sesa 21(28): e5

Research Article

Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems

Download569 downloads
  • @ARTICLE{10.4108/eai.10-9-2021.170949,
        author={Kamrul Hasan and Sachin Shetty and Md. Sharif Ullah and Amin Hassanzadeh and Tariqul Islam},
        title={Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={8},
        number={28},
        publisher={EAI},
        journal_a={SESA},
        year={2021},
        month={9},
        keywords={Cyber defense, Criticality, Energy Delivery Systems, Attack graph, Cost models},
        doi={10.4108/eai.10-9-2021.170949}
    }
    
  • Kamrul Hasan
    Sachin Shetty
    Md. Sharif Ullah
    Amin Hassanzadeh
    Tariqul Islam
    Year: 2021
    Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems
    SESA
    EAI
    DOI: 10.4108/eai.10-9-2021.170949
Kamrul Hasan1, Sachin Shetty2, Md. Sharif Ullah2, Amin Hassanzadeh3, Tariqul Islam4,*
  • 1: Tennessee State University, Nashville, TN, USA
  • 2: Old Dominion University, Norfolk, VA, USA
  • 3: Accenture Labs, Cyber Fusion Center, Accenture
  • 4: Syracuse University, Syracuse, NY, USA
*Contact email: mtislam@syr.edu

Abstract

A prioritized cyber defense remediation plan is critical for effective risk management in Energy Delivery System (EDS). Due to the complexity of EDS in terms of heterogeneous nature blending Information Technology (IT) and Operation Technology (OT) and Industrial Control System (ICS), scale and critical processes tasks, prioritized remediations should be applied gradually to protect critical assets. In this work, we propose a methodology for a prioritized cyber risk remediation plan by detecting and evaluating paths to critical nodes in EDS. We propose critical nodes characteristics evaluation based on nodes’ architectural positions, a measure of centrality based on nodes’ connectivity and frequency of network traffic, as well as the controlled amount of physical loads. The paper also examines the relationship between cost models of budget allocation for the removal of vulnerabilities on critical nodes and its impact on gradual readiness.