Safety Monitoring of the Automated City Water Supply Management System Based on PSIM and SIEM Systems Dmitrii Orel 1 and Tatyana Guseva 1 1 North Caucasus Federal University, Pushkina st., 1, Stavropol, 355017, Russian Federation Abstract The article is about the integration of monitoring functions of industrial facility security systems based on the PSIM system. The water supply company of a large city acts as an industrial facility. The analysis of the company structure and its security systems, as well as the means of physical security is done. The functionality of SIEM and PSIM systems is considered. At the end of the article, the algorithm for the operation of the Darvis platform, interacting with the video surveillance system and the existing pressure monitoring sensors in the city's water supply, was developed. The integration of the video surveillance system and the Darvis software will allow it use it as a single platform for providing a comprehensive security system and rapid response to incidents at the city's water supply company. Rapid response to accidents in the water supply line or at pumping stations will reduce water losses, which will reduce financial damage to the company. Keywords 1 Security systems integration, industrial facility, SIEM system, PSIM system, Darvis softwar, automated process control system 1. Introduction According to the report by the Russian company Positive technologies, working in the field of information security, the number of attacks on industrial and energy companies has increased since 2020 (Figure 1). The number of such attacks in 2020 increased by 91% compared to 2019. Basically, this industry has been attacked by ransomware operators, in particular RansomExx, Netwalker, Clop, Maze, Ragnar Locker, LockBit, DoppelPaymer, Snake. The last of them removes shadow copies before starting encryption, and has functions that allow to forcibly stopping processes in the automated control system. Due to the attacks, some companies, such as Huber+Suhner and Honda, were forced to suspend production. Figure 1: Number of attacks on industrial and energy companies AISMA-2021: International Workshop on Advanced in Information Security Management and Applications, October 1, 2021, Stavropol, Krasnoyarsk, Russia EMAIL: kde.def@gmail.com (Dmitrii Orel); tatyana.petrova.96@bk.ru (T. M. Guseva) ORCID: 0000-0002-3433-2164 (Dmitrii Orel); 0000-0002-0291-635X (T. M. Guseva) © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 127 There is a lot of production infrastructure in Russia, including automated process control systems, and it is of interest to intruders. Modern automated process control systems have ceased to be autonomous and are increasingly integrated with information systems, forming unified automated information management systems. For example, in this paper we consider an industrial facility - a water supply company of a large city, which is an automated water supply management system integrated with the enterprise information system. In such a convergent system, various channels of information transmission are used. All this creates a wide range of threats to the information security of an industrial facility. The purpose of the work is to increase the efficiency of industrial facility security systems by creating a security monitoring system. The hypothesis is that combining information from sensors of various security systems will a) reduce the time for making decisions to prevent an incident b) increase the accuracy of management decisions in the field of security c) reduce the number of false notifications about information security incidents. To monitor information systems for managing security incidents at the enterprise SIEM systems can be used. They monitor information systems, analyze real-time security events emanating from network devices, information security tools, IT services, system and application infrastructure, and help detect information security incidents. SIEM systems provide limited opportunities for cybersecurity of industrial facilities, they do not allow taking into account data on the infrastructure of industrial facilities, taking into account physical security issues. As a result, an industrial facility is exposed to a greater number of threats that cannot be controlled. Integration of SIEM systems and SCADA dispatch control and data collection systems allows to solve this problem. Integration will allow SIEM systems to receive data generated by systems that allow monitoring of industrial facilities [1]. Information protection in an automated process control system is achieved by taking a set of organizational and technical information protection measures aimed at blocking (neutralizing) threats to information security, the implementation of which may lead to a violation of the normal functioning of the automated control system and the controlled object and (or) process, localization and minimizing the consequences of the possible implementation of threats to information security, restoration of the normal mode of functioning of the automated control system in case of information security threats [2]. Thus, the integrated security system of industrial facilities, in addition to monitoring the safety of production processes, should also monitor threats related to information security. It should be pointed that the integration of SIEM and SCADA requires the creation of a complex model that allows describing incidents and incident response algorithms based on data obtained from heterogeneous information systems. In this paper, it is proposed to develop an algorithm for integrating the video surveillance system of an industrial facility of a water supply enterprise with the Darvis software product. 2. Analysis of the structure and security systems of an industrial facility The water supply company operates in the field of housing and communal services of a large city. The main types of services provided by the company are cold water supply and sanitation. 2.1. Analysis of the organizational structure of the company The functions of the company are presented on Figure 2. 128 Figure 2: Functions of water supply company Modern water supply and sewerage systems are a set of structures, mechanisms and equipment, all parts of which must work together accurately and without failures. These include water intake structures, water treatment plants, water supply and sewerage networks with their servicing devices, pumping stations, as well as internal water supply and sewerage systems of buildings. 2.2. The need to integrate industrial facility security systems The company manages complex and geographically distributed processes for water supply and sanitation in the city. Radio channel communication is used to transmit information from sensors to dispatch control and data collection systems. The exchange between the SCADA system and the operator's ARM takes place over an Ethernet network. Automated process control systems have two actual threats that allow to disrupt and intercept the management of the enterprise: 1. The threat of disruption of the technological / production process due to time delays introduced by the means of protection. 2. The threat of interception of control by an automated process control system. Information protection in an automated process control system is achieved by adopting, within the framework of the automated control system protection system, a set of organizational and technical information protection measures aimed at blocking information security threats, the implementation of which may lead to a violation of the normal functioning of the automated control system and the controlled process, to localize and minimize the consequences of the possible implementation of information security threats, restoration of the normal mode of functioning of the automated control system in case of information security threats. To ensure the full operation of the enterprise, as well as the ability to eliminate the implementation of security threats, the integration of physical security means of the enterprise's automated control system with a SIEM system that allows analyzing security events in real time coming from network devices, information security tools will help. Using the Methodology for assessing information security threats, three negative consequences that may occur from the implementation (occurrence) of information security threats were identified. The objects of influence: operator's workstation, database, controller for process control, controller for water treatment process control, programmable logic controller (PLC) for pumping station control. The main categories of violator (internal, external), the type of violator and possible goals of information security threats are considered. The following categories of people can be identified as actual violators (Table 1): 129 Table 1 Current threats and violators of information security Cat. of Type of Methods of # the Object of influence Available interfaces violator implementation violator Persons providing the functioning of systems and Web user interface Exploiting Database networks or Information system for accessing the Management System 1. providing the internal database information system configuration operator's database vulnerabilities systems (administration , security, cleaners, etc.) System Access via the Administrators Operator's Introduction of 2. internal organization's local and Security computer malicious software area network Administrators Web user interface Exploiting Database Former Information system for accessing the Management System 3. employees external database information system configuration (users) database vulnerabilities Controller for Data modification in controlling communication Remote controller technological channel control channel processes of water Introduction of Terrorist, purification malware 4. extremist external Data modification in groupings Programmable communication logic controller Remote controller channel (PLC) for control of control channel Introduction of pumping stations malware 2.3. Analysis of the automated process control system of the water supply company Significant difficulties of technological management at the enterprise arise as a consequence of the geographical remoteness of the objects of control and management from each other: technological objects are arbitrarily located throughout the city and beyond. Therefore, management tasks, first of all, require the creation of an effective system for collecting and transmitting information about the parameters and operating modes of technological equipment at various remote facilities. An automated control system (automated process control system) is used to control