Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (7 av 7) Visa alla publikasjoner
Katsikeas, S., Buhaiu, A., Ekstedt, M., Afzal, Z., Hacks, S. & Mukherjee, P. (2024). Development and validation of coreLang: A threat modeling language for the ICT domain. Computers & security (Print), 146, Article ID 104057.
Åpne denne publikasjonen i ny fane eller vindu >>Development and validation of coreLang: A threat modeling language for the ICT domain
Vise andre…
2024 (engelsk)Inngår i: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 146, artikkel-id 104057Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

ICT infrastructures are getting increasingly complex, and defending them against cyber attacks is cumbersome. As cyber threats continue to increase and expert resources are limited, organizations must find more efficient ways to evaluate their resilience and take proactive measures. Threat modeling is an excellent method of assessing the resilience of ICT systems, for example, by building Attack Graphs that illustrate an adversary's attack vectors. Previously, the Meta Attack Language (MAL) was proposed, which serves as a framework to develop Domain Specific Languages (DSLs) and generate Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes Attack Graphs to enable attack simulations and security assessments. In this work, we present the first release version of coreLang in which MITRE ATT&CK tactics and techniques are mapped onto to serve as a validation and identify strengths and weaknesses to benefit the development cycle. Our validation showed that coreLang does cover 46% of all the techniques included in the matrix, while if we additionally exclude the tactics that are intrinsically not covered by coreLang and MAL, the coverage percentage increases to 64%.

sted, utgiver, år, opplag, sider
Elsevier BV, 2024
Emneord
Domain specific language, Attack graphs, Cyber attack modeling, Threat modeling, ICT domain
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-353785 (URN)10.1016/j.cose.2024.104057 (DOI)001298046900001 ()2-s2.0-85201461410 (Scopus ID)
Merknad

QC 20240924

Tilgjengelig fra: 2024-09-24 Laget: 2024-09-24 Sist oppdatert: 2024-09-24bibliografisk kontrollert
Afzal, Z., Ekstedt, M., Müller, N. & Mukherjee, P. (2024). Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis. Electronics, 13(22), Article ID 4522.
Åpne denne publikasjonen i ny fane eller vindu >>Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis
2024 (engelsk)Inngår i: Electronics, E-ISSN 2079-9292, Vol. 13, nr 22, artikkel-id 4522Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Flexibility markets are crucial for balancing the decentralised and renewable-driven energy landscape. This paper presents a security evaluation of a flexibility market system using a threat modelling approach. A reference architecture for a typical flexibility market system is proposed, and attack graph-driven simulations are performed to analyse potential attack pathways where malicious actors might infiltrate the system and the vulnerabilities they might exploit. Key findings include the identification of high-risk areas, such as the Internet links between market actors. To mitigate these risks, the paper proposes and evaluates multiple protection scenarios in reducing the identified attack vectors. The findings underline the importance of multi-layered security strategies to safeguard flexibility markets from increasingly sophisticated cyber threats.

sted, utgiver, år, opplag, sider
MDPI AG, 2024
Emneord
attack graphs, distributed energy resources, security analysis, smart grid
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-357175 (URN)10.3390/electronics13224522 (DOI)001364705500001 ()2-s2.0-85210250867 (Scopus ID)
Merknad

QC 20241209

Tilgjengelig fra: 2024-12-04 Laget: 2024-12-04 Sist oppdatert: 2024-12-09bibliografisk kontrollert
Ekstedt, M., Afzal, Z., Mukherjee, P., Hacks, S. & Lagerström, R. (2023). Yet another cybersecurity risk assessment framework. International Journal of Information Security, 22(6), 1713-1729
Åpne denne publikasjonen i ny fane eller vindu >>Yet another cybersecurity risk assessment framework
Vise andre…
2023 (engelsk)Inngår i: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 22, nr 6, s. 1713-1729Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.

sted, utgiver, år, opplag, sider
Springer Nature, 2023
Emneord
Attack tree, Enterprise IT risk, Risk assessment, Threat modeling
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-338542 (URN)10.1007/s10207-023-00713-y (DOI)001027329600001 ()2-s2.0-85164669184 (Scopus ID)
Merknad

