Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph Generation
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-9546-9463
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0003-3922-9606
(English)Manuscript (preprint) (Other academic)
Abstract [en]

The substation plays an important role in the electricgrid and can transform voltage when distributing electricity,as well as serve other functions. The modern substation is aCyber-Physical System, which inherently makes it complex andvulnerable to cybersecurity threats. Two methods for assessingcybersecurity are the use of threat models that give an overviewof the potential threats of a system and attack graphs that cangive details of potential paths of an attack. In this paper, wedescribe a parser for automatically creating threat models andattack graphs of a substation by using a threat modeling languagefor Substation Automation Systems and the configuration files ofsubstations according to IEC 61850. By modeling attack scenariosand discussing the automatically generated attack graphs withexperts in the industry, we were able to evaluate the threatmodeling language and show how it can be used to generateaccurate attack scenarios.

Keywords [en]
threat modeling, attack graph, cybersecurity, cyber physical system, energy system, substation automation system
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-362975OAI: oai:DiVA.org:kth-362975DiVA, id: diva2:1955851
Note

QC 20250502

Available from: 2025-05-02 Created: 2025-05-02 Last updated: 2025-05-02Bibliographically approved
In thesis
1. Cyber Security Threat Modeling of Power Grid Substation Automation Systems
Open this publication in new window or tab >>Cyber Security Threat Modeling of Power Grid Substation Automation Systems
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The substation is a vital part of the power grid and serves to aid in the distribution of electricity by, for example, transforming from high to low voltage. It is essential to protect the substation as a loss of electricity would cause severe consequences for our society. The Substation Automation System (SAS) allows for remote management and automation of substations but also creates possibilities for cybersecurity threats. In this thesis efforts towards using threat modeling to assess the cybersecurity of SAS are presented. Threat modeling entails creating a model of the system that shows the possible cybersecurity threats against it. To reach this goal, previously used information sources for threat modeling in the power systems domain are found. The thesis also includes the creation of a Time-To-Compromise (TTC) estimate for cyber attacks against Industrial Control Systems. By estimating the TTC, it is possible to prioritize which attacks to defend against. One method of creating threat models is by using threat modeling languages in which the assets, associations, attacks, and defenses have been defined. In this thesis, a threat modeling language for creating threat models of SAS is presented. The threat models in this thesis are used to create attack graphs to show the possible paths an attacker could take throughout the system. The work of this thesis also consists of evaluation of threat modeling languages that have been created or used. As a result, accurate assessment of cybersecurity for SAS can be made that helps in the efforts to keep them secure against cyber attacks.

Abstract [sv]

Transformatorstationen är en viktig del av elkraftnätet och dess roll är att hjälpa till med distributionen av el genom att som dess namn beskriver transformera om spänningen. Det är nödvändigt att skydda transformatorstationen eftersom ett elavbrott skulle skapa stora konsekvenser för vårt samhälle. Ett automatiserat transformatorstationssystem gör det möjligt att hantera den externt men det öppnar även upp möjligheterna för cybersäkerhetshot. I den här avhandlingen presenteras forskning kring användning av hotmodellering för att utvärdera cybersäkerheter för SAS. Hotmodellering innebär att man skapar en modell av systemet som visar möjliga cybersäkerhetshot mot det. För att nå det målet har informationskällor för hotmodeller inom kraftnätsdomänen sammanställts genom en systematisk litteraturstudie. I avhandlingen tas det också fram ett sätt att räkna ut tiden det tar för att framgångsrikt genomföra en cyberattack mot industriella kontrollsystem. Hotmodeller kan skapas genom att använda hotmodelleringsspråk inom vilket komponenterna, relationerna, attacker och försvar är definierade. I den här avhandlingen skapas ett hotmodelleringsspråk för att skapa hotmodeller av SAS. Hotmodellerna i detta arbete kan användas för att skapa attackgrafer som visar möjliga vägarna som en attackerare skulle kunna ta genom systemet. Arbetet utvärderar även hotmodelleringsspråken som har använts eller skapats. Som ett resultat av denna avhandling kan korrekta utvärderingar av cybersäkerhet för SAS göras vilket hjälper i arbetet av att hålla dom säkra mot cyberattacker.

Place, publisher, year, edition, pages
Stockholm, Sweden: KTH Royal Institute of Technology, 2025. p. xii, 45
Series
TRITA-EECS-AVL ; 2025:53
Keywords
Threat Modeling, Cybersecurity, Power systems, Substation Automation Systems, Attack graphs, Industrial Control Systems
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-362974 (URN)978-91-8106-286-1 (ISBN)
Public defence
2025-06-05, https://kth-se.zoom.us/j/61562773806, U1, Brinellvägen 26, Stockholm, 09:30 (English)
Opponent
Supervisors
Note

QC 20250502

Available from: 2025-05-02 Created: 2025-05-02 Last updated: 2025-05-12Bibliographically approved

Open Access in DiVA

No full text in DiVA

Search in DiVA

By author/editor
Rencelj Ling, EnglaEkstedt, Mathias
By organisation
Network and Systems Engineering
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 347 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf