Abstract
AbstractPower systems are one of the critical infrastructures that has seen an increase in cyber security threats due to digitalization. The digitalization also affects the size and complexity of the infrastructure and therefore makes it more difficult to gain an overview in order to secure the entire power system from attackers. One method of how to gain an overview of possible vulnerabilities and security threats is to use threat modeling. In threat modeling, information regarding the vulnerabilities and possible attacks of power systems is required to create an accurate and useful model. There are several different sources for this information. In this paper we conduct a systematic literature review to find which information sources that have been used in power system threat modeling research. Six different information sources were found: expert knowledge, logs & alerts, previous research, system’s state, vulnerability scoring & databases, and vulnerability scanners.
Publisher
Springer International Publishing
Reference53 articles.
1. Anwar, Z., Shankesi, R., Campbell, R.H.: Automatic security assessment of critical cyber-infrastructures. In: 2008 IEEE International Conference on Dependable Systems & Networks With FTCS and DCC (DSN). IEEE Computer Society, Los Alamitos, June 2008
2. Lecture Notes in Computer Science;K Beckers,2014
3. Byres, E.J., Franz, M., Miller, D.: The use of attack trees in assessing vulnerabilities in SCADA systems. In: IEEE Conference on International Infrastructure Survivability Workshop (IISW 2004). Institute for Electrical and Electronics Engineers (2004)
4. Chang, Y.H., Jirutitijaroen, P., Ten, C.: A simulation model of cyber threats for energy metering devices in a secondary distribution network. In: 2010 5th International Conference on Critical Infrastructure (CRIS), pp. 1–7, September 2010
5. Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741–749 (2011)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献