SlideShare a Scribd company logo
1 of 15
71st Annual Instrumentation and Automation Symposium for the Process Industries
Network Reliability Monitoring Using
Statistical Modeling and Data Analysis
to Measure the Health and Security of
ICS
Jim Gilsinn
Kenexis
71st Annual Instrumentation and Automation Symposium for the Process Industries
Jim Gilsinn
• Senior Investigator, Kenexis Consulting
– ICS Network & Security Assessments &
Designs
– Developer, Dulcet Analytics, Reliability
Monitoring Tool
• International Society of Automation (ISA)
– ISA99 Committee, Co-Chair (ISA/IEC 62443
Standard Series)
– ISA99-WG2, Co-Chair (ICS Security Program)
Kenexis
71st Annual Instrumentation and Automation Symposium for the Process Industries
Overview
• Introduction
• Communications Method Affects Metrics
• Network Security Monitoring
• Communications in ICS/SCADA Networks
• What Can Network Reliability Monitoring
Show?
• When & How to Test
• ICS/SCADA Performance Metrics
• MITM Example
• Summary
71st Annual Instrumentation and Automation Symposium for the Process Industries
Introduction
• Determinism is one key req. for ICS/SCADA
• Determinism can be affected by many factors:
– Individual device performance
– Network performance
– Intra- & inter-system interactions
– Security settings
• Some factors can be planned for
• Some factors need to be measured in place
• Network measurements need to be tailored
for ICS/SCADA
71st Annual Instrumentation and Automation Symposium for the Process Industries
Comm. Method Affects Metrics
Master/Slave Publish/Subscribe Report by Exception
71st Annual Instrumentation and Automation Symposium for the Process Industries
What is NSM?
• “the collection, analysis, and escalation of
indications and warnings to detect and
respond to intrusions.”
• “a way to find intruders on your network and
do something about them before they
damage your enterprise.”
The Practice of Network Security Monitoring, Richard Bejtlich
71st Annual Instrumentation and Automation Symposium for the Process Industries
When NSM Won’t Work?
• “…if you can’t observe the traffic that you
care about, NSM will not work well.”
• “Node-to-node activity, though, is largely
unobserved at the network level.”
The Practice of Network Security Monitoring, Richard Bejtlich
71st Annual Instrumentation and Automation Symposium for the Process Industries
Example ICS/SCADA Network:
Upper-Level Architecture
• Most Traffic
Crosses
Zone
Boundaries
• Less ICS-
Specific
Protocols
• More
Common
Platforms
71st Annual Instrumentation and Automation Symposium for the Process Industries
Example ICS/SCADA Network:
Lower-Level Architecture
• Most Traffic
Remains
Within
Zone
• Mostly ICS-
Specific
Protocols
• ICS-
Specific
Platforms
71st Annual Instrumentation and Automation Symposium for the Process Industries
~1ms Mean Measured Packet Interval
±10µs Jitter*
Beat Patter @ ~30s
Total Test ~65s
So… What Can You See?
Expected Frequency *Jitter is Variation From Expected Frequency
71st Annual Instrumentation and Automation Symposium for the Process Industries
So… What Can You See?
• OS & application operations
– Garbage collection
– Antivirus checks & updates
– On-screen operator commands
• Network anomalies
– Network EMI interference
– Signal degradation
– Flaky connections
• Security-related incidents
71st Annual Instrumentation and Automation Symposium for the Process Industries
When & How To Test
• Baseline Testing
– FAT, SAT, Commissioning
– After major changes
• Periodic Testing vs. Real-Time Testing
• Automated Testing & Analysis
71st Annual Instrumentation and Automation Symposium for the Process Industries
ICS/SCADA Performance Metrics
• Easy
– Mean
– Minimum
– Maximum
• Medium
– Standard Deviation
• More Complex and/or Compute Intensive
– FFT
– Convolution
– Correlation
71st Annual Instrumentation and Automation Symposium for the Process Industries
MITM Example
71st Annual Instrumentation and Automation Symposium for the Process Industries
Summary
• NSM is good
– If you are doing it great
– If not, maybe you should
• NSM can’t detect everything, especially for
ICS/SCADA networks
• There are ways to measure network reliability in
the lower layers
– ICS/SCADA networks are particularly well suited
to this
– Relatively simple metrics are good enough to start
• Testing can show more than just security events

More Related Content

Viewers also liked

#4 formal methods – predicate logic
#4 formal methods – predicate logic#4 formal methods – predicate logic
#4 formal methods – predicate logicSharif Omar Salem
 
January 28 (education)
January 28 (education)January 28 (education)
January 28 (education)AIMEC Reporter
 
Diseño plan estrategico de rrhh
Diseño plan estrategico de rrhhDiseño plan estrategico de rrhh
Diseño plan estrategico de rrhhmariogomezprieto
 
Presentation1
Presentation1Presentation1
Presentation1alwi12352
 
Los cambios en la organización
Los cambios en la organizaciónLos cambios en la organización
Los cambios en la organizaciónPaulo Arieu
 

Viewers also liked (6)

#4 formal methods – predicate logic
#4 formal methods – predicate logic#4 formal methods – predicate logic
#4 formal methods – predicate logic
 
