatic classification cell. Computers &
technologies. For that purpose, the laboratory includes Education, 85, 180–190.
heterogeneous field, control and monitoring elements that Stouffer, K., Falco, J., and Scarfone, K. (2011). Guide
are commonly used in four prominent critical infrastruc- to industrial control systems (ICS) security. Technical
tures: industrial control systems, energy management sys- Report 82, NIST special publication.
tems, building management systems and smart city sensor Wright, M.A. (2015). Improving cybersecurity workforce
networks. capacity and capability. Information Systems Security
The variety of available control and monitoring systems Association (ISSA) Journal, 14–20.
and related equipment, as well as the flexibility provided

12695

Das könnte Ihnen auch gefallen