Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector

被引:4
|
作者
Nikolaou, Nikolaos [1 ]
Papadakis, Andreas [1 ,2 ]
Psychogyios, Konstantinos [1 ]
Zahariadis, Theodore [1 ,3 ]
机构
[1] Synelixis Solut SA, Chalkida GR-34100, Greece
[2] Sch Pedag & Technol Educ, Dept Elect & Elect Engn Educators, Athens GR-15122, Greece
[3] Natl & Kapodistrian Univ Athens, Gen Dept, Athens GR-15772, Greece
基金
欧盟地平线“2020”;
关键词
vulnerability identification; vulnerability assessment; CVSS assessment; critical infrastructure; STIX format; CTI; correlation analysis;
D O I
10.3390/electronics12143185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability identification and assessment is a key process in risk management. While enumerations of vulnerabilities are available, it is challenging to identify vulnerability sets focused on the profiles and roles of specific organizations. To this end, we have employed systematized knowledge and relevant standards (including National Electric Sector Cybersecurity Organization Resource (NESCOR), ISO/IEC 27005:2018 and National Vulnerability Database (NVD)) to identify a set of 250 vulnerabilities for operators of energy-related critical infrastructures. We have elaborated a "double-mapping" scheme to associate (arbitrarily) categorized assets, with the pool of identified Physical, Cyber and Human/Organizational vulnerabilities. We have designed and implemented an extensible vulnerability identification and assessment framework, allowing historized assessments, based on the CVSS (Common Vulnerability Scoring System) scoring mechanism. This framework has been extended to allow modelling of the vulnerabilities and assessments using the Structured Threat Information eXpression (STIX) JSON format, as Cyber Threat Intelligence (CTI) information, to facilitate information sharing between Electrical Power and Energy Systems (EPES) and to promote collaboration and interoperability scenarios. Vulnerability assessments from the initial analysis of the project in the context of Research and Technology Development (RTD) projects have been statistically processed, offering insights in terms of the assessment's importance and distribution. The assessments have also been transformed into a dynamic dataset processed to identify and quantify correlation and start the discussion on the interpretation of the way assessments are performed.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Quantitative vulnerability assessment for critical infrastructures
    Gheorghe, AV
    Vamanu, DV
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL I AND II, PROCEEDINGS, 2002, : 1385 - 1390
  • [2] Quantitative Vulnerability Assessment of Critical Infrastructures: watching for hidden faults
    Gheorghe, Adrian V.
    Vamanu, Dan V.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2008, 4 (1-2) : 144 - 152
  • [3] Heterogeneous Distributed Computing Environment for Vulnerability Analysis of Energy Critical Infrastructures
    Edelev, Alexei V.
    Sidorov, Ivan A.
    Feoktistov, Alexander G.
    PROCEEDINGS OF THE VTH INTERNATIONAL WORKSHOP CRITICAL INFRASTRUCTURES: CONTINGENCY MANAGEMENT, INTELLIGENT, AGENT-BASED, CLOUD COMPUTING AND CYBER SECURITY (IWCI 2018), 2018, 158 : 37 - 42
  • [4] Vulnerability of the Emirati Energy Sector for Disaster: A Critical Review
    Al Kaili, Khalifa
    Pathirage, Chaminda
    Amaratunga, Dilanthi
    4TH INTERNATIONAL CONFERENCE ON BUILDING RESILIENCE, INCORPORATING THE 3RD ANNUAL CONFERENCE OF THE ANDROID DISASTER RESILIENCE NETWORK, 2014, 18 : 701 - 709
  • [5] Vulnerability Assessment of Structures and Infrastructures
    Tsompanakis, Yiannis
    STRUCTURE AND INFRASTRUCTURE ENGINEERING, 2010, 6 (1-2) : 1 - 1
  • [6] Critical Infrastructures Vulnerability and Risk Analysis
    Enrico Zio
    European Journal for Security Research, 2016, 1 (2) : 97 - 114
  • [7] On the vulnerability of critical infrastructures: 'seeing it coming'
    Gheorghe, Adrian V.
    Vamanu, Dan V.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2005, 1 (2-3) : 216 - 246
  • [8] Setting the stage:: The vulnerability of critical infrastructures
    Thedeen, Torbjorn
    Protection of Civilian Infrastructure from Acts of Terrorism, 2006, : 33 - 40
  • [9] Editorial: Risk and vulnerability of critical infrastructures
    Goossens, LHJ
    JOURNAL OF RISK RESEARCH, 2004, 7 (06) : 567 - 568
  • [10] System vulnerability assessment and critical nodes identification
    Chen, Xin
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 65 : 212 - 220