SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Low-Cost ICS Network
Performance Testing
Jim Gilsinn
Kenexis Consulting
June 6, 2014 SCADASides 1
How This Got Started
• In 2001 while I worked @ NIST my boss said:
• Industrial Ethernet is the next big wave for manufacturing, so say our
customers (auto manufacturers)
• There are still a lot of questions about how well it performs
• Is it deterministic enough for the factory floor? Yes, but…
• Are there standardized metrics to show performance? Yes, but…
• Are there test tools available? Yes, but…
• Can companies put performance requirements into their procurements
yet? Yes, but…
June 6, 2014 SCADASides 2
Determinism
• Vendors were building industrial Ethernet products that claimed
certain performance
• End-users were finding quirky performance
• End-users would complain
• Vendors would say, it works in our lab, there must be a problem
in your system
• End-users learned not to trust performance claims from
vendors
• Some build labs to approve devices before implementing them
June 6, 2014 SCADASides 3
Standardized Metrics
• Vendors would describe their performance in many different
ways and with varying definitions
• With ODVA, I helped to create a standard set of metrics for
end-point devices based upon IETF definitions
• Throughput
• Jitter/Variability
• Latency (action latency, response latency)
June 6, 2014 SCADASides 4
Test Tools
• After creating the metrics, NIST helped ODVA develop a set of
performance tests
• We build the ODVA Performance Testing Laboratory that ODVA
charges companies money to certify their stated performance
• No one has run the test since no one wants to fail
• ODVA charges for every time a company tests and retests
• NIST went on to develop a free capture file analysis tool
• Available on SourceForge (1st gen is IENetP, 2nd gen is FENT)
• Both of these are dormant
• NIST also worked with the ODVA Interoperability Workshop to
develop a series of 5 tests that could be conducted quickly
June 6, 2014 SCADASides 5
Procurement Language
• Big auto manufacturers have tried to get their vendors to use
ODVA performance lab
• Hasn’t worked out well
• Have convinced vendors to go through PlugFest testing
• Vendors and end-users have started using a common
language
• I guess that’s as good as it gets for now
June 6, 2014 SCADASides 6
Low-Cost Performance Testing
• Uses low-cost/readily-available equipment
• Low-cost is relative, $15 – $3k
• Readily-available, like laptops, switches, etc.
• Uses open-source/low-cost/readily-available software
• Open-source, like Linux, Wireshark, background traffic, and analysis
tool
• Low-cost analysis tool (Kenexis, in development)
• Readily-available, like Windows, Office, browsers
• Additional useful tools
• Protocol-dependent master/scanner (software will get you ~2ms)
June 6, 2014 SCADASides 7
Testing Equipment
• Laptops x2
• Alienware M14x-R2
• Ubuntu 14.04 native
• Windows VM
• Backtrack 5r3 USB
• DreamPlug
• Raspberry PI
• Model B, rev 1
• Netgear GS108E Switch
• Throwing Star LAN Tap
• Hilscher netANALYZER
June 6, 2014 SCADASides 8
Testing Software
• Linux (Ubuntu 14.04, Backtrack 5r3, Kali)
• Wireshark (apt-get and compiled)
• PlugFest background traffic captures and scripts
• NIST Analysis Tool
• 1st Generation = IENetP – http://www.sourceforge.net/projects/ienetp
• 2nd Generation = FENT – http://www.sourceforge.net/projects/fent
• Kenexis Analysis Tool
• Follow-on, in development
June 6, 2014 SCADASides 9
PlugFest Background Traffic
• Traffic Captures
• Generated by Ixia network analyzer and packet generator
• Assembled into different sets (editcap & mergecap)
• tcpreplay Scripts
• Generated Linux scripts to replay capture files
• Conducted Analysis of Results
• Packet generator transmitting
• Laptop transmitting
• Laptop receiving
June 6, 2014 SCADASides 10
PlugFest Background Traffic
Traffic Type Rate (pps)
Baseline
Steady-State
Managed
Steady-State
Unmanaged
BurstManaged
Burst
Unmanaged
ARP Request Broadcasts 180
Gratuitous ARP Broadcasts 180
DHCP Request Broadcasts 100
ICMP (ping) Request Broadcasts 100
NTP Multicasts 10
EtherNet/IP ListIdentity Req. 10
EtherNet/IP Class 1 1800
ARP Burst Requests 240 pkts @
4k Hz
PlugFest Testing Architecture
June 6, 2014 SCADASides 12
Eye Chart Slides Ahead
June 6, 2014 SCADASides 13
June 6, 2014 SCADASides 14
Example PlugFest Testing (Hilscher)
June 6, 2014 SCADASides 15
Example PlugFest Testing (Switch Mirror)
Low-Cost Testing Architecture
June 6, 2014 SCADASides 16
Low-Cost Testing
• Laptop  Laptop
• Laptop  DreamPlug
• DreamPlug  Laptop
• Laptop  Raspberry PI
• Raspberry PI  Laptop
June 6, 2014 SCADASides 17
June 6, 2014 SCADASides 18
What The Data Shows
• Hilscher Capture Card
• 10ns resolution time stamping
• Hardware assisted
• Good enough for hard real-time performance testing (1s µs)
• High-End Laptop
• Backtrack/Kali better than Ubuntu
• Running from USB stick works
• Good enough for soft real-time performance testing (~100 µs)
June 6, 2014 SCADASides 19
What The Data Shows
• DreamPlug
• Good enough for mostprocess control
• Offset of mean (~5-10 ms)
• Random delays occur (~5-20 ms, sometimes 100+ ms)
• On-par with Windows performance
• Raspberry PI
• Good enough for slow process control
• Offset of mean (~5-25 ms)
• Random delays occur (100-1000 ms)
June 6, 2014 SCADASides 20
More Information
• Jim Gilsinn, Kenexis Consulting
• Email: Jim.Gilsinn@Kenexis.com
• Phone: 614-323-2254
• Twitter: @JimGilsinn
• SlideShare: http://www.slideshare.net/gilsinnj
• Kenexis GitHub
• https://github.com/kenexis/LowCostPerformance
June 6, 2014 SCADASides 21

