Skip to main content

Threat Navigator: Grouping and Ranking Malicious External Threats to Current and Future Urban Smart Grids

  • Conference paper
  • First Online:

Abstract

Deriving value judgements about threat rankings for large and entangled systems, such as those of urban smart grids, is a challenging task. Suitable approaches should account for multiple threat events posed by different classes of attackers who target system components. Given the complexity of the task, a suitable level of guidance for ranking more relevant and filtering out the less relevant threats is desirable. This requires a method able to distil the list of all possible threat events in a traceable and repeatable manner, given a set of assumptions about the attackers. The Threat Navigator proposed in this paper tackles this issue. Attacker profiles are described in terms of Focus (linked to Actor-to-Asset relations) and Capabilities (Threat-to-Threat dependencies). The method is demonstrated on a sample urban Smart Grid. The ranked list of threat events obtained is useful for a risk analysis that ultimately aims at finding cost-effective mitigation strategies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. CS-CERT: ICS-CERT year in review. https://ics-cert.us-cert.gov/sites/default/files/Annual_Reports/Year_in_Review_FY2014_Final.pdf

  2. The Open Group: Technical standard. Risk taxonomy. http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf

  3. Intel IT: Prioritizing information security risks with threat agent risk assessment. http://www.intel.com/Assets/en_US/PDF/whitepaper/wp_IT_Security_RiskAssessment.pdf

  4. Najgebauer, A., Antkiewicz, R., Chmielewski, M., Kasprzyk, R.: The prediction of terrorist threat on the basis of semantic association acquisition and complex network evolution. J. Telecommun. Inf. Technol. 2008, 14–20 (2008)

    Google Scholar 

  5. Lund, M.S., Solhaug, B., Stølen, K.: Risk analysis of changing and evolving systems using CORAS. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 231–274. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23082-0_9

    Chapter  Google Scholar 

  6. Morison, K., Wang, L., Kundur, P.: Power system security assessment. IEEE Power Energy Mag. 2(5), 30–39 (2004)

    Article  Google Scholar 

  7. IRENE: D2.1 threats identification and ranking. http://www.ireneproject.eu

  8. IRENE: D2.2 societal impact of attacks and attack motivations. http://www.ireneproject.eu

  9. Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, p. 3. Lockheed Martin Corporation, Bethesda (2010)

    Google Scholar 

  10. Le, A., Chen, Y., Chai, M., Vasenev, A., Montoya, L: Assessing loss event frequencies of smart grid cyber threats: encoding flexibility into FAIR using bayesian network approach, smartgifts conference on smart grid inspired future technologies (2016)

    Google Scholar 

Download references

Acknowledgments

This work has been partially supported by the Joint Program Initiative (JPI) Urban Europe via the IRENE project. We would like to thank Prof. Roel Wieringa for his valuable contribution.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandr Vasenev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Vasenev, A., Montoya, L., Ceccarelli, A., Le, A., Ionita, D. (2017). Threat Navigator: Grouping and Ranking Malicious External Threats to Current and Future Urban Smart Grids. In: Hu, J., Leung, V., Yang, K., Zhang, Y., Gao, J., Yang, S. (eds) Smart Grid Inspired Future Technologies. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 175. Springer, Cham. https://doi.org/10.1007/978-3-319-47729-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47729-9_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47728-2

  • Online ISBN: 978-3-319-47729-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics