Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure

Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure

Peter J. Hawrylak, Chris Hartney, Mauricio Papa, John Hale
Copyright: © 2014 |Pages: 27
ISBN13: 9781466659421|ISBN10: 1466659424|EISBN13: 9781466659438
DOI: 10.4018/978-1-4666-5942-1.ch110
Cite Chapter Cite Chapter

MLA

Hawrylak, Peter J., et al. "Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure." Cyber Behavior: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 2098-2124. https://doi.org/10.4018/978-1-4666-5942-1.ch110

APA

Hawrylak, P. J., Hartney, C., Papa, M., & Hale, J. (2014). Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure. In I. Management Association (Ed.), Cyber Behavior: Concepts, Methodologies, Tools, and Applications (pp. 2098-2124). IGI Global. https://doi.org/10.4018/978-1-4666-5942-1.ch110

Chicago

Hawrylak, Peter J., et al. "Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure." In Cyber Behavior: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 2098-2124. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5942-1.ch110

Export Reference

Mendeley
Favorite

Abstract

The Smart Grid will incorporate computer networking technologies into the electrical generation, transmission, and distribution sectors. Thus, there will be an underlying Critical Information Infrastructure (CII) based on these network connections. This CII is vulnerable to traditional cyber or computer based attacks typically geared toward disabling devices or networks. However, the Smart Grid is also vulnerable to physical attacks where sensors are tricked into reporting false conditions that cause the control system to react in an inappropriate manner. Cyber-physical attacks blending both cyber and physical attack components are also a possibility. Techniques to model cyber-attacks exist, and this chapter presents a modeling methodology, termed hybrid attack graphs, to model cyber-physical attacks. The hybrid attack graph formalism can be applied to develop best practice guidelines and security patches for the Smart Grid. This formalism can also be applied to other cyber-physical domains as well to help bridge the gap between the physical, logical, and network domains.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.