kth.sePublications
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cyber Security Threat Modeling of Power Grid Substation Automation Systems
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-9546-9463
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The substation is a vital part of the power grid and serves to aid in the distribution of electricity by, for example, transforming from high to low voltage. It is essential to protect the substation as a loss of electricity would cause severe consequences for our society. The Substation Automation System (SAS) allows for remote management and automation of substations but also creates possibilities for cybersecurity threats. In this thesis efforts towards using threat modeling to assess the cybersecurity of SAS are presented. Threat modeling entails creating a model of the system that shows the possible cybersecurity threats against it. To reach this goal, previously used information sources for threat modeling in the power systems domain are found. The thesis also includes the creation of a Time-To-Compromise (TTC) estimate for cyber attacks against Industrial Control Systems. By estimating the TTC, it is possible to prioritize which attacks to defend against. One method of creating threat models is by using threat modeling languages in which the assets, associations, attacks, and defenses have been defined. In this thesis, a threat modeling language for creating threat models of SAS is presented. The threat models in this thesis are used to create attack graphs to show the possible paths an attacker could take throughout the system. The work of this thesis also consists of evaluation of threat modeling languages that have been created or used. As a result, accurate assessment of cybersecurity for SAS can be made that helps in the efforts to keep them secure against cyber attacks.

Abstract [sv]

Transformatorstationen är en viktig del av elkraftnätet och dess roll är att hjälpa till med distributionen av el genom att som dess namn beskriver transformera om spänningen. Det är nödvändigt att skydda transformatorstationen eftersom ett elavbrott skulle skapa stora konsekvenser för vårt samhälle. Ett automatiserat transformatorstationssystem gör det möjligt att hantera den externt men det öppnar även upp möjligheterna för cybersäkerhetshot. I den här avhandlingen presenteras forskning kring användning av hotmodellering för att utvärdera cybersäkerheter för SAS. Hotmodellering innebär att man skapar en modell av systemet som visar möjliga cybersäkerhetshot mot det. För att nå det målet har informationskällor för hotmodeller inom kraftnätsdomänen sammanställts genom en systematisk litteraturstudie. I avhandlingen tas det också fram ett sätt att räkna ut tiden det tar för att framgångsrikt genomföra en cyberattack mot industriella kontrollsystem. Hotmodeller kan skapas genom att använda hotmodelleringsspråk inom vilket komponenterna, relationerna, attacker och försvar är definierade. I den här avhandlingen skapas ett hotmodelleringsspråk för att skapa hotmodeller av SAS. Hotmodellerna i detta arbete kan användas för att skapa attackgrafer som visar möjliga vägarna som en attackerare skulle kunna ta genom systemet. Arbetet utvärderar även hotmodelleringsspråken som har använts eller skapats. Som ett resultat av denna avhandling kan korrekta utvärderingar av cybersäkerhet för SAS göras vilket hjälper i arbetet av att hålla dom säkra mot cyberattacker.

Place, publisher, year, edition, pages
Stockholm, Sweden: KTH Royal Institute of Technology, 2025. , p. xii, 45
Series
TRITA-EECS-AVL ; 2025:53
Keywords [en]
Threat Modeling, Cybersecurity, Power systems, Substation Automation Systems, Attack graphs, Industrial Control Systems
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electrical Engineering
Identifiers
URN: urn:nbn:se:kth:diva-362974ISBN: 978-91-8106-286-1 (print)OAI: oai:DiVA.org:kth-362974DiVA, id: diva2:1955886
Public defence
2025-06-05, https://kth-se.zoom.us/j/61562773806, U1, Brinellvägen 26, Stockholm, 09:30 (English)
Opponent
Supervisors
Note

QC 20250502

Available from: 2025-05-02 Created: 2025-05-02 Last updated: 2025-05-12Bibliographically approved
List of papers
1. A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain
Open this publication in new window or tab >>A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain
2020 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Power systems are one of the critical infrastructures that has seen an increase in cyber security threats due to digitalization. The digitalization also affects the size and complexity of the infrastructure and therefore makes it more difficult to gain an overview in order to secure the entire power system from attackers. One method of how to gain an overview of possible vulnerabilities and security threats is to use threat modeling. In threat modeling, information regarding the vulnerabilities and possible attacks of power systems is required to create an accurate and useful model. There are several different sources for this information. In this paper we conduct a systematic literature review to find which information sources that have been used in power system threat modeling research. Six different information sources were found: expert knowledge, logs & alerts, previous research, system's state, vulnerability scoring & databases, and vulnerability scanners.

