eras in several crossings of the city which can be cor-
related with information from the traffic controller.
This means that the risk of such attacks probably is
smaller for traffic controllers than attacks on for ex-
ample smart meters, where customers might have an
economic incentive for fraud, as has been demon-
strated in a set of Maltese fraud cases
7
. The cur-
rently known attacks on traffic controllers have been
performed by security experts and “honest but curi-
ous” hackers. It would be unreasonably expensive to
replace all city traffic controllers due to this risk, es-
pecially for public authorities that need money also
for other good causes than traffic control. This means
that increasing security awareness using intrusion de-
tection systems is the most natural thing to start with
from a business perspective, since the existing traffic
controllers still work and do their job perfectly. There
are however plans to upgrade to a newer technology,
something that will be done gradually over time.
The decision to use open source security soft-
ware may also be considered a risk, since this may
introduce some well-known vulnerabilities into the
system. Mitigating existing known vulnerabilities is
handled in the security architecture using up-to-date
security testing tools, such as OpenVAS, which are
connected to the Verinice
8
information security man-
agement system via our own Asset Reporting Format
(ARF) to Verinice .vna import filter arftoverinice.py
9
.
The import filter contains a simplified threat model
based on the CVSS score, which allows for perform-
ing a risk assessment based on identified vulnerabil-
ities, in order to mitigate the vulnerabilities that are
considered too risky.
The most secure method against local attacks, is
probably utilising hardware supported security, for
example by using a Trusted Platform Module, and
using encryption, message authentication codes and
sequence numbers to protect disks and communica-
tion protocols. This would however require replac-
ing the infrastructure, something that should be done
gradually according to need. Some additional security
can be achieved by disabling local ports, however this
might conflict with requirements for maintainability.
The chosen protection strategy increases the situa-
tion awareness of local attacks against the traffic con-
troller, however even this strategy is not completely
secure against attacks, since it could be possible to
7
Malta’s smart meter scandal: http://www.smartgridnews
.com/story/maltas-smart-meter-scandal-41-million-worth-
electricity-stolen/2014-02-18
8
Verinice information security management system: http://
verinice.org
9
ARF to Verinice conversion filter http://sourceforge
.net/projects/arftoverinice/
mount man in the middle attacks, for example using
ARP spoofing on the internal LAN of the traffic con-
troller, which could stop the log messages. However,
such an attack will be detected by the tool chain since
the ARPWATCH
10
tool is in place that alerts on a
change in the assignment of MAC and IP addresses.
Additionally, it has to be noted that the chosen
approach is highly flexible and transferable to other
kinds of critical systems. Even if this traffic con-
troller use case has been tailored to protect a legacy
system, the general system architecture will be the
same when dealing with a modern system (Yang et al.,
2013; Gjøsæter et al., 2014). The only precondition
is that the application can be configured to produce
log messages which can be processed by the OSSEC
Server.
In general, the chosen approach increases the situ-
ation awareness significantly and makes it harder for
an attack to go undetected. However, a limitation is
that the approach is not able to avoid a successful at-
tack, since the attacker is able to change the road sign
for a small period (some minutes) until it has been
successfully restored by the traffic control centre.
The evaluation that has been done of the system,
is a relatively simple case study. It is envisaged that
more comprehensive studies of the security architec-
ture will be needed in the future. However, the pro-
posed solution solves an immediate problem that the
traffic control centre recognises - the reputational risk
in case the traffic controllers are hacked. This is im-
portant, since such events have got quite much press
in the past (Ghena et al., 2014).
7 RELATED WORKS
Our paper describes an approach for increasing the
security awareness of attacks on a city traffic con-
troller. The idea of applying such measures on a traf-
fic controller without built-in security is to the best of
our knowledge not described elsewhere. The general
system architecture used for implementing the pro-
tection measures has also been demonstrated for pro-
tecting SCADA traffic in energy systems (Yang et al.,
2013), as well as proposed for protecting the security
of Smart-grid Demand Response systems (Gjøsæter
et al., 2014). This shows that the system architecture
is relatively general with a broad application area also
beyond protecting traffic control systems.
Other papers that have pointed out the lack of se-
curity in road traffic control systems, is for example
(Ghena et al., 2014). This paper focuses on the wire-
10
ARPWATCH http://linux.die.net/man/8/arpwatch
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
216