Evaluation of Cyberattack Detection Models in Power Grids: Automated Generation of Attack Processes
Abstract
1. Introduction
1.1. Contributions
- A graphical interface enables security experts to reproduce the system configuration;
- Vulnerability information is derived from the MITRE ATT&CK projects;
- Attack processes can be derived automatically;
- A synthetic attacker executes the attacks in an emulated network, producing realistic artifacts of adversarial activity;
- All of this is complemented with a monitoring system and detection models (not the focus of this paper, but briefly presented in an overview in Section 4).
1.2. Structure of the Paper
2. Related Work
3. Background
3.1. MITRE ATT&CK
3.2. SecuriDN
3.2.1. DrawNET
- Elements have attributes, which are called properties that are typed (integer, float, boolean, string, etc.); among them we have graphical properties, such as shape, size, and color.
- Elements must satisfy consistency relations, if any, expressed by constraints.
- Elements can be organized hierarchically, with elements containing sub-elements.
3.2.2. SecuriDN’s Formalism and Model
3.2.3. Solver Level
3.3. Metasploit
4. The Complete Picture
5. From the Network to an Attack Process
5.1. The Security Posture of the Whole Network
5.2. Attack Process Generation
| Algorithm 1 Generation of an attack sequence from the globAG |
|
6. The Attacker
- Implements many MITRE techniques;
- Is easy to automate, i.e., it offers a command line interface or APIs;
- Allows Linux systems as targets;
- Enables real, life-like attacks;
- Is as little invasive as possible, meaning that it does not require installing software on the victim machines;
- Is open source.
6.1. Attack Database
6.2. Managing Sessions
6.3. Configuration
7. An Example
- scanVuln that implements the technique Active Scanning for tactic Reconnaissance from the Enterprise ATT&CK Matrix.
- reverseShellInjection that implements the technique Exploitation of Remote Services for tactic Lateral Movement from the ICS ATT&CK matrix.
- shell is an external technique. Recall the function of external techniques explained in Section 5.1: it will be merged with a technique of the same name on the locAG of a different asset, if reachable.
- shell implements the technique Command Line Interface for the tactic Execution of the ICS ATT&CK matrix. The precondition for this attack is that the attackers have user access on the target host. They obtain a shell on the host. When building the globAG, this technique will be merged with the external shell from the locAG of Figure 10a.
- addSSHkey implements the technique Account manipulation for the tactic Persistence of the Enterprise ATT&CK Matrix: An attacker, having obtained a shell as user U on a host that runs SSH, will install an SSH public key for persistence.
- remoteShell implements the technique Remote Access Software for the tactic Command and Control of the Enterprise ATT&CK Matrix: A remote SSH shell is opened on the victim.
- The external technique bruteForce.