Weitere ähnliche Inhalte

Was ist angesagt?

5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management
AlgoSec
 

Was ist angesagt? (20)

Migrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data CenterMigrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data Center
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenance
 
Design Like a Pro: Scripting Best Practices
Design Like a Pro: Scripting Best PracticesDesign Like a Pro: Scripting Best Practices
Design Like a Pro: Scripting Best Practices
 
Managing 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single consoleManaging 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single console
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Network fault management and IT automation training
Network fault management and IT automation trainingNetwork fault management and IT automation training
Network fault management and IT automation training
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
 
Daniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross, Electronics Engineer
Daniel Cross, Electronics Engineer
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
 
5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Embracing the Rise of SecDevOps
Embracing the Rise of SecDevOpsEmbracing the Rise of SecDevOps
Embracing the Rise of SecDevOps
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
 
Qradar as a SOC core
Qradar as a SOC coreQradar as a SOC core
Qradar as a SOC core
 
Yes Virginia, Automatic Monitoring DOES Exist
Yes Virginia, Automatic Monitoring DOES ExistYes Virginia, Automatic Monitoring DOES Exist
Yes Virginia, Automatic Monitoring DOES Exist
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 

Ähnlich wie Low-Cost ICS Network Performance Testing

Ph.D Annual report II
Ph.D Annual report IIPh.D Annual report II
Ph.D Annual report II
Matteo Avalle
 

Ähnlich wie Low-Cost ICS Network Performance Testing (20)

Hadoop engineering bo_f_final
Hadoop engineering bo_f_finalHadoop engineering bo_f_final
Hadoop engineering bo_f_final
 
DevOps for Big Data - Data 360 2014 Conference
DevOps for Big Data - Data 360 2014 ConferenceDevOps for Big Data - Data 360 2014 Conference
DevOps for Big Data - Data 360 2014 Conference
 
Functional Testing of RESTful Applications
Functional Testing of RESTful ApplicationsFunctional Testing of RESTful Applications
Functional Testing of RESTful Applications
 
Demo how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
Demo  how to efficiently evaluate nf-vi performance by leveraging opnfv testi...Demo  how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
Demo how to efficiently evaluate nf-vi performance by leveraging opnfv testi...
 
Selenium Automation at Incapsula
Selenium Automation at IncapsulaSelenium Automation at Incapsula
Selenium Automation at Incapsula
 
Change management in hybrid landscapes
Change management in hybrid landscapesChange management in hybrid landscapes
Change management in hybrid landscapes
 
Spark Uber Development Kit
Spark Uber Development KitSpark Uber Development Kit
Spark Uber Development Kit
 
Deploying your SaaS stack OnPrem
Deploying your SaaS stack OnPremDeploying your SaaS stack OnPrem
Deploying your SaaS stack OnPrem
 
StarWest 2019 - End to end testing: Stupid or Legit?
StarWest 2019 - End to end testing: Stupid or Legit?StarWest 2019 - End to end testing: Stupid or Legit?
StarWest 2019 - End to end testing: Stupid or Legit?
 
The performance of IPv6, by John Brzozowski [APNIC 38 / IPv6 Plenary]
The performance of IPv6, by John Brzozowski [APNIC 38 / IPv6 Plenary]The performance of IPv6, by John Brzozowski [APNIC 38 / IPv6 Plenary]
The performance of IPv6, by John Brzozowski [APNIC 38 / IPv6 Plenary]
 
Summit 16: Multi-site OPNFV Testing Challenges
Summit 16: Multi-site OPNFV Testing ChallengesSummit 16: Multi-site OPNFV Testing Challenges
Summit 16: Multi-site OPNFV Testing Challenges
 
5 Steps on the Way to Continuous Delivery
5 Steps on the Way to Continuous Delivery5 Steps on the Way to Continuous Delivery
5 Steps on the Way to Continuous Delivery
 
OpenVINO introduction
OpenVINO introductionOpenVINO introduction
OpenVINO introduction
 
Ph.D Annual report II
Ph.D Annual report IIPh.D Annual report II
Ph.D Annual report II
 
A Mayo Clinic Big Data Implementation
A Mayo Clinic Big Data ImplementationA Mayo Clinic Big Data Implementation
A Mayo Clinic Big Data Implementation
 
Infrastructure as Code for Network
Infrastructure as Code for NetworkInfrastructure as Code for Network
Infrastructure as Code for Network
 
OVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
OVS and DPDK - T.F. Herbert, K. Traynor, M. GrayOVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
OVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
 
Automated Testing with Docker on Steroids - nlOUG TechExperience 2018 (Amersf...
Automated Testing with Docker on Steroids - nlOUG TechExperience 2018 (Amersf...Automated Testing with Docker on Steroids - nlOUG TechExperience 2018 (Amersf...
Automated Testing with Docker on Steroids - nlOUG TechExperience 2018 (Amersf...
 
Effective .NET Core Unit Testing with SQLite and Dapper
Effective .NET Core Unit Testing with SQLite and DapperEffective .NET Core Unit Testing with SQLite and Dapper
Effective .NET Core Unit Testing with SQLite and Dapper
 
LCU14 310- Cisco ODP v2
LCU14 310- Cisco ODP v2LCU14 310- Cisco ODP v2
LCU14 310- Cisco ODP v2
 

Mehr von Jim Gilsinn

Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
 

Mehr von Jim Gilsinn (12)

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
You name it, we analyze it
You name it, we analyze itYou name it, we analyze it
You name it, we analyze it
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Low-Cost ICS Network Performance Testing

