You are here

Intrusion Detection and Security Monitoring of SCADA Networks

Award Information
Agency: Department of Homeland Security
Branch: N/A
Contract: NBCHC040078
Agency Tracking Number: 04110880
Amount: $68,500.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: N/A
Solicitation Number: N/A
Timeline
Solicitation Year: N/A
Award Year: 2004
Award Start Date (Proposal Award Date): N/A
Award End Date (Contract End Date): N/A
Small Business Information
1580 Sawgrass Corp. Pkwy Suite 130
Fort Lauderdale, FL 33323
United States
DUNS: N/A
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Dale Peterson
 President
 (954) 315-4633
 peterson@digitalbond.com
Business Contact
 Dale Peterson
Title: President
Phone: (954) 384-7049
Email: peterson@digitalbond.com
Research Institution
N/A
Abstract

Legacy SCADA systems, and the systems being sold today, lack the security required to prevent attacks. Intrusion detection systems (IDS) and security monitoring tools can work as compensating controls by identifying and stopping attacks. Unfortunately, existing security systems do not identify SCADA specific attacks. Our proposal will add SCADA specific knowledge to IDS and security monitoring tools. Specifically, we will: (1) create an open source SCADA signature set for the SNORT IDS that will include specific signature examples, a context, and a tool for SCADA vendors and users to add system specific signatures. (2) identify and extract security specific log entries in SCADA application logs for use in a security monitoring tool. Examples include failed logins, display changes, and escalation of privileges. (3) Correlate the SCADA application log events and the SCADA IDS data to appropriately set the alert level. The technical approach will focus on identifying attacks to the field device, RTU/PLC, to SCADA server communication. With TCP/IP based field devices spread over a wide geographic area, and the lack of a security standard for this protocol, this communication is perhaps the largest cyber security risk. Our proposal is an immediate compensating control for this risk.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government