January 28 (education)
January 28 (education)January 28 (education)
January 28 (education)
 
Microservices
MicroservicesMicroservices
Microservices
 
Diseño plan estrategico de rrhh
Diseño plan estrategico de rrhhDiseño plan estrategico de rrhh
Diseño plan estrategico de rrhh
 
Presentation1
Presentation1Presentation1
Presentation1
 
Los cambios en la organización
Los cambios en la organizaciónLos cambios en la organización
Los cambios en la organización
 

More from Jim Gilsinn

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToJim Gilsinn
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!Jim Gilsinn
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Jim Gilsinn
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingJim Gilsinn
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
 
You name it, we analyze it
You name it, we analyze itYou name it, we analyze it
You name it, we analyze itJim Gilsinn
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerJim Gilsinn
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Jim Gilsinn
 

More from Jim Gilsinn (15)

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance Testing
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
You name it, we analyze it
You name it, we analyze itYou name it, we analyze it
You name it, we analyze it
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Network Reliability Monitoring Using Statistical Modeling and Data Analysis to Measure the Health and Security of ICS

  • 1. 71st Annual Instrumentation and Automation Symposium for the Process Industries Network Reliability Monitoring Using Statistical Modeling and Data Analysis to Measure the Health and Security of ICS Jim Gilsinn Kenexis
  • 2. 71st Annual Instrumentation and Automation Symposium for the Process Industries Jim Gilsinn • Senior Investigator, Kenexis Consulting – ICS Network & Security Assessments & Designs – Developer, Dulcet Analytics, Reliability Monitoring Tool • International Society of Automation (ISA) – ISA99 Committee, Co-Chair (ISA/IEC 62443 Standard Series) – ISA99-WG2, Co-Chair (ICS Security Program) Kenexis
  • 3. 71st Annual Instrumentation and Automation Symposium for the Process Industries Overview • Introduction • Communications Method Affects Metrics • Network Security Monitoring • Communications in ICS/SCADA Networks • What Can Network Reliability Monitoring Show? • When & How to Test • ICS/SCADA Performance Metrics • MITM Example • Summary
  • 4. 71st Annual Instrumentation and Automation Symposium for the Process Industries Introduction • Determinism is one key req. for ICS/SCADA • Determinism can be affected by many factors: – Individual device performance – Network performance – Intra- & inter-system interactions – Security settings • Some factors can be planned for • Some factors need to be measured in place • Network measurements need to be tailored for ICS/SCADA
  • 5. 71st Annual Instrumentation and Automation Symposium for the Process Industries Comm. Method Affects Metrics Master/Slave Publish/Subscribe Report by Exception
  • 6. 71st Annual Instrumentation and Automation Symposium for the Process Industries What is NSM? • “the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions.” • “a way to find intruders on your network and do something about them before they damage your enterprise.” The Practice of Network Security Monitoring, Richard Bejtlich
  • 7. 71st Annual Instrumentation and Automation Symposium for the Process Industries When NSM Won’t Work? • “…if you can’t observe the traffic that you care about, NSM will not work well.” • “Node-to-node activity, though, is largely unobserved at the network level.” The Practice of Network Security Monitoring, Richard Bejtlich
  • 8. 71st Annual Instrumentation and Automation Symposium for the Process Industries Example ICS/SCADA Network: Upper-Level Architecture • Most Traffic Crosses Zone Boundaries • Less ICS- Specific Protocols • More Common Platforms
  • 9. 71st Annual Instrumentation and Automation Symposium for the Process Industries Example ICS/SCADA Network: Lower-Level Architecture • Most Traffic Remains Within Zone • Mostly ICS- Specific Protocols • ICS- Specific Platforms
  • 10. 71st Annual Instrumentation and Automation Symposium for the Process Industries ~1ms Mean Measured Packet Interval ±10µs Jitter* Beat Patter @ ~30s Total Test ~65s So… What Can You See? Expected Frequency *Jitter is Variation From Expected Frequency
  • 11. 71st Annual Instrumentation and Automation Symposium for the Process Industries So… What Can You See? • OS & application operations – Garbage collection – Antivirus checks & updates – On-screen operator commands • Network anomalies – Network EMI interference – Signal degradation – Flaky connections • Security-related incidents
  • 12. 71st Annual Instrumentation and Automation Symposium for the Process Industries When & How To Test • Baseline Testing – FAT, SAT, Commissioning – After major changes • Periodic Testing vs. Real-Time Testing • Automated Testing & Analysis
  • 13. 71st Annual Instrumentation and Automation Symposium for the Process Industries ICS/SCADA Performance Metrics • Easy – Mean – Minimum – Maximum • Medium – Standard Deviation • More Complex and/or Compute Intensive – FFT – Convolution – Correlation
  • 14. 71st Annual Instrumentation and Automation Symposium for the Process Industries MITM Example
  • 15. 71st Annual Instrumentation and Automation Symposium for the Process Industries Summary • NSM is good – If you are doing it great – If not, maybe you should • NSM can’t detect everything, especially for ICS/SCADA networks • There are ways to measure network reliability in the lower layers – ICS/SCADA networks are particularly well suited to this – Relatively simple metrics are good enough to start • Testing can show more than just security events