  • 1. Low-Cost ICS Network Performance Testing Jim Gilsinn Kenexis Consulting June 6, 2014 SCADASides 1
  • 2. How This Got Started • In 2001 while I worked @ NIST my boss said: • Industrial Ethernet is the next big wave for manufacturing, so say our customers (auto manufacturers) • There are still a lot of questions about how well it performs • Is it deterministic enough for the factory floor? Yes, but… • Are there standardized metrics to show performance? Yes, but… • Are there test tools available? Yes, but… • Can companies put performance requirements into their procurements yet? Yes, but… June 6, 2014 SCADASides 2
  • 3. Determinism • Vendors were building industrial Ethernet products that claimed certain performance • End-users were finding quirky performance • End-users would complain • Vendors would say, it works in our lab, there must be a problem in your system • End-users learned not to trust performance claims from vendors • Some build labs to approve devices before implementing them June 6, 2014 SCADASides 3
  • 4. Standardized Metrics • Vendors would describe their performance in many different ways and with varying definitions • With ODVA, I helped to create a standard set of metrics for end-point devices based upon IETF definitions • Throughput • Jitter/Variability • Latency (action latency, response latency) June 6, 2014 SCADASides 4
  • 5. Test Tools • After creating the metrics, NIST helped ODVA develop a set of performance tests • We build the ODVA Performance Testing Laboratory that ODVA charges companies money to certify their stated performance • No one has run the test since no one wants to fail • ODVA charges for every time a company tests and retests • NIST went on to develop a free capture file analysis tool • Available on SourceForge (1st gen is IENetP, 2nd gen is FENT) • Both of these are dormant • NIST also worked with the ODVA Interoperability Workshop to develop a series of 5 tests that could be conducted quickly June 6, 2014 SCADASides 5
  • 6. Procurement Language • Big auto manufacturers have tried to get their vendors to use ODVA performance lab • Hasn’t worked out well • Have convinced vendors to go through PlugFest testing • Vendors and end-users have started using a common language • I guess that’s as good as it gets for now June 6, 2014 SCADASides 6
  • 7. Low-Cost Performance Testing • Uses low-cost/readily-available equipment • Low-cost is relative, $15 – $3k • Readily-available, like laptops, switches, etc. • Uses open-source/low-cost/readily-available software • Open-source, like Linux, Wireshark, background traffic, and analysis tool • Low-cost analysis tool (Kenexis, in development) • Readily-available, like Windows, Office, browsers • Additional useful tools • Protocol-dependent master/scanner (software will get you ~2ms) June 6, 2014 SCADASides 7
  • 8. Testing Equipment • Laptops x2 • Alienware M14x-R2 • Ubuntu 14.04 native • Windows VM • Backtrack 5r3 USB • DreamPlug • Raspberry PI • Model B, rev 1 • Netgear GS108E Switch • Throwing Star LAN Tap • Hilscher netANALYZER June 6, 2014 SCADASides 8
  • 9. Testing Software • Linux (Ubuntu 14.04, Backtrack 5r3, Kali) • Wireshark (apt-get and compiled) • PlugFest background traffic captures and scripts • NIST Analysis Tool • 1st Generation = IENetP – http://www.sourceforge.net/projects/ienetp • 2nd Generation = FENT – http://www.sourceforge.net/projects/fent • Kenexis Analysis Tool • Follow-on, in development June 6, 2014 SCADASides 9
  • 10. PlugFest Background Traffic • Traffic Captures • Generated by Ixia network analyzer and packet generator • Assembled into different sets (editcap & mergecap) • tcpreplay Scripts • Generated Linux scripts to replay capture files • Conducted Analysis of Results • Packet generator transmitting • Laptop transmitting • Laptop receiving June 6, 2014 SCADASides 10
  • 11. PlugFest Background Traffic Traffic Type Rate (pps) Baseline Steady-State Managed Steady-State Unmanaged BurstManaged Burst Unmanaged ARP Request Broadcasts 180 Gratuitous ARP Broadcasts 180 DHCP Request Broadcasts 100 ICMP (ping) Request Broadcasts 100 NTP Multicasts 10 EtherNet/IP ListIdentity Req. 10 EtherNet/IP Class 1 1800 ARP Burst Requests 240 pkts @ 4k Hz
  • 12. PlugFest Testing Architecture June 6, 2014 SCADASides 12
  • 13. Eye Chart Slides Ahead June 6, 2014 SCADASides 13
  • 14. June 6, 2014 SCADASides 14 Example PlugFest Testing (Hilscher)
  • 15. June 6, 2014 SCADASides 15 Example PlugFest Testing (Switch Mirror)
  • 16. Low-Cost Testing Architecture June 6, 2014 SCADASides 16
  • 17. Low-Cost Testing • Laptop  Laptop • Laptop  DreamPlug • DreamPlug  Laptop • Laptop  Raspberry PI • Raspberry PI  Laptop June 6, 2014 SCADASides 17
  • 18. June 6, 2014 SCADASides 18
  • 19. What The Data Shows • Hilscher Capture Card • 10ns resolution time stamping • Hardware assisted • Good enough for hard real-time performance testing (1s µs) • High-End Laptop • Backtrack/Kali better than Ubuntu • Running from USB stick works • Good enough for soft real-time performance testing (~100 µs) June 6, 2014 SCADASides 19
  • 20. What The Data Shows • DreamPlug • Good enough for mostprocess control • Offset of mean (~5-10 ms) • Random delays occur (~5-20 ms, sometimes 100+ ms) • On-par with Windows performance • Raspberry PI • Good enough for slow process control • Offset of mean (~5-25 ms) • Random delays occur (100-1000 ms) June 6, 2014 SCADASides 20
  • 21. More Information • Jim Gilsinn, Kenexis Consulting • Email: Jim.Gilsinn@Kenexis.com • Phone: 614-323-2254 • Twitter: @JimGilsinn • SlideShare: http://www.slideshare.net/gilsinnj • Kenexis GitHub • https://github.com/kenexis/LowCostPerformance June 6, 2014 SCADASides 21