kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (7 of 7) Show all publications
Katsikeas, S., Buhaiu, A., Ekstedt, M., Afzal, Z., Hacks, S. & Mukherjee, P. (2024). Development and validation of coreLang: A threat modeling language for the ICT domain. Computers & security (Print), 146, Article ID 104057.
Open this publication in new window or tab >>Development and validation of coreLang: A threat modeling language for the ICT domain
Show others...
2024 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 146, article id 104057Article in journal (Refereed) Published
Abstract [en]

ICT infrastructures are getting increasingly complex, and defending them against cyber attacks is cumbersome. As cyber threats continue to increase and expert resources are limited, organizations must find more efficient ways to evaluate their resilience and take proactive measures. Threat modeling is an excellent method of assessing the resilience of ICT systems, for example, by building Attack Graphs that illustrate an adversary's attack vectors. Previously, the Meta Attack Language (MAL) was proposed, which serves as a framework to develop Domain Specific Languages (DSLs) and generate Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes Attack Graphs to enable attack simulations and security assessments. In this work, we present the first release version of coreLang in which MITRE ATT&CK tactics and techniques are mapped onto to serve as a validation and identify strengths and weaknesses to benefit the development cycle. Our validation showed that coreLang does cover 46% of all the techniques included in the matrix, while if we additionally exclude the tactics that are intrinsically not covered by coreLang and MAL, the coverage percentage increases to 64%.

Place, publisher, year, edition, pages
Elsevier BV, 2024
Keywords
Domain specific language, Attack graphs, Cyber attack modeling, Threat modeling, ICT domain
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:kth:diva-353785 (URN)10.1016/j.cose.2024.104057 (DOI)001298046900001 ()2-s2.0-85201461410 (Scopus ID)
Note

QC 20240924

Available from: 2024-09-24 Created: 2024-09-24 Last updated: 2024-09-24Bibliographically approved
Afzal, Z., Ekstedt, M., Müller, N. & Mukherjee, P. (2024). Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis. Electronics, 13(22), Article ID 4522.
Open this publication in new window or tab >>Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis
2024 (English)In: Electronics, E-ISSN 2079-9292, Vol. 13, no 22, article id 4522Article in journal (Refereed) Published
Abstract [en]

Flexibility markets are crucial for balancing the decentralised and renewable-driven energy landscape. This paper presents a security evaluation of a flexibility market system using a threat modelling approach. A reference architecture for a typical flexibility market system is proposed, and attack graph-driven simulations are performed to analyse potential attack pathways where malicious actors might infiltrate the system and the vulnerabilities they might exploit. Key findings include the identification of high-risk areas, such as the Internet links between market actors. To mitigate these risks, the paper proposes and evaluates multiple protection scenarios in reducing the identified attack vectors. The findings underline the importance of multi-layered security strategies to safeguard flexibility markets from increasingly sophisticated cyber threats.

Place, publisher, year, edition, pages
MDPI AG, 2024
Keywords
attack graphs, distributed energy resources, security analysis, smart grid
National Category
Computer Sciences Embedded Systems
Identifiers
urn:nbn:se:kth:diva-357175 (URN)10.3390/electronics13224522 (DOI)001364705500001 ()2-s2.0-85210250867 (Scopus ID)
Note

QC 20241209

Available from: 2024-12-04 Created: 2024-12-04 Last updated: 2024-12-09Bibliographically approved
Ekstedt, M., Afzal, Z., Mukherjee, P., Hacks, S. & Lagerström, R. (2023). Yet another cybersecurity risk assessment framework. International Journal of Information Security, 22(6), 1713-1729
Open this publication in new window or tab >>Yet another cybersecurity risk assessment framework
Show others...
2023 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 22, no 6, p. 1713-1729Article in journal (Refereed) Published
Abstract [en]

IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.

Place, publisher, year, edition, pages
Springer Nature, 2023
Keywords
Attack tree, Enterprise IT risk, Risk assessment, Threat modeling
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-338542 (URN)10.1007/s10207-023-00713-y (DOI)001027329600001 ()2-s2.0-85164669184 (Scopus ID)
Note

QC 20231108

Available from: 2023-11-08 Created: 2023-11-08 Last updated: 2023-11-08Bibliographically approved
Kraft, O., Pohl, O., Hager, U., Heussen, K., Muller, N., Afzal, Z., . . . Kubis, A. (2022). Development and Implementation of a Holistic Flexibility Market Architecture. In: 2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022: . Paper presented at 2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, 24 April 2022 through 28 April 2022. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Development and Implementation of a Holistic Flexibility Market Architecture
Show others...
2022 (English)In: 2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, Institute of Electrical and Electronics Engineers (IEEE) , 2022Conference paper, Published paper (Refereed)
Abstract [en]

The demand for increasing flexibility use in power systems is stressed by the changing grid utilization. Making use of largely untapped flexibility potential is possible through novel flexibility markets. Different approaches for these markets are being developed and vary considering their handling of transaction schemes and relation of participating entities. This paper delivers the conceptual development of a holistic system architecture for the realization of an interregional flexibility market, which targets a market based congestion management in the transmission and distribution system through trading between system operators and flexibility providers. The framework combines a market mechanism with the required supplements like appropriate control algorithms for emergency situations, cyber-physical system monitoring and cyber-security assessment. The resulting methods are being implemented and verified in a remote-power-hardware-in-the-loop setup coupling a real world low voltage grid with a geographically distant real time simulation using state of the art control system applications with an integration of the aforementioned architecture components. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2022
Keywords
control algorithms, cyber-physical monitoring, cyber-security, flexibility, local markets, Commerce, Computer architecture, Cybersecurity, Electric power system control, Electric power transmission networks, Embedded systems, Changing grids, Conceptual development, Cybe-physical monitoring, Cyber physicals, Cyber security, Grid utilization, Market architectures, Power, Cyber Physical System
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-326194 (URN)10.1109/ISGT50606.2022.9817470 (DOI)2-s2.0-85134895726 (Scopus ID)
Conference
2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, 24 April 2022 through 28 April 2022
Note

QC 20230502

Available from: 2023-05-02 Created: 2023-05-02 Last updated: 2023-05-02Bibliographically approved
Muller, N., Heussen, K., Afzal, Z., Ekstedt, M. & Eliasson, P. (2022). Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Flexibility Markets. In: 2022 IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America, IEEE PES GTD Latin America 2022: . Paper presented at IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America (IEEE PES GTD Latin America), OCT 20-22, 2022, La Paz, Bolivia. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Flexibility Markets
Show others...
2022 (English)In: 2022 IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America, IEEE PES GTD Latin America 2022, Institute of Electrical and Electronics Engineers (IEEE) , 2022Conference paper, Published paper (Refereed)
Abstract [en]

The ongoing integration of renewable generation and distributed energy resources introduces new challenges to distribution network operation. Due to the increasing volatility and uncertainty, distribution system operators (DSOs) are seeking concepts to enable more active management and control. Flexibility markets (FMs) offer a platform for economically efficient trading of electricity flexibility between DSOs and other participants. The integration of cyber, physical and market domains of multiple participants makes FMs a system of cyber-physical systems (CPSs). While cross-domain integration sets the foundation for efficient deployment of flexibility, it introduces new physical and cyber vulnerabilities to participants. This work systematically formulates threat scenarios for the CPSs of FMs, revealing several remaining security challenges across all domains. Based on the threat scenarios, unresolved monitoring requirements for secure participation of DSOs in FMs are identified, providing the basis for future works that address these gaps with new technical concepts.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2022
Keywords
distribution grids, flexibility markets, threat scenarios, monitoring requirements, cyber-physical power systems
National Category
Energy Systems
Identifiers
urn:nbn:se:kth:diva-331217 (URN)10.1109/IEEEPESGTDLATINAMERI53482.2022.10038290 (DOI)001008158100014 ()2-s2.0-85149186082 (Scopus ID)
Conference
IEEE PES Generation, Transmission and Distribution Conference and Exposition - Latin America (IEEE PES GTD Latin America), OCT 20-22, 2022, La Paz, Bolivia
Note

