Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs

Modern nuclear power plants (NPPs) use a variety of digital technologies, with new technologies such as wireless sensor networks also under active consideration. Consequently, like other critical infrastructure at increasing risk of cyber-attacks, cyber security for NPPs has become an issue of growi...

Full description

Bibliographic Details
Main Authors: Woogeun Ahn, Manhyun Chung, Byung-Gil Min, Jungtaek Seo
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2015-09-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2015/836258
_version_ 1797727912129986560
author Woogeun Ahn
Manhyun Chung
Byung-Gil Min
Jungtaek Seo
author_facet Woogeun Ahn
Manhyun Chung
Byung-Gil Min
Jungtaek Seo
author_sort Woogeun Ahn
collection DOAJ
description Modern nuclear power plants (NPPs) use a variety of digital technologies, with new technologies such as wireless sensor networks also under active consideration. Consequently, like other critical infrastructure at increasing risk of cyber-attacks, cyber security for NPPs has become an issue of growing concern. The development of cyber-attack scenarios is therefore a crucial part of cyber security plans for NPPs. However, regulatory guidelines for NPPs only mention the necessity for cyber-attack scenarios, their application methods, and simple examples, without outlining any systematic method to actually develop comprehensive cyber-attack scenarios. This paper proposes a method for developing NPP cyber-attack scenarios that reflect the inherent characteristics and architecture of NPPs using scenario graphs, a type of attack model. Further, the process of modeling scenario graphs using the proposed method and a process for developing new attack scenarios by combining several scenario graphs are discussed. In the scenario graphs, large and complicated system structures are conceptually divided, facilitating identification of components of cyber-attacks. Attack scenarios developed using these scenario graphs can be used extensively to develop design basis threats (DBTs), risk assessments, and penetration tests. Thus, they are important for establishing cyber security plans and programs.
first_indexed 2024-03-12T11:06:10Z
format Article
id doaj.art-16473737042744749ca0b5b4b39f1bc6
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T11:06:10Z
publishDate 2015-09-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-16473737042744749ca0b5b4b39f1bc62023-09-02T03:45:50ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772015-09-011110.1155/2015/836258836258Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario GraphsWoogeun AhnManhyun ChungByung-Gil MinJungtaek SeoModern nuclear power plants (NPPs) use a variety of digital technologies, with new technologies such as wireless sensor networks also under active consideration. Consequently, like other critical infrastructure at increasing risk of cyber-attacks, cyber security for NPPs has become an issue of growing concern. The development of cyber-attack scenarios is therefore a crucial part of cyber security plans for NPPs. However, regulatory guidelines for NPPs only mention the necessity for cyber-attack scenarios, their application methods, and simple examples, without outlining any systematic method to actually develop comprehensive cyber-attack scenarios. This paper proposes a method for developing NPP cyber-attack scenarios that reflect the inherent characteristics and architecture of NPPs using scenario graphs, a type of attack model. Further, the process of modeling scenario graphs using the proposed method and a process for developing new attack scenarios by combining several scenario graphs are discussed. In the scenario graphs, large and complicated system structures are conceptually divided, facilitating identification of components of cyber-attacks. Attack scenarios developed using these scenario graphs can be used extensively to develop design basis threats (DBTs), risk assessments, and penetration tests. Thus, they are important for establishing cyber security plans and programs.https://doi.org/10.1155/2015/836258
spellingShingle Woogeun Ahn
Manhyun Chung
Byung-Gil Min
Jungtaek Seo
Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
International Journal of Distributed Sensor Networks
title Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
title_full Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
title_fullStr Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
title_full_unstemmed Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
title_short Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
title_sort development of cyber attack scenarios for nuclear power plants using scenario graphs
url https://doi.org/10.1155/2015/836258
work_keys_str_mv AT woogeunahn developmentofcyberattackscenariosfornuclearpowerplantsusingscenariographs
AT manhyunchung developmentofcyberattackscenariosfornuclearpowerplantsusingscenariographs
AT byunggilmin developmentofcyberattackscenariosfornuclearpowerplantsusingscenariographs
AT jungtaekseo developmentofcyberattackscenariosfornuclearpowerplantsusingscenariographs