Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure

Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure

Peter J. Hawrylak, Chris Hartney, Mauricio Papa, John Hale
ISBN13: 9781466629646|ISBN10: 1466629649|EISBN13: 9781466629653
DOI: 10.4018/978-1-4666-2964-6.ch009
Cite Chapter Cite Chapter

MLA

Hawrylak, Peter J., et al. "Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure." Critical Information Infrastructure Protection and Resilience in the ICT Sector, edited by Paul Théron and Sandro Bologna, IGI Global, 2013, pp. 173-197. https://doi.org/10.4018/978-1-4666-2964-6.ch009

APA

Hawrylak, P. J., Hartney, C., Papa, M., & Hale, J. (2013). Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure. In P. Théron & S. Bologna (Eds.), Critical Information Infrastructure Protection and Resilience in the ICT Sector (pp. 173-197). IGI Global. https://doi.org/10.4018/978-1-4666-2964-6.ch009

Chicago

Hawrylak, Peter J., et al. "Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure." In Critical Information Infrastructure Protection and Resilience in the ICT Sector, edited by Paul Théron and Sandro Bologna, 173-197. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2964-6.ch009

Export Reference

Mendeley
Favorite

Abstract

The Smart Grid will incorporate computer networking technologies into the electrical generation, transmission, and distribution sectors. Thus, there will be an underlying Critical Information Infrastructure (CII) based on these network connections. This CII is vulnerable to traditional cyber or computer based attacks typically geared toward disabling devices or networks. However, the Smart Grid is also vulnerable to physical attacks where sensors are tricked into reporting false conditions that cause the control system to react in an inappropriate manner. Cyber-physical attacks blending both cyber and physical attack components are also a possibility. Techniques to model cyber-attacks exist, and this chapter presents a modeling methodology, termed hybrid attack graphs, to model cyber-physical attacks. The hybrid attack graph formalism can be applied to develop best practice guidelines and security patches for the Smart Grid. This formalism can also be applied to other cyber-physical domains as well to help bridge the gap between the physical, logical, and network domains.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.