Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Construction of a cyber attack model for nuclear power plants - 115

Conference ·
OSTI ID:23035258
;  [1];  [2]
  1. Brookhaven National Laboratory Building 817, Upton, NY 11973 (United States)
  2. Idaho National Laboratory PO Box 1625, Idaho Falls, ID 83415 (United States)
The consideration of how a compromised digital component can impact neighboring components is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional probabilistic risk assessment (PRA). This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to different classes of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analyzing large systems. (authors)
Research Organization:
American Nuclear Society - ANS, 555 North Kensington Avenue, La Grange Park, IL 60526 (United States)
OSTI ID:
23035258
Country of Publication:
United States
Language:
English