Research Article

A Minimum Defense Cost Calculation Method for Attack Defense Trees

Table 4

The meaning of each node in the attack defense tree of Figure 8.

Node labelMeaning

UGThe circuit breaker trips without a fault, resulting in a power outage.
M1A trip command is sent through the front-end processor.
M2The status evaluation module is affected, and the operator sends a trip command error.
M3The human–machine interface (HMI) substation is accessed, and a trip command is sent to the relay.
M4The remote terminal unit (RTU) is accessed; the relays for RTU monitoring are controlled or the relays are reconfigured.
M5Direct access to the relay protector is obtained.
M6False data are injected.
A1The hardware firewall is bypassed for port scanning.
A2The control center application server is accessed.
A3Measurement and status packets are intercepted.
A4An eavesdropping device is installed.
A5The encrypted message is decoded.
A6Port scanning is implemented.
A7The substation user interface is accessed.
A8A connection via dial-up is established.
A9The password is decoded.
A10Port scanning is conducted.
A11The password is decoded.
D1Idle and potentially threatening ports are disabled, and the firewall is used to mask scanned packets.
D2Server data are backed up and server security measures are enhanced.
D3Measurements are conducted and packet encryption measures are implemented.
D4An antieavesdropping cable, an encryption algorithm, or an antieavesdropping device is implemented.
D5A better encryption algorithm is adopted.
D6Idle and potentially threatening ports are disabled, and the firewall masks scanned packets.
D7The router is enhanced to prevent IP scanning.
D8Strong modem encryption is adopted.
D9A new encryption algorithm is applied, including RTU mandatory authentication.
D10The protection of relay authorized access is realized.
D11Strong passwords are selected for the network.
D12Advanced permissions are included for trip commands.
D13Data digital signature protocols are established.
D14Scanning is conducted to fix any vulnerabilities in the HMI.
D15The RTU firmware is updated and a security gateway is deployed.
D16The relay protector firmware is updated on time.