M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski

Slides:



Advertisements
Similar presentations
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Advertisements

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Smart Grid Cyber Security Framework
Unit Outline Information Security Risk Assessment Module 1: Introduction to Risk Module 2: Definitions and Nomenclature Module 3: Security Risk Assessment.
Lecture 11 Reliability and Security in IT infrastructure.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Introduction to Network Defense
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Cyber Security of SCADA Systems Testbed Development May1013 Group Members: Ben Kregel Justin Fitzpatrick Michael Higdon Rafi Adnan Adviser: Dr. Manimaran.
Security and resilience for Smart Hospitals Key findings
Proactive Incident Response
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Securing Network Servers
Chapter 6: Securing the Cloud
STRIDE to a secure Smart Grid in a hybrid cloud
Cybersecurity - What’s Next? June 2017
Agenda Control systems defined
Compliance with hardening standards
Configuring and Troubleshooting Routing and Remote Access
Threat Management Gateway
Cyber Protections: First Step, Risk Assessment
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Business Risks of Insecure Networks
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Joe, Larry, Josh, Susan, Mary, & Ken
Air Carrier Continuing Analysis and Surveillance System (CASS)
Security in Networking
Cyber defense management
Today’s Risk. Today’s Solutions. Cyber security and
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Healthcare Cloud Security Stack for Microsoft Azure
Risk-informed Decision Making under Incomplete Information
Home Internet Vulnerabilities
The University of Adelaide, School of Computer Science
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
A. Mancusoa,b, M. Compareb, A. Saloa, E. Ziob,c
Contact Center Security Strategies
The Practical Side of Meaningful Use:
Healthcare Cloud Security Stack for Microsoft Azure
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity ATD technical
Networking for Home and Small Businesses – Chapter 8
Drew Hunt Network Security Analyst Valley Medical Center
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Security week 1 Introductions Class website Syllabus review
Managing IT Risk in a digital Transformation AGE
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Portfolio optimization of security measures for protecting electric power grids from cyber threats M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski Advanced Systems Analysis

Outline Introduction to project Analysis of standard practice Methodology Probabilistic Risk Assessment Portfolio optimization Results

Research project Objective: Selection of the cost-efficient portfolios of security measures that minimize the risk of cyber threats. Case study: electric power grid. Motivations: Extensive reliance on IT systems makes electric power grids vulnerable to cyber threats. Frequent and costly impacts worldwide (a cyber attack caused a power outage in Ukraine in 2015). The cyberattack was complex and consisted of the following steps: - prior compromise of corporate networks using spear-phishing emails with BlackEnergy malware; - seizing SCADA under control, remotely switching substations off; - disabling/destroying IT infrastructure components (uninterruptible power supplies, modems, RTUs, commutators); - destruction of files stored on servers and workstations with the KillDisk malware; - denial-of-service attack on call-center to deny consumers up-to-date information on the blackout. In total, up to 73 MWh of electricity was not supplied (or 0.015% of daily electricity consumption in Ukraine).

Cyber threat scenario

Cyber threats analysis - standard practice Cyber threat scenarios are analyzed one-by-one, possibly resulting in: sub-optimal solutions for the system, due to lack in systemic thinking; difficulties in modeling budget and technical constraints across different scenarios. Cyber threat scenario

Cyber threats analysis - standard practice Likelihood and impact of scenarios are evaluated through scoring system based on a additive model, which raises concerns on how meaningful and comparable the scores are. Impact 15 criteria Likelihood 5 criteria S i ∈[0,9] S j ∈[0,9] Impact= i S i Likelihood= j S j Impact∈[0,135] Likelihood∈[0,45]

Scenario prioritization Risk Matrix Apply security measures to reduce risk of cyber threat scenario Is budget depleted? Yes Done! Composite impact score No Apply security measures to reduce risk of cyber threat scenarios Composite likelihood score

Goals Qualitative assessment Quantitative analysis Standard practice Our framework Qualitative assessment Quantitative analysis Scenario analyzed separately Comprehensive multi scenario analysis [1] Assess the risk of cyber threats, defined as Risk=Occurrence Probability ×Impact [2] Reduce the risk through the optimal portfolio of security measures!

Probabilistic Risk Assessment Risk assessment performed through Bayesian Networks, Nodes  random events of cyber threat scenarios. Arcs  causal dependencies among random events. Bayesian Networks enable probability update on the cascading events of the cyber threat scenarios.

𝐀 𝐁 𝐂 0.9 0.6 0.2 0.1 0.4 0.8 1 S 𝐀 0.4 0.6 𝐀 0.2 0.8 A 𝐈 𝐂 9 C I 𝐀 𝐁 0.8 0.1 0.2 0.9 B ℙ 𝐀 =𝟎.𝟐 ℙ 𝐀 =𝟎.𝟒 ℙ 𝐁 =ℙ 𝐁|𝐀 ∙ℙ 𝐀 +ℙ 𝐁| 𝐀 ∙ℙ 𝐀 =𝟎.𝟖∙𝟎.𝟒+𝟎.𝟏∙𝟎.𝟔=𝟎.𝟑𝟖 ℙ 𝐁 =ℙ 𝐁|𝐀 ∙ℙ 𝐀 +ℙ 𝐁| 𝐀 ∙ℙ 𝐀 =𝟎.𝟖∙𝟎.𝟐+𝟎.𝟏∙𝟎.𝟖=𝟎.𝟐𝟒 ℙ 𝐂 =ℙ 𝐂|𝐀,𝐁 ∙ℙ 𝐀 ∙ℙ 𝐁 +ℙ 𝐂| 𝐀 ,𝑩 ∙ℙ 𝐀 ∙ℙ 𝐁 +ℙ 𝐂|𝐀, 𝑩 ∙ℙ 𝐀 ∙ℙ 𝑩 +ℙ 𝐂| 𝑨 , 𝑩 ∙ℙ 𝑨 ∙ℙ 𝑩 =𝟎.𝟏𝟖𝟒 ℙ 𝐂 =ℙ 𝐂|𝐀,𝐁 ∙ℙ 𝐀 ∙ℙ 𝐁 +ℙ 𝐂| 𝐀 ,𝑩 ∙ℙ 𝐀 ∙ℙ 𝐁 +ℙ 𝐂|𝐀, 𝑩 ∙ℙ 𝐀 ∙ℙ 𝑩 +ℙ 𝐂| 𝑨 , 𝑩 ∙ℙ 𝑨 ∙ℙ 𝑩 =𝟎.𝟑𝟒𝟖 E 𝐈 =ℙ 𝐂 ∙𝑰 𝐂 +ℙ 𝐂 ∙𝑰 𝐂 =𝟎.𝟑𝟒𝟖∙𝟗+𝟎.𝟔𝟓𝟐∙𝟎=𝟑.𝟏𝟑𝟐 R 𝐈 =ℙ 𝐂 ∙𝑰 𝐂 +ℙ 𝐂 ∙𝑰 𝐂 =𝟎.𝟏𝟖𝟒∙𝟗+𝟎.𝟖𝟏𝟔∙𝟎=𝟏.𝟔𝟓𝟔

Integration of cyber threat scenarios Analysis of possible synergies of security measures that may affect multiple cyber threat scenarios

Cyber threat scenarios for Advanced Metering Infrastructure with 22 possible security measures.

Portfolio of security measures Index Security measure 1 Train personnel on possible paths for infection 2 Maintain patches and anti-virus 3 Test for malware before connection 4 Implement configuration management 5 Verify all firewall changes 6 Require intrusion detection and prevention 7 Require authentication to access firewall 8 Conduct penetration testing periodically 9 Train personnel on social engineering attacks 10 Strong passwords 11 Encrypt communication paths Index Security measure 12 Protect against replay 13 Strong security questions 14 Require multi-factor authentication 15 Use a token with PIN 16 Limit individuals with privilege 17 Isolate network 18 Enforce restrictive firewall rules 19 Require authentication to access network 20 Remove unsecure development features 21 Include credentials in equipment design 22 Configure for least functionality Portfolio ≡ combination of security measures Each portfolio is represented by a binary vector 𝒛 such that 𝒛 𝑎 =1↔security measure 𝑎 is included in the portfolio

Pareto optimal portfolios Portfolios are Pareto optimal if no other feasible portfolio further reduces the risks of cyber threats for any impact criterion 𝑘 without increasing the risk for other, such that 𝒛 ∗ ≻𝒛↔ 𝑅[ 𝐼 𝑘 ]( 𝒛 ∗ )≤𝑅[ 𝐼 𝑘 ](𝒛) for all 𝑘 𝑅 𝐼 𝑘 𝒛 ∗ <𝑅[ 𝐼 𝑘 ](𝒛) for any 𝑘 Economic risk Dominance relations ≻ ⊁ Pareto optimal solutions ⊁ Safety risk

Constraints The selection of Pareto optimal portfolios accounts for budget and technical constraints: 𝑎 𝒛 𝑎 ∙ 𝒄 𝑎 ≤𝐵 𝑠 ℙ[𝑋=𝑠|𝒛]≤𝜀 𝒛 𝑎 ′ + 𝒛 𝑎 ′′ ≤1 𝒛 𝑎 ′ − 𝒛 𝑎 ′′ =0 Budget Risk acceptability Mutually exclusive Mutually inclusive

Risk profile B U D G E T R I S K

Cost-efficient portfolios Pareto optimal portfolios are not necessarily cost-efficient! Pareto optimal portfolios for budget 200: Cost 1 200 Pareto optimal portfolios for budget 300: Cost 1 280 290

Optimal resource allocation

Summary Systemic analysis of multiple cyber threat scenarios leads to an optimal resource allocation. The optimization model integrates budget and technical constraints that limit the set of feasible portfolios. Novel practice for assessing the risks of cyber threats and for supporting risk-based decisions on resource allocation to cyber-physical systems.

Possible extensions Possible extensions need to be investigated, such as: Consider imprecise information on occurrence probability. Determine cyber resilience of the system. Model the objectives of the threat agent(s) through Adversarial Risk Analysis. Cyber resilience refers to an entity's ability to continuously deliver the intended outcome despite adverse cyber events (source: Wikipedia).

Adversarial risk analysis Adversarial risk analysis provides one-sided decision support to a decision maker who faces risks in which probabilities and outcomes depend on the decisions of other self-interested actors. Defense-Attack problem in cybersecurity