Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios

The transformation of traditional power systems to smart grids brings significant benefits, but also exposes the grids to various cyber threats. The recent effort led by US National Electric Sector Cybersecurity Organization Resource (NESCOR) Technical Working Group 1 to compile failure scenarios is an important initiative to document typical cybersecurity threats to smart grids. While these scenarios are an invaluable thought-aid, companies still face challenges in systematically and efficiently applying the failure scenarios to assess security risks for their specific infrastructure. In this work, we develop a model-based process for assessing the security risks from NESCOR failure scenarios. We extend our cybersecurity assessment tool, Cyber-SAGE, to support this process, and use it to analyze 25 failure scenarios. Our results show that CyberSAGE can generate precise and structured security argument graphs to quantitatively reason about the risk of each failure scenario. Further, CyberSAGE can significantly reduce the assessment effort by allowing the reuse of models across different failure scenarios, systems, and attacker profiles to perform "what if?" analysis.

[1]  Guttorm Sindre,et al.  Mal-Activity Diagrams for Capturing Attacks on Business Processes , 2007, REFSQ.

[2]  David M. Nicol,et al.  CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems , 2014, QEST.

[3]  William H. Sanders,et al.  Automatic Generation of Security Argument Graphs , 2014, 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing.

[4]  Mathias Ekstedt,et al.  The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures , 2013, IEEE Systems Journal.

[5]  William H. Sanders,et al.  Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.

[6]  Robert K. Abercrombie,et al.  Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation , 2014, 2014 47th Hawaii International Conference on System Sciences.

[7]  Barbara Kordy,et al.  DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..

[8]  William H. Sanders,et al.  Monitoring Advanced Metering Infrastructures with Amilyzer , 2013 .

[9]  William H. Sanders,et al.  Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.

[10]  Carol Hawk,et al.  Cybersecurity and the Smarter Grid , 2014 .

[11]  Voicu Groza,et al.  A risk assessment framework for the smart grid , 2013, 2013 IEEE Electrical Power & Energy Conference.