and conveniently manage the technological processes of the enterprise. The automated process control system allows: ● Create dispatching control of the technological process of water supply and sanitation; ● Provide centralized control of parameters; ● Predict and prevent emergency situations related to the operation of technological equipment; ● Control technological processes, optimize and improve the efficiency of work at the pumping station; ● Minimize the impact of the human factor on the technological process; 130 ● To carry out automatic transmission of the agreed information to the control room of the water supply company; ● Keep commercial records of pumped water, energy carriers and electricity; ● Extend the service life of the units; ● Reduce personnel labor costs by automating control and management functions; ● Increase the safety of the technological process for personnel and the environment. The automated process control system combines several levels of hardware: 1. Sensors and actuators. 2. SCADA controllers. 3. Computer connecting the operator's workstation and SCADA controllers. 2.4. Analysis of the means of physical security of the water supply company As means of physical security at the enterprise are provided: ● Access control and management system for the territory and individual premises of the enterprise; ● Security and fire alarm system; ● Video surveillance system. All security features have events recorded in special logs. Appropriate security personnel are assigned to each means of protection. Actually, they can view service information in the event logs. Figure 3 shows the general structure of the location of the physical security facilities of the water supply company. Figure 3: The general structure of the location of physical security facilities of the water company Figure 3 shows that in order to fully assess the security status of an industrial facility, a security officer must first visit all the points in order to present a picture of what is happening in the building. The lack of interconnection between the means of physical security will complicate the work of the employee and complicates the possibility of early prevention or rapid response in the event of information security attacks affecting the performance of technological processes of the enterprise. By enabling a security service specialist to see the interconnected state of physical and information security of an enterprise, it is possible to significantly simplify its work and improve its quality. The specialist will not have to spend time collecting information from various journals, and conduct a long 131 analysis. He will be able to react in a timely manner or even in advance to the incident, preventing an emergency or a malfunction of the enterprise. This problem will be solved by the introduction of a SIEM system at the enterprise, which will monitor the information system, analyze security events in real time coming from network devices, information security tools. It will be necessary to integrate the existing means of physical security of the enterprise with the installed SIEM system. 3. Analysis of ways to integrate security systems To date, the number of enterprises that use SIEM systems in their information security management centers to ensure cybersecurity is increasing. Information security management centers use a variety of means to protect important information, which in most cases keep a log of all incidents. 3.1. Functional analysis of the SIEM system Every year the number of means of protection increases, and it becomes more difficult for information security specialists to process accumulated records in incident logs. At the same time, if you do not analyze emerging threats in a timely manner and do not try to prevent them, then any protection system will be useless. Under these conditions, you should think about using Security Information and Event Management (SIEM) class systems. As a rule, in serious companies with a mature information security function, there are monitoring and response centers where SIEM systems are used [3]. There are often situations when attackers use complex and distributed methods of accessing information, while security tools may not react to such incidents, considering them frivolous. However, if you analyze all the minor incidents, you can form a more visual picture that will indicate a serious attack. It is precisely these properties that characterize modern SIEM systems, they are able to detect attacks by post-analysis of events, by minor incidents, as well as anomalous phenomena in the system. Consider the generally accepted definition of a SIEM system [3]. SIEM (Security Information and Event Management) - solutions that monitor information systems, analyze real-time security events originating from network devices, information security tools, IT services, system and application infrastructure, and help detect information security incidents. SIEM are provided by providers as hardware devices, software or services and are used to collect and process events, alerts, generate reports and visualize information security violations. It should be noted right away that SIEM systems are designed to monitor and respond to incidents, but do not allow you to protect yourself from threats or prevent negative events [4]. As a rule, these systems appeared much earlier than their application was in demand. SIEM systems are used to solve the following tasks [3]: ● Data consolidation, collection of information security events from various sources (network devices and IT services, security systems, operating systems, databases, business applications); ● Storing security events from various sources in historical order for retrospective analysis and identification of chains of actions that caused security incidents; ● Correlation and processing of security events, the use of various techniques to compare audit data from various sources and identify significant information; ● Providing tools for expert analysis of events and analysis of security incidents with the ability to search through a variety of parameters and build models of the relationship of events with each other; ● Contextual enrichment of incidents with information about the belonging of the data affected in the IB events to certain business applications, employees of the organization and processes, their criticality for business or vulnerability to threats based on information from security systems and vulnerability scanners; ● Automatic notification of the security administrator via the SIEM interface through integration with the application accounting system, as well as by e-mail, SMS, etc. 132 Examples of Russian SIEM systems: ● COMRADE; ● Garda Analytics; ● MaxPatrol. 3.2. Analysis of the PSIM system functionality It should be noted that SIEM systems, like others, evolve over time. As a result of this development, SIEM systems have subclasses with various functional extensions: SOAR, COM, PSIM. In particular, PSIM systems allow not only to collect incident data from network devices, like classic SIEM systems, but also to work with physical security systems and automated process management systems, while PSIM systems not only collect data and generate warnings, but also have the ability to monitor the operation of equipment. Since it is important for an industrial facility to control the situation using a video surveillance system, PSIM systems are considered in the work. For the most part, SIEM systems work as network hosts (information system). PSIM systems are used to work with physical security systems and automated control systems. One of the main additions of PSIM systems is working with video information, which is very important for monitoring the situation at industrial facilities, since the video surveillance system at such facilities is an integral part of physical security. They have connectors to hundreds of models of physical security devices, the rules system allows you to send only important information to the SIEM system, and video data can be transmitted to the SIEM system as a link to the PSIM interface. Examples of PSIM systems: ● Darvis; ● ESM – PSIM; ● CoordCom. One of the representatives of the PSIM system is the Darvis software product developed by Infocom- S LLC. The main task of Darvis is the qualitative integration of all existing systems of the facility to ensure full control and management without the use of additional technical units and with minimal participation of employees [5]. Therefore, we will choose it as an integrated system for a water supply company. Below we will consider the algorithm for handling security incidents of the Darvis platform. 3.3. The algorithm of integration of the video surveillance system of the water supply company and the software product "Darvis" As part of the work, the algorithm for the operation of the Darvis platform will be developed, interacting with the video surveillance system and the existing pressure monitoring sensors in the city's water supply. Figure 4 shows an interface for creating an event management algorithm for the Darvis platform. 133 Figure 4: Interface for creating an algorithm for managing events of the Darvis platform The algorithm for processing an emergency situation will be developed in such a way that it will allow to form a division of alerts into: ● The presence of a high level of danger of an incident that has occurred, which requires immediate notification of the responsible person, and requires an ultra-fast response to eliminate. In this case, the notification to the employee can come in the form of SMS messages, e-mail messages and information output to the computer monitor through integration with the SIEM system, as well as information output to the dashboard; ● The presence of a situation that is not so dangerous, and does not need urgent elimination and response. The alert does not require immediate attention, so it will be implemented only on the workplace monitor. The response algorithm should be developed taking into account the following aspects of the company's work: 1. Sensors measuring water pressure in water pipes are placed at water supply and discharge sites, pumping stations; 2. There are automatically controlled valves for the supply or emergency shutdown of water in the city; 3. In the chambers and pumping stations within the radius of the placement of sensors, video surveillance of what is happening is conducted; 4. Any changes in the water pressure level are recorded and transmitted to the operator's workstation, after which the operator analyzes the surveillance cameras in the relevant areas and takes measures to eliminate the situation. The developed algorithm assumes automating point 