Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis

Smart grid is an intelligent energy distribution system consisting of multiple information and communication technologies (ICT). One of the challenges for such complex and heterogeneous system as smart grid is to unite security analysis on a high level of abstraction and concrete behavioral attack patterns that exploit low-level vulnerabilities. We provide a structured method that combines the Si* language, which can express attacker motivations as a goal hierarchy, and vulnerability specific attack graphs, which shows every step available for an attacker. We derive system specific information from the low-level representation of the system for a high-level probabilistic analysis.

[1]  Carlos Sarraute,et al.  An algorithm to find optimal attack paths in nondeterministic scenarios , 2011, AISec '11.

[2]  Fabio Massacci,et al.  A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach , 2011, FOSAD.

[3]  Zbigniew W. Ras,et al.  Advances in Intelligent Information Systems , 2010, Advances in Intelligent Information Systems.

[4]  R.F. Mills,et al.  Analyzing Attack Trees using Generalized Stochastic Petri Nets , 2006, 2006 IEEE Information Assurance Workshop.

[5]  A Min Tjoa,et al.  SOFSEM 2014: Theory and Practice of Computer Science , 2014, Lecture Notes in Computer Science.

[6]  Sushil Jajodia,et al.  Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.

[7]  Haralambos Mouratidis,et al.  Using Security Attack Scenarios to Analyse Security During Information Systems Design , 2004, ICEIS.

[8]  Wenke Lee,et al.  Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.

[9]  Stefano Bistarelli,et al.  Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[10]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[11]  John Mylopoulos,et al.  Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[12]  William H. Sanders,et al.  Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.

[13]  Roberto Gorrieri,et al.  Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.

[14]  Seungjoo Kim,et al.  Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.

[15]  Axel van Lamsweerde,et al.  Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.

[16]  John Mylopoulos,et al.  Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology , 2010, Advances in Intelligent Information Systems.

[17]  Kristian Beckers Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001 , 2014, SOFSEM.

[18]  Bruce Schneier,et al.  MODELING SECURITY THREATS , 1999 .

[19]  Kristian Beckers,et al.  Common criteria compliant software development (CC-CASD) , 2013, SAC '13.

[20]  Jan Jürjens Using UMLsec and goal trees for secure systems development , 2002, SAC '02.

[21]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[22]  Fabio Martinelli,et al.  Towards Modelling Adaptive Attacker's Behaviour , 2012, FPS.

[23]  Ludovic Piètre-Cambacédès,et al.  Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP) , 2010, 2010 European Dependable Computing Conference.