<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Real Time Passive Monitoring is the Smarter Solution

June 28, 2016

Network Monitoring Passive Network TAPs Garland Technology

Our infrastructure is at risk. In 2013, an Iranian hacker broke into the flow control mechanism for a dam in upstate New York. Only the fact that the dam itself was broken prevented him from remotely controlling the structure.

In Ukraine, a variant of the BlackEnergy virus was used to shut down part of the country's power grid.
The message is clear—hackers are increasingly turning their attention towards the everyday miracles that provide us with water and electricity, and those systems are wide open.

Industrial Control Systems and Supervisory Control and Data Acquistion (ICS/SCADA) devices monitor and control our heavy-duty infrastructure, but these systems came into vogue long before the dangers of hacking were well-understood. None of these systems were designed from the ground up to interface with security architecture. Most ICS/SCADA systems are protected only by a firewall, and network operators have little moment-to-moment understanding of who or what may be trying to interface with them. By the time administrators get around to looking at their logs, attackers may have been and gone.

What's so Smart About Passive Real Time Monitoring?

As stated, most ICS/SCADA systems are protected by firewalls. These firewalls don't just serve the purpose of hiding the system's control interface from people who just happen to be browsing the internet—as was the case with the New York dam mentioned above. They also segment the ICS/SCADA from business networks, meaning that you can't hack into an office and move laterally to control utilities and manufacturing equipment.

Tweet: The problem is that #firewalls are generally the only thing protecting #ICS & #SCADA systems >>The problem is that firewalls are generally the only thing protecting ICS/SCADA systems. They tend not to even have authentication controls—you don't need a username or password to start messing around with them. Thus, any attacker who gets past the right firewall will basically own your ICS/SCADA by
default.

>> Download now: Learn how to secure your industrial network
[Free Whitepaper]

Once your ICS/SCADA system is breached, there's no limit to the damage that an attacker can cause. Forget deliberate sabotage for now. Prior to its use in disrupting the Ukrainian power grid, the BlackEnergy malware was mostly used for industrial espionage. Imagine an attacker with the ability to derive your trade secrets by invisibly spying on your manufacturing process, and you'll understand one of the primary dangers that stem from this sort of attack.

Tweet: The ability to observe, in real time, any changes that occur in #ICS #SCADA means more than just protection from #hackersPutting the focus back on monitoring is important. The ability to observe, in real time, any changes that occur in ICS/SCADA means more than just protection from hackers. When these systems deviate from the baseline, it can indicate out-of-control processes, equipment malfunction, or even cause industrial accidents. Having a pair of eyeballs on these systems at all times mean that network operators can identify and remediate any unanticipated changes in ICS/SCADA systems, before anyone gets hurt.

How is Passive Real Time Monitoring Accomplished?

The Advantages of Real Time Monitoring Solutions As far as ICS/SCADA systems are concerned, the ability to see every bit, byte and packet® couldn't be more crucial. Garland Technology offers a network aggregating TAP that can capture 100 percent of duplex network traffic and send it along to your choice of monitoring solution. As many industrial solutions are still copper-based, we recommend our PT100 TAPs in 10/100M copper with Aggregation.

Understanding how to correctly monitor ICS/SCADA systems is crucial to security on a number of different levels. When utilities are affected by malicious attackers, it affects national security. When attackers can harness compromised ICS/SCADA systems to steal IP, financial security is affected. When unmonitored systems begin to malfunction, the personal safety of your workforce is at risk. Only by carefully monitoring these industrial control systems can a greater measure of safety be achieved.

Looking to add a visibility solution to your industrial deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.

Defending Industrial Ethernet Network Security Garland Technology

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES