Skip to main content

Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2019)

Abstract

Recently, Energy Delivery Systems (EDS) has been the target of several sophisticated attacks with potentials for catastrophic damages. These attacks are diverse in techniques, attack progression, and impacts. System administrators require comprehensive analytics to assess their defense against these diverse adversarial strategies. To address this challenge, this paper proposes a methodology to assess cyber threats proactively by characterizing adversary behavior. First, we describe the different level of threat indicators and their effectiveness to understand the adversary activity. Next, we integrate static network information with dynamic attack strategy by mapping attack graphs into attacker’s techniques and tactics. This contextual integration provides insights into attacker’s stealthy behavior. Following the enumeration of complexity and effort for attack progression, we devise a metric to quantify the likelihood of an adversary taking an attack path for compromising an asset in EDS. We empirically evaluated our approach within an ICS test-bed. The results show the significance of our approach for characterizing adversarial behavior and gaining valuable insights on cyber risk management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Public exploit database. http://www.exploit-db.com

  2. Common weakness enumeration, January 2017. http://cwe.mitre.org

  3. National vulnerability database, January 2017. https://nvd.nist.gov

  4. Mitre adversarial tactics, techniues, and common knowledge, August 2018. https://attack.mitre.org/techniques/enterprise

  5. Al-Shaer, R., Ahmed, M., Al-Shaer, E.: Statistical learning of APT TTP chains from mitre ATT&CK

    Google Scholar 

  6. Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst. Secur. 17(1), 1–20 (2014). https://doi.org/10.1145/2630069

    Article  Google Scholar 

  7. Bianco, D.: The pyramid of plain (2014). http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.htmldossier.pdf

  8. Bronk, C., Tikk-Ringas, E.: The cyber attack on saudi aramco. Survival 55(2), 81–96 (2013)

    Article  Google Scholar 

  9. Carcano, A.: Understanding triton, the first sis cyber attack, August 2018. http://www.nozominetworks.com/blog/black-hat-understanding-triton-the-first-sis-cyber-attack

  10. Davis, K.R., et al.: A cyber-physical modeling and assessment framework for power grid infrastructures. IEEE Trans. Smart Grid 6(5), 2464–2475 (2015)

    Article  Google Scholar 

  11. Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier version 1.3, November 2010. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf

  12. Hassanzadeh, A., Burkett, R.: SAMIIT: spiral attack model in iiot mapping security alerts to attack life cycle phases. ics & scada cyber security research. In: 5th International Symposium for ICS & SCADA Cyber Security Research 2018, vol. 5, pp. 11–20. Hamburg, Germany (2018)

    Google Scholar 

  13. Hassanzadeh, A., Modi, S., Mulchandani, S.: Towards effective security control assignment in the industrial Internet of Things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 795–800. IEEE (2015)

    Google Scholar 

  14. Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inf. Warfare Secur. Res. 1(1), 80 (2011)

    Google Scholar 

  15. Idika, N., Bhargava, B.: Extending attack graph-based security metrics and aggregating their application. IEEE Trans. Dependable Secure Comput. 9(1), 75–85 (2012)

    Article  Google Scholar 

  16. Nayak, K., Marino, D., Efstathopoulos, P., Dumitraş, T.: Some vulnerabilities are different than others. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 426–446. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11379-1_21

    Chapter  Google Scholar 

  17. Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: The 13th ACM conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, October-November 2006

    Google Scholar 

  18. Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: a logic-based network security analyzer. In: The 14th Conference on USENIX Security Symposium (SSYM), Baltimore, MD, USA, July-August 2005

    Google Scholar 

  19. Ullah, S., Shetty, S., Hassanzadeh, A.: Towards modeling attacker’s opportunity for improving cyber resilience in energy delivery systems. In: 2018 Resilience Week (RWS). IEEE, August 2018

    Google Scholar 

  20. Zhang, Y., Lingfeng, W., Xiang, Y., Ten, C.: Power system reliability evaluation with scada cybersecurity considerations. IEEE Trans. Smart Grid 6, 1707–1721 (2015)

    Article  Google Scholar 

Download references

Acknowledgment

This material is based upon work supported by the Department of Energy under award number DE-OE0000780 and Department of Homeland Security Grant 2015-ST-061-CIRC01. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sharif Ullah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ullah, S., Shetty, S., Nayak, A., Hassanzadeh, A., Hasan, K. (2019). Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System. In: Chen, S., Choo, KK., Fu, X., Lou, W., Mohaisen, A. (eds) Security and Privacy in Communication Networks. SecureComm 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 305. Springer, Cham. https://doi.org/10.1007/978-3-030-37231-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37231-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37230-9

  • Online ISBN: 978-3-030-37231-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics