Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
24 views33 pages

Attacks

Uploaded by

alekhavin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views33 pages

Attacks

Uploaded by

alekhavin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Vulnerabilities, Attacks and

Countermeasures
Dr. Sriram Sankaran
Associate Professor and Deputy Director,
Center for Cybersecurity Systems and Networks
Amrita Vishwa Vidyapeetham
Amritapuri, Kollam-690525
Overview of the Presentation
• Primer on Threats, Vulnerability and Risk
• Primer on Attacks and Countermeasures
• IoT Attacks
• Use of Systematic Approaches
Goals of Information Assurance
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
• Availability
• Resilience
• Safety
Resiliency and Safety in Cyber-Physical
Systems
• Resiliency
• A resilient control system is one that maintains state awareness and an
accepted level of operational normalcy in response to disturbances, including
threats of an unexpected and malicious nature
• Safety
• The condition of being safe from undergoing or causing hurt, injury or loss
• Need for engineering approach that merges both attack and fault tree
analysis to identify and resolve mode failures and attack vectors
Threats in IoT
• Information assurance threats to management and application data
• New Threats
• Threat to physical systems, hardware, software quality, environmental, supply
chain and others in security and safety domains
• Physical reliability and resilience threats
• Threats to control system transfer functions, state estimation filters and inner
control loop artifacts
Vulnerabilities
Vulnerabilities in IoT
• Identify a weakness, either in the design, integration or operation of a
system or device
• Deficiencies in a device’s physical protection, software quality,
configuration, suitability of protocol security
• Attackers aware of the vulnerability potentials
• Unearth the vulnerabilities that are easiest, least costly or fastest to exploit
• Malicious hacking drives a for-profit marketplace of its own in dark
web settings
• System Compromise as an outcome for discovering vulnerabilities
Risks
• Qualitative or Quantitative methods for Risk Evaluation
• Depends on the probability of a particular event, attack or condition
• Vulnerabilities in Desktop/laptop/Smart phone based operating
systems
• Risk Management through Threat Modeling
• Impact and Overall cost of a compromise
• How valuable the target may be to attackers
• Anticipated skill and motivations of the attackers
• A priori knowledge of a system’s vulnerabilities
Common IoT Attack Types
• Wired and wireless scanning and mapping attacks
• Protocol attacks
• Eavesdropping attacks (loss of confidentiality)
• Cryptographic algorithm and key management attacks
• Spoofing and masquerading (authentication attacks)
• Operating System and application integrity attacks
• Denial of Service and jamming
• Physical Security attacks (for example: tampering, interface exposures)
• Access Control Attacks (Privilege Escalation)
Ecosystem of Attacks, Vulnerabilities and
Controls
Attack Trees
• Numerous Attack vectors and surfaces
• Zero-day vulnerabilities
• Interconnected set of Attacks
• Attack trees
• Conceptual diagrams showing how an asset or target might be attacked
• Model the interconnected characteristics
• Visualize, communicate and understand the sequence of vulnerability
Building an attack tree for Unmanned Aircraft Systems (UAS)
Attack Trees: Expanding on Corrupt Navigation Database
Attack trees: Expanding Further
Fault Trees and CPS
• Safety and reliability engineering
• Different from attack trees
• Used in fault tree analysis (FTA)
• History
• Originated in 1960 at Bell labs
• Missile systems prone to frequent failures
• Adopt FTA to achieve safety assurance
• Redundancy designed into many aircraft systems
Difference between Fault and Attack Trees
• Fault Trees are not based on intelligently planned attacks
• Fault Trees traversed based on stochastic processes
• Each fault tree leaf is completely independent
Merging fault and attack tree analysis
• Integrate fault-tree analysis into safety-critical IoT device and system
engineering methodologies
• IoT use cases need to be represented in FTA
• Need for security threat modelling for secure and fault-tolerant
design
• Understanding the interplay between Safety and Security
• Safety mitigations that don’t undermine security controls
• Security mitigations that don’t diminish safety controls
Today’s IoT Attacks
• Miller, Charlie and Valesek, Chris. Remote Exploitation of an
Unaltered Passenger Vehicle. 10 August 2015.
• Data Exchange On The CAN Bus I, Self-Study Programme 238.
Available at http:// www.volkspage.net/technik/ssp/ssp/SSP_238.pdf.
Attacks against Enterprise IoT
• Wireless reconnaissance and mapping
• Security protocol attacks
• Physical security attacks
• Application security attacks
Threat modelling an IoT system
Case Study: Smart Parking System
• Consumer-facing service
• Payment Flexibility
• Entitlement Enforcement
• Trend Analysis
• Demand-response pricing
Smart Parking System
• Security Goals
• Maintain integrity of all data collected within the system
• Maintain confidentiality of sensitive data within the system
• Maintain the availability of the system as a whole and each of its individual
components
Step 1:
Sensor data Video Streams Payment data
Identify the
assets
Lot sensors Sensor gateway IP Camera

Parking
Analytics System Kiosk
application

Infrastructure
communications
equipment
Step 2: System/Architecture Overview

Use case 2: Parking


Use case 1:
enforcement officer
Customer pays for
is alerted to non-
time in parking spot
payment incident
Architectural
Diagram
Technology/Platform Overview
Step 3:
Decompose
the IoT
system
Parking Management application

Smartphone application
Entry Kiosk
points for Sensor gateway administrative account
the System IP cameras

Enforcement application
Step 4: Identify threats

Spoofing Tampering Information


Repudiation
identity with data Disclosure

Physical
Denial of Privileged Social
Security
Service Elevation Engineering
bypass

Supply chain
issues
Smart
Parking
Threat
Matrix
Step 5: Document the threats
• Parking thief charges legitimate customer for parking time by
accessing that customer’s account
• Parking thief receives free parking through unauthorized access to
backend smart parking application
• Parking thief receives free parking by asserting that the system
malfunctioned
Step 6: Rate the threats

Damage Reproducibility Exploitability

Affected users Discoverability


Smart Parking: Threat Risk Ranking

You might also like