QC 20230706

Available from: 2023-07-06 Created: 2023-07-06 Last updated: 2023-07-06Bibliographically approved
Gylling, A., Ekstedt, M., Afzal, Z. & Eliasson, P. (2021). Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs. In: PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR): . Paper presented at IEEE International Conference on Cyber Security and Resilience (IEEE CSR), JUL 26-28, 2021, ELECTR NETWORK (pp. 304-311). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
2021 (English)In: PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 304-311Conference paper, Published paper (Refereed)
Abstract [en]

As cyber threats continue to grow and expertise resources are limited, organisations need to find ways to evaluate their resilience efficiently and take proactive measures against an attack from a specific adversary before it occurs. Threat modelling is an excellent method of assessing the resilience of ICT systems, forming Attack (Defense) Graphs (ADGs) that illustrate an adversary's attack vectors. Cyber Threat Intelligence (CTI) is information that helps understand the current cyber threats, but has little integration with ADGs. This paper contributes with an approach that resolves this problem by using CTI feeds of known threat actors to enrich ADGs under multiple reuse. This enables security analysts to take proactive measures and strengthen their ICT systems against current methods used by any threat actor that is believed to pose a threat to them.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:kth:diva-304556 (URN)10.1109/CSR51186.2021.9527970 (DOI)000705054100047 ()2-s2.0-85115727510 (Scopus ID)
Conference
IEEE International Conference on Cyber Security and Resilience (IEEE CSR), JUL 26-28, 2021, ELECTR NETWORK
Note

Part of proceedings: ISBN 978-1-6654-0285-9, QC 20230117

Available from: 2021-11-08 Created: 2021-11-08 Last updated: 2023-01-17Bibliographically approved
Afzal, Z., Brunstrom, A. & Lindskog, S. (2021). Using Features of Encrypted Network Traffic to Detect Malware. In: 25th Nordic Conference on Secure IT Systems, NordSec 2020: . Paper presented at 23 November 2020 through 24 November 2020 (pp. 37-53). Springer Science and Business Media Deutschland GmbH
Open this publication in new window or tab >>Using Features of Encrypted Network Traffic to Detect Malware
2021 (English)In: 25th Nordic Conference on Secure IT Systems, NordSec 2020, Springer Science and Business Media Deutschland GmbH , 2021, p. 37-53Conference paper, Published paper (Refereed)
Abstract [en]

Encryption on the Internet is as pervasive as ever. This has protected communications and enhanced the privacy of users. Unfortunately, at the same time malware is also increasingly using encryption to hide its operation. The detection of such encrypted malware is crucial, but the traditional detection solutions assume access to payload data. To overcome this limitation, such solutions employ traffic decryption strategies that have severe drawbacks. This paper studies the usage of encryption for malicious and benign purposes using large datasets and proposes a machine learning based solution to detect malware using connection and TLS metadata without any decryption. The classification is shown to be highly accurate with high precision and recall rates by using a small number of features. Furthermore, we consider the deployment aspects of the solution and discuss different strategies to reduce the false positive rate.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2021
Keywords
Large dataset, Malware, Turing machines, False positive rates, High-precision, Highly accurate, Large datasets, Network traffic, Payload data, Protected communications, Cryptography
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-308511 (URN)10.1007/978-3-030-70852-8_3 (DOI)000927605100003 ()2-s2.0-85103538148 (Scopus ID)
Conference
23 November 2020 through 24 November 2020
Note

Part of proceedings: ISBN 9783030708511, QC 20230118

Available from: 2022-02-09 Created: 2022-02-09 Last updated: 2023-09-21Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9886-6651

Search in DiVA

Show all publications