4, presented above. Until the operator finds the necessary sensor in the video surveillance system, examines the picture of the accident on the line, and then contacts the head of the emergency repair team, and until the employees arrive at the accident site, a long period of time will pass. The Darvis system will allow you to automatically monitor these emergency situations and promptly respond to the resolution of the situation, depending on the actions laid down in the algorithm. For example, with a significant decrease in pressure, the system itself will display an image from the surveillance cameras of the area where the deviation from the norm occurred on the operator's monitor. In the case when the pressure in the pipeline has significantly decreased or has become zero at all, the system will determine this situation as a burst of the pipeline and immediately automatically take action to close the valves on this section of the line. Thus preventing damage caused to the city (blurring of roads, etc.), to individuals (flooding of the yard territory of private houses, causing harm to the health of passers-by, due to the release of a huge amount of water under high pressure, etc.), as well as the loss of a large amount of water for the organization itself. The above algorithm can be represented as follows (Figure 5). 134 Figure 5: The general structure of the location of the physical security facilities of the water supply company The work on the integration of the video surveillance system and the Darvis software will allow it to be used as a single platform for providing a comprehensive security system and rapid response to incidents. Rapid response to accidents in the water supply line or at pumping stations will reduce water losses, which will reduce material damage to the enterprise. 135 4. Acknowledgements The work was carried out using the equipment of the Center for Collective Use of North-Caucasus Federal University with financial support from the Ministry of Science and Higher Education of Russian Federation, unique project identifier RF ---- 2296.61321X0029 (agreement no. 075-15-2021-687). 5. References [1] Federal Law "On Industrial Safety of Hazardous Production Facilities" dated 21.07.1997 No. 116- FL. [2] Elena Basan, Maria Lapina, Dmitry Orel. "Host-based Method and System for Detecting Anomalies in Network Traffic for a Robotic System". Proceedings of the Young Scientist's Third International Workshop on Trends in Information Processing (YSIP3 2019), Stavropol, September 17th to 20th, 2019; CEUR Workshop Proceedings Volume 2500, 2019. [3] Guseva, T.M., Badun, A.A. Analysis of the problem of ensuring cybersecurity of industrial facilities based on SIEM systems. Innovation in the modern world: experience, problems and prospects for development. Collection of materials of the II International Conference, Ufa, 2020, pp. 61-67. [4] Zolotukhin Alexey Vitalievich, Timokhovich Alexander Stepanovich. The principle of operation and the typical structure of information security event management tools. Academy. 2017. No. 10 (25). URL: https://cyberleninka.ru/article/n/printsip-raboty-i-tipovaya-struktura-sredstv- upravleniya-sobytiyami-bezopasnosti-informatsii. [5] The Darvis platform. PSIM is a platform for managing and monitoring the security subsystems of an object. URL: https://darvis.pro. [6] Calculation of water by pipe diameter and pressure: factors and methods. URL: https://strojdvor.ru/vodosnabzhenie/rascet-rashoda-vody/. [7] Gonzalez-Granadillo, G., Menesidou, S.A., Papamartzivanos, D., Xenakis, C., Romeu R., Navaroo-LIobert D., Okoh C., Nifakos S., Xenakis C., Panaousis, E. "Automated cyber and privacy risk management toolkit". Sensors 21(16), 549, 2021. doi:10.3390/s21165493 [8] Orel, D. V., Zhuk, A. P., Zhuk, E. P., Luganskaia, L. A. A method of forming code sets for CDMA in communication, navigation and control systems. 2nd Young Scientist's International Workshop on Trends in Information Processing, YSIP2 2017; Dombai; Russian Federation; 16-20 May 2017; CEUR Workshop Proceedings Volume 1837, 2017, pp. 158-167. [9] Rikhtechi, L., Rafe, V., Rezakhani, A. Secured Access Control in Security Information and Event Management Systems. Journal of Information Systems and Telecommunication 9(33), pp. 67-78, 2021. [10] González-Granadillo, G., González-Zarzosa, S., Diaz, R. "Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures". Sensors 21(14), 4759, 2021. [11] Aleksandr Zhuk, Viktor Sazonov, Dmitrii Orel, Vladimir Pashintsev. Computer Modeling of Orthogonal in the Amplified Sense Signal. Atlantis Highlights in Computer Sciences, volume 3, 2019, pp. 215-217. doi: 10.2991/csit-19.2019.37. [12] Aleksandr P. Zhuk, Dmitrii V. Orel, Igor A. Kalmykov, Andrey V. Studenikin. Improved Method of Formation of an Increased Number of Binary Quasi-Orthogonal Code Sequence Systems with the Required Statistical and Correlation Characteristics. Atlantis Highlights in Computer Sciences, volume 3, 2019, pp. 209-214. doi: 10.2991/csit-19.2019.36. [13] Eswaran, S., Srinivasan, A., Honnavalli, P. A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise. Network Security 2021(4), 2021, pp. 7-16. [14] Berdibayev, R., Gnatyuk, S., Yevchenko, Y., Kishchenko, V. A concept of the architecture and creation for siem system in critical infrastructure. Studies in Systems, Decision and Control 346, 2021, pp. 221-242. 136