Critical Infrastructure Protection using Asset Management Tool & SOC

Securing critical infrastructure via AMT & Security Operations Center (SOC).

Brief Description

Critical infrastructure is the key asset in the development of a nation. In order to achieve efficiency and improvements, connectivity with the internet has also increased. With increase in connectivity and convergence of utility industries to the internet, the scopes of attacks are also increasing. In recognition of these trends and potential threats, this project focuses on developing a framework for critical infrastructure protection (CIP) consisting of two modules namely Asset Management Tool and Security Operations Centre

Asset management tool for inventory and monitoring in Industrial Control System networks works in non-intrusive and real time provides asset owners the ability to leverage their existing ICS and network infrastructure and investments to gain operational, compliance, asset inventory, network, and cyber security benefits.

Security Operations Center (SOC) incorporates the incident detection and security incident response process by finding the anomalies in the environment and reducing response time of security incidents from initial finding to tracking to reporting.


Asset Management Tool or SCADA NetrA-AMS: 

Asset Management Tool (AMT) is used for inventory of assets and monitoring in ICS networks in a non-intrusive manner in real time. It provides asset owners the ability to leverage their existing ICS network infrastructure. It helps in gaining operational, compliance, asset inventory and cyber security benefits. 

The Asset Management tool is designed without impacting the underlying OT systems by adapting passive (non-intrusive) scanning to scan the devices to maintain inventory. As part of active scanning, only vendor approved commands will be used. With all network traffic being captured, the solution leverages its deep packet inspection and deep content inspection capabilities to parse the protocol.

This tool can work in one of two modes: baseline or operational modes. 

SCADA-NetrA works by 

Capturing available information from a network switch in passive mode. 

Detecting the devices available in the network. This includes hardware, software, protocols used in the network, and those properties.

Capturing the statistics of the protocol. This includes parameters such as baud rate, function codes, incoming, outgoing traffic flow rates, sensor and actuator address used etc.

Capturing the properties of devices. This inventory is useful during operational mode as well as for baselining.

Detecting Anomalies in either of two modes: baseline info based and behavioral based. 

Finding the vulnerabilities of the devices 

Detecting Protocol anomalies 


Security Operations Center: 

SOC primarily focuses on Protecting Critical Infrastructure like power system utilities or any ICS. OT (Operational Technology) Security Operations Center (SOC) is designed to monitor, detect, and respond to cybersecurity threats targeting critical infrastructure and industrial systems. It focuses on safeguarding assets like SCADA systems, programmable logic controllers (PLCs), and Remote Terminal Units against cyberattacks, ensuring operational continuity and safety. The OT SOC integrates real-time monitoring, anomaly detection and incident response tailored to OT environments. It provides unified OT & IT device security monitoring, while adhering to NIST Cybersecurity Framework and is based on the Purdue Model. 


OT-SOC works by 

Collecting logs from varied sources in different formats like IT & OT devices, IDS/IPS, firewall, network components and also including sources like expert knowledge, earlier experiences and data generated from assets.

Parsing and normalizing the data collected for analysis.

Converting Log data into events and performing security event correlation within a context by finding relationships between disparate events received from various sources and finally identifying incidents. This is done based on Correlation rules that are pre-configured and also can be custom made based on the use case or feature in the security incident and event management (SIEM) tool.

Integrating an SIEM tool to generate and provide alerts, events and incidents to the incident management system.

Integrating an Incident management system, providing features such as classification and triage of alerts, management of alerts, detection of anomalies and proactive monitoring of alerts.

Provision of Generated incidents/ anomalies/ events to SOC analysts through dashboards.

Provision of incident metrics and play books along with visualization to SOC analysts.



Use Cases

AMT: 

Devices discovery, identification, monitoring and management

Identifying protocols used for communication between devices

Anomaly detection - protocol, baseline and behavioural

Asset verification and auditing 

Offline network security analysis of OT systems ( OT PCAP Analyzer)


SOC:

Real-time threat detection like detecting host scanning/ port scanning in the network

OT specific protocol anomalies detection (Modbus, IEC-104) 

Behavioural anomaly detection on OT systems

Coordinating incident response with Security stakeholders. 

Configuration monitoring for OT devices 



Salient Features

AMT:

Cyber Assets Discovery & Identification

Hybrid scanning - combination of active (select probing) and passive scanning

Identifying protocols used for communication between devices

Creating baseline of the system

Inventory of Authorized and Unauthorized Devices

Inventory of software 

Mapping the asset properties against common vulnerability exposure (CVE)/ National vulnerability database (NVD )

Continuously monitor the Industrial control systems (ICS) network to detect vulnerabilities

Devices monitoring and management

Dynamic network map with devices and its communication patterns

Identification of anomalies in the network


SOC: 

Real-time monitoring of IT & OT endpoints

Asset discovery & management

Log aggregation from diverse sources like Windows and Linux machines, Servers and networking devices(Routers, switches, etc.) and OT devices (RTUs, MTUs, PLCs, etc.)

Traffic analysis at system, protocol, and behavioral levels

Scanning of assets for vulnerabilities for better risk management & mitigation 

Support for industrial protocols anomaly detection (e.g. Modbus, IEC 60870-5-104)

Security incident and event management (SIEM)

Incident triage & prioritization 

Customizable log management

Threat Intelligence feed connections 



Technical Specifications

AMT: 

Operational Specification

AMT sensors run on a single board computer assuming that support will be provided by the field personnel to sniff the traffic through the mirrored port.

Provision for required configuration of tools for deployment in AMT server


System Specification


AMT Sensors

Minimal configuration required for AMT sensor 

SBC with Quad core, 64-bit SoC @ 1.5GHz, 

8GB RAM and Gigabit Ethernet, 

64 GB storage


AMT Server

Minimal configuration required for AMT Server

No. of Cores 16

Processor Description: 2.9Ghz 

RAM 256 GB DDR4 SDRAM

Hard Disk 20 TB HDD



SOC:

Basic Architecture

Redundant systems for high availability.

Centralized monitoring consoles with distributed data collectors or sensors in the OT environment.

Monitoring & Detection

Real-time monitoring of SCADA networks and endpoints.

Protocol-aware intrusion detection systems (IDS) for OT-specific protocols (e.g., Modbus, IEC-104).

Anomaly detection systems utilizing machine learning or baselines for OT traffic.

Integration

Compatibility with OT devices, including legacy systems.

Integration with Security Information and Event Management (SIEM) systems and other SOCs

Incident Response

OT-IT combined incident handling

Threat Intelligence

Subscription to third party threat intelligence feeds.

Compliance & Standards

Adherence to NIST Cyber Security Framework

Resilience & Redundancy

Log data retention as per needs

Backup and recovery mechanisms.

Fail-safe and failover configurations to maintain operations during attacks.



Chief Investigator Details

Name : R K Senthil Kumar

E-mail Id : senthil@cdac.in

Top