Shiva Sap
Shiva Sap
Engineering college
T . Shivaprasad
Guide:
17J21A0219
S . Anantha sai , M . tech
Assistant Professor ,EEE Dept
1
OUTLINE
2
POWER DISTRIBUTION
EVOLUTION
• Traditionally power delivery was unsophisticated
• Generation localised around communities
• Simple consumption (e.g. lights)
• Simple communication with consumer
• Consumer billed monthly
3
POWER DISTRIBUTION
EVOLUTION
4
MORDEN ELECTRIC POWER DISTRIBUTION
• Transmission Lines
• AC or DC
• Transmit power at high voltage over long distances
• High voltage, low current to reduce losses e.g. 735kV for James Bay
transmission lines.
5
MORDEN GRID: SUBSTATIONS
6
POWER DISTRIBUTION
AUTOMATION
• Grid evolved
• from manned substations to remotely monitored and
controlled system
• from electromechanical systems to dial-up system
• from unsophisticated one-way communication to two-way
communication
7
SCADA DEFINITION
8
SUMMARY OF SCADA HISTORY
9
TRADITIONAL SCADA
COMPONENTS
• SCADA Master Terminal Unit (MTU): The server that acts as SCADA
system
• RTU (remote terminal unit) : remote telemetry data acquisition units
located at remote stations
• IED (intelligent electronic devices) smart sensors/actuators with
intelligence to acquire data, process it, and communicate
• HMI (human-machine interface) : software to provide for visualisation
and interaction with SCADA
10
OVERALL SCADA SYSTEM
ARCHITECTURE
• Can be broken down into 3 categories
• NIST representation of SCADA system
• Control Center
• Programmable Logic Controllers(PLCs), Remote Terminal Units (RTUs), IEDs
• Communications Network
• SCADA host software
11
CONTROL CENTER
• Provides for real-time grid management
• SCADA Server
• Also known as the MTU (master terminal unit)
12
COMMUNICATION LINK
13
COMMUNICATION
TOPOLOGIES
• Star
• Ring
• Mesh
• Tree
• Bus
14
IMPLEMENTATION EXAMPLES
15
PROTOCOLS AND STANDARDS
• Allow communications between devices
• MODBUS: master-slave application-layer protocol
• Attackers with IP access can run Modbus client simulator to effect many types of attacks.
SCADA MTU
Control,
Field component Settings
Device Ports
Telemetry 17
Meters
Relays, etc
FIELD COMPONENTS: RTU
• Reads status and alarms through relay and control circuit auxiliary contacts. Meter
reading.
• Manual/remote control e.g. activate alarm. RTU control outputs connected to control
relays
• No data storage
• Some PLCs equipped to be RTUs
• May aggregate IED data
• Either open standard or proprietary based
• Modbus, DNP3, IEC 60870-5-101/104
• Serial communication
• RS232, RS485 18
FIELD COMPONENTS : IED
19
GE EXAMPLE
20
GE EXAMPLE
21
GE EXAMPLE
22
SCADA AND INTERNET
CONNECTION
23
SMART GRID
24
SMART GRID
25
SCADA SECURITY
26
SCADA SECURITY HOLES
Increased automation widens
SCADA network’s attack surface
27
TYPICAL SCADA THREATS
(ACTORS)
• Espionage
• Spies (industrial and state actors)
• Terrorists
• Script kiddies
• Insiders, e.g. disgruntled employees
• Criminal elements (blackmail)
• Business competitors
• Hacktivists (ideological activists)
28
SCADA VULNERABILITIES
29
VULNERABILITY EXAMPLES
30
ATTACK EXAMPLES
• Stuxnet: Intercepts and makes changes to data read from and written to
a PLC
• Night Dragon : Suspected SCADA data exfiltration from Exxon, Shell
and BP
• Others: Havex (Trojan targeting ICSs and SCADA), Blacken (Targets
users of SCADA software Simplicity)
• Many others targeting the PCs used in SCADA.
31
SECURING SCADA
• User training and awareness (e.g. what to do when you pick up a USB stick in parking lot)
• Technical
• Isolate SCADA from internet as much as possible
• Encryption of data
• Implement strict firewall rules between SCADA network and all other networks.
• Perform anomaly detection
32
SECURING SCADA
33
CONCLUSION
34
REFERENCES
35
THANK YOU
36