Remote - M2M 2014 - (Page 12)
Feature Article
SDN-Based Solutions Strengthen Cyber Security in Industrial
Control Infrastructure
Jay Friedman, President
Distrix, Inc.
There's a time-honored adage that goes, "When you're through changing, you're through." As the pace of information technology (IT) and
operational technology (OT) development accelerates, and the need to close
the IT/OT divide becomes ever more important in applications involving
machine-to-machine (M2M) communications, the Internet of Everything
(IoE), and industrial control networks, this adage resonates more deeply
than ever.
Far more important than the
willingness to change, however,
is a clear understanding of how
technological challenges are evolving and what kinds of changes we
need to make in order to remain
successful long term. With industrial control systems, where the
close collaboration of IT and OT
is essential, two emerging trends
warrant special attention.
The first involves widely adopted ICS/SCADA systems, which
run much of the global industrial
infrastructure and sit outside traditional IT data center networks.
Today, the pressure to leverage the
data collected by these systems to
reduce both operating and capital
costs is growing dramatically. At
the same time, these systems need
to evolve to address the rapidly growing adoption of M2M communications if we're going to realize the vision of "The Industrial Internet of
Things." On one hand, the stage is being set for more centralized management with intelligent systems gleaning insights from analytics using data
extracted from operational devices to provide greater M2M control. This
also paves the way for something unprecedented that's expected to occur
in the next few years, hundreds of billions of new devices being added to
networks worldwide. On the other hand, however, ICS/SCADA systems
are also giving these organizations additional headaches, foremost among
them being the security issues they present. Because they sit outside the
traditional IT datacenter, and because most were originally designed to be
closed systems not accessible from the outside, they're especially vulnerable to cyber attacks.
The second trend is one that seems to grab the headlines several times
every week: the increasing frequency of cyber attacks on major institutions in areas ranging from utilities to the factory floor operations, as well
as across many industries. One attack that caused a major stir in late 2013,
for example, was the massive breach at the US retailer Target that put the
personal data of more than 100 million of the company's shoppers at risk.
Earlier that year, experts from the security firm Cylance demonstrated how
it would be relatively easy to break into tens of thousands of ICS systems,
allowing hackers to take control of building heating systems, elevators and
other industrial equipment and, in some cases, to cause these systems to
malfunction. In fact, one of these experts, Billy Rios of Cylance had previously compared the security of these systems to Apple's iTunes, calling the
security software of the entertainment site "more robust than most ICS software." Also in 2013, a report from the US Congress stated that sophisticated cyber saboteurs might already be plotting to trigger a massive blackout
across the country. One utility company even shared with congressional
investigators that, in a typical month, it must contend with a mind-boggling
10,000 plus cyber attacks.
12
www.RemoteMagazine.com
Yes, the writing is on the wall. In fact, we might even turn that writing
into flashing neon lights on a billboard: "As ICS/SCADA systems remain
vulnerable to cyber attacks, the number and severity of these attacks continues to grow."
SDN Can Strengthen Cyber Security
While many who've considered these issues have presented helpful
insights and, in some cases, suggested solutions, we haven't yet achieved
any real consensus about what to do. However, one of the most promising
advances in network technology is
software defined networking (SDN).
The reality of SDN, whether
used for remote on-site network
management, is that it offers enormous potential value for utilities,
factories, retailers, and numerous
other organizations in several areas,
notably security.
In a nutshell, SDN enables
administrators to manage network
services by decoupling the system
that makes decisions about where
traffic is sent (the control plane)
from the underlying systems that
forward traffic to the selected destination (the data plane). In addition
to reducing the cost of managing
a large, remote network, SDN can
benefit industrial control systems in
several other ways.
One is by simplifying the tasks of provisioning and maintaining network
resources. This not only lowers the cost of network management, but it also
reduces the need to constantly reconfigure networks, a process that's both
time consuming and prone to error.
Another is by leveraging its sophisticated traffic-management and linkbonding capabilities to make networks far more flexible, responsive and
resilient. By using built-in traffic-engineering algorithms, managers can prioritize traffic by application, protocol or port. Or, by employing store-andforward features, they can assure that all data gets to the proper destinations
while the network also optimizes bandwidth utilization.
A third benefit critical to this discussion is SDN's ability to offer significantly higher levels of network security for both IT and OT control system
networks in order to, as technologists at Distrix like to say, reduce the "attack surface" the opportunities for hackers to breech a network's security.
Particularly challenging in M2M applications and environments using
industrial control systems is that many rely on huge investments previously
made in older, legacy radio-telemetry communication and devices. What's
particularly compelling is the ability of the SDN approach to address security issues not simply on one front or another, but on multiple fronts. This
might sound overly diligent, it may even seem like overkill to some, but
for security personnel who are the first to be criticized whenever a systems
breech occurs, there can never be too much diligence.
Six Effective SDN Security Strategies
Here are six strategies we've found that have proven to be particularly
effective for network administrators using SDN to combat security threats:
1. "Virtualize" Networks - SDN operates as an overlay, which abstracts
the network from the underlying network hardware, relying on the hardware
only for transport. When traveling over public or private networks, this virtualization makes it more difficult for hackers to eavesdrop or gain access to
the virtual network.
http://www.RemoteMagazine.com
Table of Contents for the Digital Edition of Remote - M2M 2014
Remote - M2M 2014
Editor's Choice
When Does it Makes Sense to Transition to Wireless?
Intelligent Machinery Requires Comprehensive Wireless M2M Communications
Improving M2M Communications with Wireless
Driving the Connected Car - a New World of Mobility
SDN-Based Solutions Strengthen Cyber Security in Industrial Control Infrastructure
Electric Vehicles: Where Telematics, Smart Grid and Mobile Payments Converge
Powering Today’s Wireless Sensors
M2M Visions of 2020
Satellite Communications Takes the Edge out of Risky Mining Operations
New Products
Industry News
Remote - M2M 2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com