Abstract
Smart Grid is one of the critical technologies that provide essential services to sustain social and economic developments. There are various cyber attacks on the Smart Grid system in recent years, which resulted in various negative repercussions. Therefore, understanding the characteristics and evaluating the consequences of an attack on the Smart Grid system is essential. The combination of Graphical Security Model (GrSM), including Attack Tree (AT) and Attack Graph (AG), and the Common Vulnerability Score System (CVSS) is a potential technology to analyze attack on Smart Grid system. However, there are a few research works about Smart Grid attack analysis using GrSM and CVSS. In this research, we first conduct a comprehensive study of the existing research on attack analysis using GrSM and CVSS, ranging from (1) Traditional Networks, (2) Emerging Technologies, to (3) Smart Grid. We indicate that the framework for automating security analysis of the Internet of Things is a promising direction for Smart Grid attack analysis using GrSM and CVSS. The framework has been applied to assess security of the Smart Grid system. A case study using the PNNL Taxonomy Feeders R4-12.47-2 and Smart Grid network model with gateways was conducted to validate the utilized framework. Our research is enriched by capturing all potential attack paths and calculating values of selected security metrics during the vulnerability analysis process. Furthermore, AG can be generated automatically. The research can potentially be utilized in Smart Grid cybersecurity training.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ghansah, I.: Smart Grid Cyber Security Potential Threats. Interim Project Report. California Energy Commission, Vulnerabilities and Risks (2012)
Christey, S., Martin, R.A.: Vulnerability type distributions in CVE (2007)
Scarfone, K., Mell, P.: An analysis of CVSS version 2 vulnerability scoring. In: 3rd International Symposium on Empirical Software Engineering and Measurement, pp. 516–525. IEEE (2009)
Hong, J.B., Kim, D.S., Chung, C.-J., Huang, D.: A survey on the usability and practical applications of graphical security models. Comput. Sci. Rev. 26, 1–16 (2017)
Schneier, B.: Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, Hoboken (2015)
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings: IEEE Symposium on Security and Privacy, pp. 273–284. IEEE (2002)
Hong, J., Kim, D.-S.: Harms: hierarchical attack representation models for network security analysis (2012)
Hong, J.B., Kim, D.S.: Towards scalable security analysis using multi-layered security models. J. Netw. Comput. Appl. 75, 156–168 (2016)
Anoop Singhal, X.O.: Security risk analysis of enterprise networks using probabilistic attack graphs, National Institute of Standards and Technology (NIST), Tech. Rep. (2011)
Hyunchul Joh, Y.K.M.: Defining and assessing quantitative security risk measures using vulnerability lifecycle and CVSS metrics. In: The 2011 International Conference on Security and Management (SAM 2011) (2011)
Cheng, P., Wang, L., Jajodia, S., Singhal, A.: Aggregating CVSS base scores for semantics-rich network security metrics. In: International Symposium on Reliable Distributed Systems (2012)
Poolsappasit, I.R.N., Dewri, R.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Secur. Comput. 9(1), 61–74 (2012)
Alhomidi, M., Reed, M.: Attack graph-based risk assessment and optimisation approach. Int. J. Netw. Secur. Appl. 6(3), 31 (2014)
Aksu, M.U., et al.: A quantitative cvss-based cyber security risk assessment methodology for it systems. In: 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1–8 (2017)
Ge, M., Kim, D.S.: A framework for modeling and assessing security of the internet of things. IEEE 21st International Conference on Parallel and Distributed Systems (2015)
Yusuf, S.E., Ge, M., Hong, J.B., Kim, H.K., Kim, P., Kim, D.S.: Security modelling and analysis of dynamic enterprise networks. In:. IEEE International Conference on Computer and Information Technology (CIT), vol. 2016, pp. 249–256 (2016)
Ge, M., Hong, J.B., SeongKim, W.G.D.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12–27 (2017)
Li, E.: Quantitative model of attacks on distribution automation systems based on CVSS and attack trees. Information 10(8), 251 (2019)
An, S., et al.: Cloudsafe: a tool for an automated security analysis for cloud computing. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 602–609 (2019)
Eom, T.H., Jin, B., An, S.P., Jong, S., Kim, D.S.: A framework for real-time intrusion response in software defined networking using precomputed graphical security models. Secur. Commun. Netw. (2020)
Beckers, K., Heisel, M., Krautsevich, L., Martinelli, F., Meis, R., Yautsiukhin, A.: Determining the probability of smart grid attacks by combining attack tree and attack graph analysis. In: Cuellar, J. (ed.) SmartGridSec 2014. LNCS, vol. 8448, pp. 30–47. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10329-7_3
Wadhawan, Y., Neuman, C., AlMajali, A.: A comprehensive analysis of smart grid systems against cyber-physical attacks. Electronics 7(10), 249 (2018)
Meyur, R.: A Bayesian attack tree based approach to assess cyber-physical security of power system. In: IEEE Texas Power and Energy Conference (TPEC), pp. 1–6 (2020)
Schneider, K., et al.: Analytic considerations and design basis for the IEEE distribution test feeders. IEEE Trans. Power Syst. 33(3), 3181–3188 (2017)
Schneider, K.P., Chen, Y., Chassin, D.P., Pratt, R.G., Engel, D.W., Thompson, S.E.: Modern grid initiative distribution taxonomy final report, Pacific Northwest National Lab. (PNNL), Richland, WA (United States), Tech. Rep. (2008)
Saputro, N., Akkaya, K., Uludag, S.: A survey of routing protocols for smart grid communications. Comput. Netw. 56(11), 2742–2771 (2012)
Colak, I., Sagiroglu, S., Fulli, G., Yesilbudak, M., Covrig, C.-F.: A survey on the critical issues in smart grid technologies. Renew. Sustain. Energy Rev. 54, 396–405 (2016)
Le, T.D., Anwar, A., Beuran, R., Loke, S.W.: Smart grid co-simulation tools: Review and cybersecurity case study. In: 2019 7th International Conference on Smart Grid (icSmartGrid), pp. 39–45. IEEE (2019)
Le, T.D., Anwar, A., Loke, S.W., Beuran, R., Tan, Y.: Gridattacksim: a cyber attack simulation framework for smart grids. Electronics 9(8), 1218 (2020)
Cohen, M.A.: Gridlab-d taxonomy feeder graphs, GridLAB-D Taxonomy Feeder Graphs (2013)
Raza, N., Akbar, M.Q., Soofi, A.A., Akbar, S.: Study of smart grid communication network architectures and technologies. J. Comput. Commun. 7(3), 19–29 (2019)
Clements, S.L., Carroll, T.E., Hadley, M.D.: Home area networks and the smart grid, Pacific Northwest National Lab. (PNNL), Richland, WA (United States), Tech. Rep. (2011)
Blank, R.M.: Guide for conducting risk assessments (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Duy Le, T. et al. (2021). CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study. In: Lin, YB., Deng, DJ. (eds) Smart Grid and Internet of Things. SGIoT 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 354. Springer, Cham. https://doi.org/10.1007/978-3-030-69514-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-69514-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69513-2
Online ISBN: 978-3-030-69514-9
eBook Packages: Computer ScienceComputer Science (R0)