Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022 Jun 24;22(13):4795.
doi: 10.3390/s22134795.

GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids

Affiliations
Review

GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids

Tan Duy Le et al. Sensors (Basel). .

Abstract

The smart grid is one of the core technologies that enable sustainable economic and social developments. In recent years, various cyber attacks have targeted smart grid systems, which have led to severe, harmful consequences. It would be challenging to build a real smart grid system for cybersecurity experimentation and validation purposes. Hence, analytical techniques, with simulations, can be considered as a practical solution to make smart grid cybersecurity experimentation possible. This paper first provides a literature review on the current state-of-the-art in smart grid attack analysis. We then apply graphical security modeling techniques to design and implement a Cyber Attack Analysis Framework for Smart Grids, named GridAttackAnalyzer. A case study with various attack scenarios involving Internet of Things (IoT) devices is conducted to validate the proposed framework and demonstrate its use. The functionality and user evaluations of GridAttackAnalyzer are also carried out, and the evaluation results show that users have a satisfying experience with the usability of GridAttackAnalyzer. Our modular and extensible framework can serve multiple purposes for research, cybersecurity training, and security evaluation in smart grids.

Keywords: attack graph; attack tree; cyber attack; cybersecurity; graphical security modeling; smart grid; vulnerability.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Figures

Figure 1
Figure 1
The architecture of GridAttackAnalyzer.
Figure 2
Figure 2
GridAttackAnalyzer desktop application.
Figure 3
Figure 3
R4-12.47-2—A PNNL taxonomy feeder [32], where A, B, C, D, and E, are the corresponding areas.
Figure 4
Figure 4
An example of the smart grid simplified network model with a gateway.
Figure 5
Figure 5
An example of CVE information.
Figure 6
Figure 6
An illustration of an attack graph produced as part of a case study.
Figure 7
Figure 7
An example of attack analysis result visualization.
Figure 8
Figure 8
SUS questionnaire for GridAttackAnalyzer.

References

    1. Fukuyama M. Society 5.0: Aiming for a new human-centered society. Jpn. Spotlight. 2018;27:47–50.
    1. Ghansah I. Smart Grid Cyber Security Potential Threats, Vulnerabilities and Risks: Interim Project Report. California Energy Commission; Sacramento, CA, USA: 2012.
    1. ICS-CERT Incident Response/Vulnerability Coordination in 2014. [(accessed on 8 May 2022)]; Available online: https://www.cisa.gov/uscert/sites/default/files/Monitors/ICS-CERT_Monito....
    1. Le T.D., Anwar A., Loke S.W., Beuran R., Tan Y. GridAttackSim: A Cyber Attack Simulation Framework for Smart Grids. Electronics. 2020;9:1218. doi: 10.3390/electronics9081218. - DOI
    1. Le T.D., Anwar A., Beuran R., Loke S.W. Smart Grid Co-Simulation Tools: Review and Cybersecurity Case Study; Proceedings of the 2019 7th International Conference on Smart Grid (icSmartGrid); Newcastle, NSW, Australia. 9–11 December 2019; pp. 39–45.

LinkOut - more resources