Visible to the public Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation

TitleEvaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Publication TypeConference Paper
Year of Publication2017
AuthorsNasr, E., Shahrour, I.
Conference Name2017 Sensors Networks Smart and Emerging Technologies (SENSET)
Date Publishedsep
ISBN Number978-1-5090-6011-5
Keywordscompositionality, computer network security, CVE, Human Behavior, human factors, Markov chain, Markov Chain model, Markov processes, network administrators, network attacks, power system security, probability, probability density, pubcrawl, resilience, Resiliency, security levels, security of data, Smart grid, smart grid comprehensive analysis, Smart Grid Sensors, smart power grids, telecommunication security, transitions probabilities, Vulnerability, Wi-Fi network, Wireless, wireless LAN, wireless network vulnerabilities
Abstract

Quantifying vulnerability and security levels for smart grid diversified link of networks have been a challenging task for a long period of time. Security experts and network administrators used to act based on their proficiencies and practices to mitigate network attacks rather than objective metrics and models. This paper uses the Markov Chain Model [1] to evaluate quantitatively the vulnerabilities associated to the 802.11 Wi-Fi network in a smart grid. Administrator can now assess the level of severity of potential attacks based on determining the probability density of the successive states and thus, providing the corresponding security measures. This model is based on the observed vulnerabilities provided by the Common Vulnerabilities and Exposures (CVE) database explored by MITRE [2] to calculate the Markov processes (states) transitions probabilities and thus, deducing the vulnerability level of the entire attack paths in an attack graph. Cumulative probabilities referring to high vulnerability level in a specific attack path will lead the system administrator to apply appropriate security measures a priori to potential attacks occurrence.

URLhttps://ieeexplore.ieee.org/document/8125032
DOI10.1109/SENSET.2017.8125032
Citation Keynasr_evaluating_2017