QC 20231108

Tilgjengelig fra: 2023-11-08 Laget: 2023-11-08 Sist oppdatert: 2023-11-08bibliografisk kontrollert
Kraft, O., Pohl, O., Hager, U., Heussen, K., Muller, N., Afzal, Z., . . . Kubis, A. (2022). Development and Implementation of a Holistic Flexibility Market Architecture. In: 2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022: . Paper presented at 2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, 24 April 2022 through 28 April 2022. Institute of Electrical and Electronics Engineers (IEEE)
Åpne denne publikasjonen i ny fane eller vindu >>Development and Implementation of a Holistic Flexibility Market Architecture
Vise andre…
2022 (engelsk)Inngår i: 2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, Institute of Electrical and Electronics Engineers (IEEE) , 2022Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The demand for increasing flexibility use in power systems is stressed by the changing grid utilization. Making use of largely untapped flexibility potential is possible through novel flexibility markets. Different approaches for these markets are being developed and vary considering their handling of transaction schemes and relation of participating entities. This paper delivers the conceptual development of a holistic system architecture for the realization of an interregional flexibility market, which targets a market based congestion management in the transmission and distribution system through trading between system operators and flexibility providers. The framework combines a market mechanism with the required supplements like appropriate control algorithms for emergency situations, cyber-physical system monitoring and cyber-security assessment. The resulting methods are being implemented and verified in a remote-power-hardware-in-the-loop setup coupling a real world low voltage grid with a geographically distant real time simulation using state of the art control system applications with an integration of the aforementioned architecture components. 

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2022
Emneord
control algorithms, cyber-physical monitoring, cyber-security, flexibility, local markets, Commerce, Computer architecture, Cybersecurity, Electric power system control, Electric power transmission networks, Embedded systems, Changing grids, Conceptual development, Cybe-physical monitoring, Cyber physicals, Cyber security, Grid utilization, Market architectures, Power, Cyber Physical System
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-326194 (URN)10.1109/ISGT50606.2022.9817470 (DOI)2-s2.0-85134895726 (Scopus ID)
Konferanse
2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, 24 April 2022 through 28 April 2022
Merknad

QC 20230502

Tilgjengelig fra: 2023-05-02 Laget: 2023-05-02 Sist oppdatert: 2023-05-02bibliografisk kontrollert
Muller, N., Heussen, K., Afzal, Z., Ekstedt, M. & Eliasson, P. (2022). Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Flexibility Markets. In: 2022 IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America, IEEE PES GTD Latin America 2022: . Paper presented at IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America (IEEE PES GTD Latin America), OCT 20-22, 2022, La Paz, Bolivia. Institute of Electrical and Electronics Engineers (IEEE)
Åpne denne publikasjonen i ny fane eller vindu >>Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Flexibility Markets
Vise andre…
2022 (engelsk)Inngår i: 2022 IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America, IEEE PES GTD Latin America 2022, Institute of Electrical and Electronics Engineers (IEEE) , 2022Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The ongoing integration of renewable generation and distributed energy resources introduces new challenges to distribution network operation. Due to the increasing volatility and uncertainty, distribution system operators (DSOs) are seeking concepts to enable more active management and control. Flexibility markets (FMs) offer a platform for economically efficient trading of electricity flexibility between DSOs and other participants. The integration of cyber, physical and market domains of multiple participants makes FMs a system of cyber-physical systems (CPSs). While cross-domain integration sets the foundation for efficient deployment of flexibility, it introduces new physical and cyber vulnerabilities to participants. This work systematically formulates threat scenarios for the CPSs of FMs, revealing several remaining security challenges across all domains. Based on the threat scenarios, unresolved monitoring requirements for secure participation of DSOs in FMs are identified, providing the basis for future works that address these gaps with new technical concepts.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2022
Emneord
distribution grids, flexibility markets, threat scenarios, monitoring requirements, cyber-physical power systems
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-331217 (URN)10.1109/IEEEPESGTDLATINAMERI53482.2022.10038290 (DOI)001008158100014 ()2-s2.0-85149186082 (Scopus ID)
Konferanse
IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America (IEEE PES GTD Latin America), OCT 20-22, 2022, La Paz, Bolivia
Merknad

