Introducing a forensics data type taxonomy of acquirable artefacts from PLCs

一、摘要

本文研究了存储在PLC上的特定数据类型,并描述了基于可获取人工的取证数据类型分类法。数据采集测试主要使用第三方通信库进行,该通信库利用PLC专有的工业通信协议来利用存储在每个被测PLC内存结构中的数据,对来自两个制造商的三个不同PLC进行了检查。

二、介绍

本文的贡献可以概括为:
1) 检查和定义可从PLC获取的数据,并确定这些组件中包含的特定信息;
2) 检查PLC供应商和模型之间可获取数据的差异;
3) 提供PLC数据类型分类方法,为ICS取证能力开发人员和取证调查人员提供多种优势。

三、实验评估

(一)实验台设置

我们选择了来自两个不同制造商的三个PLC;配备345-1 Profinet通信处理器的西门子S7-300 315-2 DP、西门子S7-1500 1517-3 PN/DP CPU和罗克韦尔艾伦布拉德利ControlLogix 1756-L71/B。选择这三个PLC使我们能够利用二维可获取的数据来评估差异;1) 比较PLC供应商(西门子和罗克韦尔)2) 比较同一供应商(西门子S7-300和S7-1500)的PLC型号,选择这两个制造商是因为它们在全球PLC市场中占有最大份额,然后对从每个PLC获取的数据源进行详细评估。
实验台设置

图1 PLC实验室试验台设置

实验室试验台设置如图1所示,三个PLC保持不变。在西门子和罗克韦尔艾伦布拉德利PLC编程环境中设置了一个工作站;分别是西门子全集成自动化(TIA)门户网站和罗克韦尔工作室5000。为每个PLC创建了一个项目,包含一个简单的梯形图逻辑程序和PLC设置的硬件配置,包括CPU模型和PLC使用的任何通信模块。然后将这些项目下载到各自的PLC,并允许其运行至少一个小时,以便在PLC内存中生成数据,这将生成类似于ICS内实时运行流程的数据。工作站还包含三个第三方开源通信库,用于从PLC获取数据。重要的是要注意,这些开源库的开发并没有考虑取证,也不一定使用可靠的取证方法从PLC捕获数据,他们的主要贡献是提供了一个框架,该框架可用于从PLC的板载内存轮询数据,而无需根据取证有效性标准应用过滤器。

(二)取证数据分类法

PLC取证数据类型分类

图2 PLC取证数据分类法

通过分析从两个西门子PLC和AB ControlLogix PLC获取的数据,设计并定义了四种数据类型分类,Variable content data; PLC application code; PLC meta-data; Device diagnostics and logs。在每种数据类型中,还识别出若干人为制造的数据。这些在图2所示的PLC取证数据类型分类法中进行了说明。

(三)PLC取证数据类型

可变内容数据

PLC应用程序

PLC元数据
设备诊断日志

四、总结

PLC威胁评估确实强调了获取某些PLC取证数据类型的重要性,这项研究的下一个阶段将涉及探索个人定义的人为制造的数据的重要性。此外,未来的工作将探索将这些数据类型的定义形式化为结构,以检查是否可以在多个PLC之间建立公共模型和模式。更广泛地说,本文中描述的为PLC开发取证数据分类法的方法可应用于其他可编程和可配置的ICS组件,如HMI和变速驱动器(VSD)。

[1] ISO/IEC  27037.:  Information  technology - Security  techniques - Guidelines for identifICSation, collection, acquisition and preservation of digital evidence, 2012. 
[2] I. Ahmed, S. Obermeier, M. Naedele and G. RICShard III, "SCADA 
Systems: Challenges for ForensICS Investigators", Computer, vol. 45, 
no. 12, pp. 44-51, 2012. Available: 10.1109/mc.2012.325. 
[3] T. Spyridopoulos,  J.  May  and  T.  Tryfonas,  "Incident  Analysis  & Digital ForensICS in SCADA and Industrial Control Systems", 8th IET International  System  Safety  Conference  incorporating  the Cyber Security Conference 2013, 2013. 
[4]  IEC 61131 “Programmable Controllers”, 2019. 
[5] "LogICS  |  PLCopen", PLCopen.org,  2019.  [Online].  Available: https://PLCopen.org/technICSal-activities/logICS.  [Accessed: 06- Jul- 2019]. 
[6] G. Denton, F. Karpisek, F. Breitinger, and I. Baggili, “Leveraging the SRTP  protocol  for  over-the-network  memory  acquisition  of  a  GE Fanuc  Series  90-30,  Digital  Investigation,  vol.  22,  pp.  S26–S38, Aug. 2017. 
[7] S. Senthivel, I. Ahmed, and V. Roussev, “SCADA network forensICS of the PCCC protocol”, Digital Investigation, vol. 22, pp. S57–S65, Aug.  2017  [Online].  Available: http://dx.doi.org/10.1016/j.diin.2017.06.012 
[8] I.  Ahmed,  S.  Obermeier,  S.  Sudhakaran  and  V.  Roussev, 
"Programmable  LogICS  Controller  ForensICS", IEEE  Security  & 
Privacy, vol. 15, no. 6, pp. 18-24, 2017. 
[9]  K.  Yau,  K.  Chow  and  S.  Yiu,  "A  ForensICS  Logging  System  for Siemens  Programmable  LogICS  Controllers",  Advances in  Digital ForensICS  XIV,  pp.  331-349,  2018.  Available: 10.1007/978-3-319-99277-8_18 
[10] A. Iqbal, M. Ekstedt and H. Alobaidli, "Digital ForensICS Readiness in CritICSal  Infrastructures:  A  Case  of  Substation  Automation  in  the Power Sector", Lecture Notes of the Institute for Computer Sciences, Social  InformatICS  and  TelecommunICSations Engineering,  pp.  117-129, 2018. 
[11] J.  Stirland,  K.  Jones,  H.  JanICSke  and  T.  Wu,  "Developing  cyber forensICS  for  SCADA  industrial  control  systems",  in  International Conference  on  Information  Security  and  Cyber  ForensICS,  Kuala Terengganu, Malaysia, 2014. 
[12] P. Eden,  P.  Burnap,  A.  Blyth,  K.  Jones,  H.  Soulsby,  and Y. Cherdantseva,  ‘A  ForensICS  Taxonomy  of SCADA  Systems  and Approach to Incident Response’, in 3rd International Symposium forICS  &  SCADA  Cyber  Security  Research  2015, 2015  [Online]. Available: http://dx.doi.org/10.14236/ewICS/ICS2015.5 
[13] R.  Altschaffel,  M.  Hildebrandt,  S.  Kiltz  and  J.  Dittmann,  "Digital ForensICS in Industrial Control Systems", Lecture Notes in Computer Science, pp. 128-136, 2019. 
[14] A. Robles-Durazno, N. Moradpoor, J. McWhinnie, G. Russell and I. Maneru-Marin,  "PLC  memory  attack  detection  and  response  in  a clean  water  supply  system", International  Journal  of  CritICSal Infrastructure  Protection,  vol.  26,  p.  100300,  2019.  Available: 10.1016/j.ijcip.2019.05.003 
[15] S.  Kalle,  N.  Ameen,  H.  Yoo  and I.  Ahmed,  "CLIK  on  PLCs! Attacking  Control  LogICS  with  Decompilation  and  Virtual  PLC", Proceedings  2019  Workshop  on  Binary  Analysis Research,  2019. Available: 10.14722/bar.2019.23074 
[16] A. Abbasi, M. Hashemi, "Ghost in the ple: Designing an undetectable programmable logICS controller rootkit via pin control attack", Black Hat Europe 2016, pp. 1-35, 2016. 
[17] H. Yoo and I. Ahmed, "Control LogICS Injection Attacks on Industrial Control Systems", ICST Systems Security and Privacy Protection, pp. 33-48, 2019. Available: 10.1007/978-3-030-22312-0_3 
[18] N.  Aloui,  Industrial  control  systems  dynamICS  code  injection, presented at GreHack, 2015.  
[19] D. Formby, S. Durbha, R. Beyah, Out of Control: Ransomware for Industrial Control  Systems,  2017,  [online]  Available: http://www.cap.gatech.edu/PLCransomware.pdf. 
[20] Z. Basnight, J. Butts, J. Lopez and T. Dube, "Firmware modifICSation attacks on programmable logICS controllers", International Journal of CritICSal  Infrastructure  Protection,  vol.  6, no.  2, pp.  76-84,  2013. Available: 10.1016/j.ijcip.2013.04.004 
[21] D. Beresford, “Exploiting Siemens SimatICS S7 PLCs”, im Black Hat USA+2011,  Las  Vegas,  NV,  USA,  3-4  Aug.  2011.  [Online] Availiable: https://media.blackhat.com/bh-us-
11/Beresford/BHUS11BeresfordS7PLCsWP.pdf 
[22] "Worldwide - PLC  market  share  by  manufacturer  2017  | 
Statista", Statista, 2017.  [Online]. Available: 
https://www.statista.com/statistICS/897201/global-PLC-market-share-by-manufacturer/. [Accessed: 15- Oct- 2019]. 
[23] R. M. van der Knijff, “Control systems/SCADA forensICS, what’s the difference?”, Digital Investigation, vol. 11, no. 3, pp. 160174, Sep. 2014 [Online]. Available: http://dx.doi.org/10.1016/j.diin.2014.06.007 
[24] US-CERT.: Malware Analysis Report - MAR-17-352-01 HatMan—
Safety  System  Targeted  Malware  (TRITON/TRISIS),  Update B, 
Feburary 2019.  [Online]  Availiable: https://www.us-
cert.gov/sites/default/files/documents/MAR-17-352-
01%20HatMan%20-%20Safety%20System%20Targeted%20Malware%20%28Update%20B%29.pdf 
[25] N.  Falliere,  L. O’Murchu  and  E.  Chien,  “W32.Stuxnet  Dossier”, Symantec. United  States  of  AmerICSa,  February  2011.  [Online] Available: 
https://www.symantec.com/content/en/us/enterprise/media/security_r
esponse/whitepapers/w32_stuxnet_dossier.pdf 
[26] D.  Nardella,  "Snap7  Homepage", Snap7.sourceforge.net, 2019. [Online].  Available:  http://snap7.sourceforge.net.  [Accessed:  5- Jul- 2019]. 
[27] “Nodes7", npm,  2019.  [Online].  Available: https://www.npmjs.com/package/nodes7. [Accessed: 25- Aug- 2019]. 
[28] “Pylogix”,  2019.  [Online].  Availiable: https://pypi.org/project/pylogix/ 
[29] Siemens, “Security with SIMATICS controllers”, V2.0, 2016. [Online] 
Availiable:https://support.industry.siemens.com/cs/document/77431846/security-with-simatICS-s7-controllers?dti=0&lc=en-WW 
[30] A. Wedgbury and K. Jones, “Automated Asset Discovery in Industrial Control  Systems – Exploring the  Problem”, 3rd International Symposium for ICS & SCADA Cyber Security Research, 2015. 
[31] ENISA,  "Can  we  learn  from  SCADA  securiy  incidents?",  October 2013.  London  [Online] Availiable: https://www.enisa.europa.eu/publICSations/can-we-learn-from-scada-
security-incidents

posted @ 2022-07-03 21:44  哆啦哆啦呦  阅读(59)  评论(0编辑  收藏  举报