Keywords
Threat modeling, Power systems, Cyber security
National Category
Computer Systems Embedded Systems
Identifiers
urn:nbn:se:kth:diva-284531 (URN)10.1007/978-3-030-58295-1_4 (DOI)2-s2.0-85091311069 (Scopus ID)
Conference
Critical Information Infrastructures Security, CRITIS. 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings
Note

QC 20201029

Available from: 2020-10-27 Created: 2020-10-27 Last updated: 2025-05-02Bibliographically approved
2. Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities
Open this publication in new window or tab >>Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities
2022 (English)In: Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, Scitepress , 2022, Vol. Vol. 1 - 978-989-758-553-1, p. 96-107Conference paper, Published paper (Refereed)
Abstract [en]

The metric Time-To-Compromise (TTC) can be used for estimating the time taken for an attacker to compromise a component or a system. The TTC helps to identify the most critical attacks, which is useful when allocating resources for strengthening the cyber security of a system. In this paper we describe our updated version of the original definition of TTC. The updated version is specifically developed for the Industrial Control Systems domain. The Industrial Control Systems are essential for our society since they are a big part of producing, for example, electricity and clean water. Therefore, it is crucial that we keep these systems secure from cyberattacks. We align the method of estimating the TTC to Industrial Control Systems by updating the original definition’s parameters and use a vulnerability dataset specific for the domain. The new definition is evaluated by comparing estimated Time-To-Compromise values for Industrial Control System attack scenarios to previous research results. 

Place, publisher, year, edition, pages
Scitepress, 2022
Keywords
Industrial Control System, Time-To-Compromise, Cyber Security, Vulnerabilities
National Category
Computer and Information Sciences
Research subject
Information and Communication Technology
Identifiers
urn:nbn:se:kth:diva-310220 (URN)10.5220/0010817400003120 (DOI)000818770500008 ()2-s2.0-85152776521 (Scopus ID)
Conference
8th International Conference on Information Systems Security and Privacy - ICISSP, Online/Virtual, 9-11 February 2022
Funder
SweGRIDS - Swedish Centre for Smart Grids and Energy Storage
Note

Part of proceedings: ISBN 978-989-758-553-1

QC 20220401

Available from: 2022-03-24 Created: 2022-03-24 Last updated: 2025-05-02Bibliographically approved
3. Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data
Open this publication in new window or tab >>Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data
2023 (English)In: SN Computer Science, ISSN 2661-8907, Vol. 4, no 3Article in journal (Refereed) Published
Abstract [en]

When protecting the Industrial Control Systems against cyber attacks, it is important to have as much information as possible to allocate defensive resources properly. In this paper we estimate the Time-To-Compromise of different Industrial Control Systems attack techniques by MITRE ATT&CK. The Time-To-Compromise is estimated using an equation that takes into consideration the vulnerability data that exists for a specific asset and category of vulnerability. The vulnerability data is derived from an Industrial Control Systems specific vulnerability dataset. As a result, we present the mapping of the attack techniques to assets and categories of vulnerability, which makes it possible to apply specific vulnerabilities to the technique. We also present the method of how to estimate the Time-To-Compromise of the techniques and finally the values of Time-To-Compromise. After mapping the attack techniques to assets and category of vulnerability we are able to estimate the Time-To-Compromise and discuss its trustworthiness.

Place, publisher, year, edition, pages
Springer Nature, 2023
Keywords
Cyber security, Vulnerability analysis, Threat modeling language, Attack graph, Substation automation systems
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-325645 (URN)10.1007/s42979-023-01750-z (DOI)2-s2.0-85152776609 (Scopus ID)
Note

QC 20230419

Available from: 2023-04-11 Created: 2023-04-11 Last updated: 2025-05-02Bibliographically approved
4. A threat modeling language for generating attack graphs of substation automation systems
Open this publication in new window or tab >>A threat modeling language for generating attack graphs of substation automation systems
2023 (English)In: International Journal of Critical Infrastructure Protection, ISSN 1874-5482, E-ISSN 2212-2087, Vol. 41, article id 100601Article in journal (Refereed) Published
Abstract [en]

The substation automation system consists of many different complex assets and data flows. The system is also often externally connected to allow for remote management. The complexity and remote access to the substation automation system makes it vulnerable to cyber attacks. It also makes it difficult to assess the overall security of the system. One method of assessing the potential threats against a system is threat modeling. In this paper we create a language for producing threat models specifically for the substation automation systems. We focus on the method used to create the language where we review industry designs, build the language based on existing languages and consider attack scenarios from a literature study. Finally we present the language, model two different attack scenarios and generate attack graphs from the threat models.

Place, publisher, year, edition, pages
Elsevier BV, 2023
Keywords
Cyber security, Vulnerability analysis, Threat modeling language, Attack graph, Substation automation systems
National Category
Computer Systems
Research subject
Industrial Information and Control Systems
Identifiers
urn:nbn:se:kth:diva-325113 (URN)10.1016/j.ijcip.2023.100601 (DOI)000969500100001 ()2-s2.0-85151270761 (Scopus ID)
Note

QC 20230516

Available from: 2023-04-02 Created: 2023-04-02 Last updated: 2025-05-02Bibliographically approved
5. Empirical evaluation of a threat modeling language as a cybersecurity assessment tool
Open this publication in new window or tab >>Empirical evaluation of a threat modeling language as a cybersecurity assessment tool
2024 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 140, article id 103743Article in journal (Refereed) Published
Abstract [en]

The complexity of ICT infrastructures is continuously increasing, presenting a formidable challenge in safeguarding them against cyber attacks. In light of escalating cyber threats and limited availability of expert resources, organizations must explore more efficient approaches to assess their resilience and undertake proactive measures. Threat modeling is an effective approach for assessing the cyber resilience of ICT systems. One method is to utilize Attack Graphs, which visually represent the steps taken by adversaries during an attack. Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework for developing Domain-Specific Languages (DSLs) and generating Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes such Attack Graphs to enable attack simulations and security assessments for the generic ICT domain. Developing domain-specific languages for threat modeling and attack simulations provides a powerful approach for conducting security assessments of infrastructures. However, ensuring the correctness of these modeling languages raises a separate research question. In this study we conduct an empirical experiment aiming to falsify such a domain-specific threat modeling language. The potential inability to falsify the language through our empirical testing would lead to its corroboration, strengthening our belief in its validity within the parameters of our study. The outcomes of this approach indicated that, on average, the assessments generated by attack simulations outperformed those of human experts. Additionally, both human experts and simulations exhibited significantly superior performance compared to random guessers in their assessments. While specific human experts occasionally achieved better assessments for particular questions in the experiments, the efficiency of simulation-generated assessments surpasses that of human domain experts.

Place, publisher, year, edition, pages
Elsevier BV, 2024
Keywords
Cyber attack simulations, Cyber security, Domain experts, Domain-specific threat modeling language, Empirical language evaluation
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-343486 (URN)10.1016/j.cose.2024.103743 (DOI)001181589500001 ()2-s2.0-85184028408 (Scopus ID)
Note

QC 20240215

Available from: 2024-02-15 Created: 2024-02-15 Last updated: 2025-05-02Bibliographically approved
6. Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph Generation
Open this publication in new window or tab >>Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph Generation
(English)Manuscript (preprint) (Other academic)
Abstract [en]

The substation plays an important role in the electricgrid and can transform voltage when distributing electricity,as well as serve other functions. The modern substation is aCyber-Physical System, which inherently makes it complex andvulnerable to cybersecurity threats. Two methods for assessingcybersecurity are the use of threat models that give an overviewof the potential threats of a system and attack graphs that cangive details of potential paths of an attack. In this paper, wedescribe a parser for automatically creating threat models andattack graphs of a substation by using a threat modeling languagefor Substation Automation Systems and the configuration files ofsubstations according to IEC 61850. By modeling attack scenariosand discussing the automatically generated attack graphs withexperts in the industry, we were able to evaluate the threatmodeling language and show how it can be used to generateaccurate attack scenarios.

Keywords
threat modeling, attack graph, cybersecurity, cyber physical system, energy system, substation automation system
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-362975 (URN)
Note

QC 20250502

Available from: 2025-05-02 Created: 2025-05-02 Last updated: 2025-05-02Bibliographically approved

Open Access in DiVA

Summary(1703 kB)67 downloads
File information
File name FULLTEXT01.pdfFile size 1703 kBChecksum SHA-512
bd517ea4444bbcf98c1b9d6700c8f0c34bd4a121d00e51c739173b0a3e19456f8f91594bc4b6da4a5df63ab8a9462970952e2b2efd0b31a964e326e2e91783fd
Type fulltextMimetype application/pdf

Authority records

Rencelj Ling, Engla

Search in DiVA

By author/editor
Rencelj Ling, Engla
By organisation
Network and Systems Engineering
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 70 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 990 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf