Adaptive and Proactive Security Assessment on Energy Delivery Systems

Carlos Rubio-Medrano,Josephine Lamp,Vu Coughlin,Ziming Zhao,Anna Scaglione
2017-01-01
Abstract:Description of research activity: Our approach is described as follows: first, we provide support for the creation of dedicated repositories depicting security requirements, which are to be modeled leveraging ontological representations, in such a way that an unambiguous and comprehensive description of requirements, as well as common vulnerabilities and exposures (CVEs) (Mitre 2016), is synthesized cohesively. Using ontologies, the relationships between different security concepts can be better modeled, thus allowing for the exploration and discovery of similar and complimentary requirements obtained from different sources. We have identified already a starting collection of documents which we plan to enhance over time as a result of our interactions with both industry and academic partners, in such a way that our requirements repository is effectively constructed from source materials that are deemed as relevant by the EDS and cybersecurity communities.
What problem does this paper attempt to address?