QC 20230706

Tilgjengelig fra: 2023-07-06 Laget: 2023-07-06 Sist oppdatert: 2023-07-06bibliografisk kontrollert
Gylling, A., Ekstedt, M., Afzal, Z. & Eliasson, P. (2021). Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs. In: PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR): . Paper presented at IEEE International Conference on Cyber Security and Resilience (IEEE CSR), JUL 26-28, 2021, ELECTR NETWORK (pp. 304-311). Institute of Electrical and Electronics Engineers (IEEE)
Åpne denne publikasjonen i ny fane eller vindu >>Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
2021 (engelsk)Inngår i: PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), Institute of Electrical and Electronics Engineers (IEEE) , 2021, s. 304-311Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

As cyber threats continue to grow and expertise resources are limited, organisations need to find ways to evaluate their resilience efficiently and take proactive measures against an attack from a specific adversary before it occurs. Threat modelling is an excellent method of assessing the resilience of ICT systems, forming Attack (Defense) Graphs (ADGs) that illustrate an adversary's attack vectors. Cyber Threat Intelligence (CTI) is information that helps understand the current cyber threats, but has little integration with ADGs. This paper contributes with an approach that resolves this problem by using CTI feeds of known threat actors to enrich ADGs under multiple reuse. This enables security analysts to take proactive measures and strengthen their ICT systems against current methods used by any threat actor that is believed to pose a threat to them.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2021
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-304556 (URN)10.1109/CSR51186.2021.9527970 (DOI)000705054100047 ()2-s2.0-85115727510 (Scopus ID)
Konferanse
IEEE International Conference on Cyber Security and Resilience (IEEE CSR), JUL 26-28, 2021, ELECTR NETWORK
Merknad

Part of proceedings: ISBN 978-1-6654-0285-9, QC 20230117

Tilgjengelig fra: 2021-11-08 Laget: 2021-11-08 Sist oppdatert: 2023-01-17bibliografisk kontrollert
Afzal, Z., Brunstrom, A. & Lindskog, S. (2021). Using Features of Encrypted Network Traffic to Detect Malware. In: 25th Nordic Conference on Secure IT Systems, NordSec 2020: . Paper presented at 23 November 2020 through 24 November 2020 (pp. 37-53). Springer Science and Business Media Deutschland GmbH
Åpne denne publikasjonen i ny fane eller vindu >>Using Features of Encrypted Network Traffic to Detect Malware
2021 (engelsk)Inngår i: 25th Nordic Conference on Secure IT Systems, NordSec 2020, Springer Science and Business Media Deutschland GmbH , 2021, s. 37-53Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Encryption on the Internet is as pervasive as ever. This has protected communications and enhanced the privacy of users. Unfortunately, at the same time malware is also increasingly using encryption to hide its operation. The detection of such encrypted malware is crucial, but the traditional detection solutions assume access to payload data. To overcome this limitation, such solutions employ traffic decryption strategies that have severe drawbacks. This paper studies the usage of encryption for malicious and benign purposes using large datasets and proposes a machine learning based solution to detect malware using connection and TLS metadata without any decryption. The classification is shown to be highly accurate with high precision and recall rates by using a small number of features. Furthermore, we consider the deployment aspects of the solution and discuss different strategies to reduce the false positive rate.

sted, utgiver, år, opplag, sider
Springer Science and Business Media Deutschland GmbH, 2021
Emneord
Large dataset, Malware, Turing machines, False positive rates, High-precision, Highly accurate, Large datasets, Network traffic, Payload data, Protected communications, Cryptography
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-308511 (URN)10.1007/978-3-030-70852-8_3 (DOI)000927605100003 ()2-s2.0-85103538148 (Scopus ID)
Konferanse
23 November 2020 through 24 November 2020
Merknad

Part of proceedings: ISBN 9783030708511, QC 20230118

Tilgjengelig fra: 2022-02-09 Laget: 2022-02-09 Sist oppdatert: 2023-09-21bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-9886-6651