| Listing 1. Fragment of an attack sequence, where “…” replaces the omitted part. |
| { |
| "attack_sequence":[ |
| { |
| "attack_name":"compromise", |
| "IP":"1.1.1.2", |
| "additional_attribute":"Attacker" |
| }, |
| { |
| "attack_name":"scanVuln", |
| "IP":"2.2.2.2", |
| "additional_attribute":"None" |
| }, |
| { |
| "attack_name":"reverseShellInjection", |
| "IP":"2.2.2.2", |
| "PORT":"443", |
| "additional_attribute":"None" |
| }, |
| { |
| "attack_name":"shell", |
| "IP":"2.2.2.2", |
| "additional_attribute":"None" |
| }, |
| { |
| "attack_name":"addSSHkey", |
| "IP":"2.2.2.2", |
| "PORT":"443", |
| "additional_attribute":"None" |
| }, |
| { |
| "attack_name":"bruteForce", |
| "IP":"3.3.3.3", |
| "PORT":"443", |
| "additional_attribute":"None" |
| }, |
| { |
| "attack_name":"escapeHost", |
| "IP":"3.3.3.3", |
| "additional_attribute":"None" |
| }, |
| … |
| { |
| "attack_name":"DERfailure", |
| "IP":"4.4.4.4", |
| "additional_attribute":"Target" |
| } |
| ]} |
| Listing 2. Entry for reverseShellInjection in the attack database. |
| "reverseShellInjection": { |
| "instructions": "back \n resource /data/attacker/custom_attacks/sql_injection/reverse_shell_injection.rc", |
| "attack_type": "ResourceAttack", |
| "wait_time": "80", |
| "config": "../stack/data/attacker/custom_attacks/sql_injection/config_rc.json", |
| "templates": [ |
| { |
| "template": "templates/reverse_shell_injection/config_rc.json", |
| "output_path": "../stack/data/attacker/custom_attacks/sql_injection/config_rc.json", |
| "fixed_params": { |
| "workspace": ".", |
| "targeturi": "/employees_search-1.0-SNAPSHOT/search" |
| }, |
| "ports": { |
| "lport": "reverse_shell_lport", |
| "netcatport": "reverse_shell_netcat" |
| }, |
| "attacker_ip": "{{lhost}}" |
| } |
| ] |
| } |
8. Discussion
8.1. Whitelists
8.2. Completeness of Vulnerability Information
8.3. Complexity
9. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| API | Application Programming Interface |
| AutoTTP | Automated Tactics Techniques and Procedures |
| ATT&CK | Adversarial Tactics, Techniques, and Common Knowledge |
| CAR | Cyber Analytics Repository |
| DBN | Dynamic Bayesian Network |
| DER | Distributed Energy Resource |
| DMZ | Demilitarized Zone |
| DNlib | DrawNET Library |
| globAG | Global Attack Graph |
| HTTPS | Hypertext Transfer Protocol Secure |
| ICS | Industrial Control System |
| IED | Intelligent Electronic Device |
| IP | Internet Protocol |
| IT | Information Technology |
| JSON | JavaScript Object Notation |
| LARIAT | Lincoln Adaptable Real-Time Information Assurance Testbed |
| LLSIM | Lincoln Laboratory Simulator |
| locAG | Local Attack Graph |
| MITRE | Massachusetts Institute of Technology Research and Engineering |
| MMS | Manufacturing Message Specification |
| OS | Operating System |
| OT | Operational Technology |
| SoS | System-of-Systems |
| SQL | Structured query language |
| SSH | Secure Shell |
| TIDeS | Testbed for Evaluating Intrusion Detection Systems |
| TLS | Transport Layer Security |
| WAN | Wide Area Network |
| XML | Extensible Markup Language |
Appendix A. Analysis of the Merge Algorithm
Appendix A.1. Correctness
- A forward edge to a previously visited node: in this case the node currently visited is an ancestor of the head of the edge and thus if the head was marked as relevant, so was the tail;
- A transversal edge to a previously visited node: in this case, if the head of the edge is marked as relevant, also the current node and all of its ancestors must be marked relevant.
Appendix A.2. Costs
Appendix B. Analysis of the Solver That Produces Attack Sequences
- It terminates.
- All nodes are added to the ordered .
- The topological order is respected, except for OR nodes. More precisely, the topological order is respected as follows:
- For each edge such that v is not an OR node, u comes before v in the ;
- If v is an OR node, it appears in after at least one node u such that is an edge of the graph.
- If the graph is represented using an adjacency list and choosing a node from the set has cost , the cost of the algorithm is , where n is the number of nodes in the graph and m the number of edges.
- Each node enters exactly once, either in Line 9 if its indegree is zero, or when the value of for that node becomes zero (Line 23). Since at each iteration of the while loop a node is removed from , the algorithm terminates after one iteration per node.
- Since each node enters the set by Property 1 and it is appended to the in Line 15, this property also holds.
- If node v is not an OR node, its becomes zero only after all of the nodes u such that is an edge of the graph have already been appended to the (Lines 15 and 20); therefore, the first part of this property holds. When v is an OR node, at least one of the nodes u of which v is a neighbor enters the before v, by Lines 15 and 18, and so also the second part of the property holds.
- The initialization loop scans the whole graph, and therefore it has a cost of if the graph is represented with an adjacency list. The main loop executes n times and all in all considers each edge once. The strategy for choosing a node from the set is not specified, and it could have a non-constant cost; but if its cost is constant, the bound holds.
References
- Langner, R. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Secur. Priv. 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Khan, R.; Maynard, P.; Mclaughlin, K.; Laverty, D.; Sezer, S. Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR), Belfast, UK, 23–25 August 2016. [Google Scholar] [CrossRef]
- Salazar, L.; Castro, S.R.; Lozano, J.; Koneru, K.; Zambon, E.; Huang, B.; Baldick, R.; Krotofil, M.; Rojas, A.; Cardenas, A.A. A Tale of Two Industroyers: It was the Season of Darkness. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–23 May 2024; pp. 312–330. [Google Scholar] [CrossRef]
- Stouffer, K.; Pease, M.; Tang, C.; Zimmerman, T.; Pillitteri, V.; Lightman, S.; Hahn, A.; Saravia, S.; Sherule, A.; Thompson, M. Guide to Operational Technology (OT) Security; Technical Report SP 800-82 Rev. 3; NIST: Gaithersburg, MD, USA, 2023. Available online: https://csrc.nist.gov/pubs/sp/800/82/r3/final (accessed on 22 September 2025).
- Cerotti, D.; Codetta Raiteri, D.; Dondossola, G.; Egidi, L.; Franceschinis, G.; Portinale, L.; Savarro, D.; Terruggia, R. SecuriDN: A Modeling Tool Supporting the Early Detection of Cyberattacks to Smart Energy Systems. Energies 2024, 17, 3882. [Google Scholar] [CrossRef]
- Cerotti, D.; Codetta Raiteri, D.; Dondossola, G.; Egidi, L.; Franceschinis, G.; Portinale, L.; Terruggia, R. A Modular Infrastructure for the Validation of Cyberattack Detection Systems. In Power Systems Cybersecurity: Methods, Concepts, and Best Practices; Haes Alhelou, H., Hatziargyriou, N., Dong, Z.Y., Eds.; Springer International Publishing: Cham, Switzerland, 2023; pp. 311–336. [Google Scholar] [CrossRef]
- Ukwandu, E.; Farah, M.A.B.; Hindy, H.; Brosset, D.; Kavallieros, D.; Atkinson, R.; Tachtatzis, C.; Bures, M.; Andonovic, I.; Bellekens, X. A review of cyber-ranges and test-beds: Current and future trends. Sensors 2020, 20, 7148. [Google Scholar] [CrossRef] [PubMed]
- Gunathilaka, P.; Mashima, D.; Chen, B. Softgrid: A software-based smart grid testbed for evaluating substation cybersecurity solutions. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, Vienna, Austria, 28 October 2016; pp. 113–124. [Google Scholar]
- Tsai, P.W.; Yang, C.S. Testbed@ TWISC: A network security experiment platform. Int. J. Commun. Syst. 2018, 31, e3446. [Google Scholar] [CrossRef]
- Conti, M.; Donadel, D.; Turrin, F. A survey on industrial control system testbeds and datasets for security research. IEEE Commun. Surv. Tutor. 2021, 23, 2248–2294. [Google Scholar] [CrossRef]
- Blazek, P.; Fujdiak, R.; Mlynek, P.; Misurec, J. Development of cyber-physical security testbed based on IEC 61850 architecture. Elektron. Elektrotechnika 2019, 25, 82–87. [Google Scholar] [CrossRef]
- Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S. CrossTest: A cross-domain physical testbed environment for cybersecurity performance evaluations. In Proceedings of the 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), Stuttgart, Germany, 6–9 September 2022; pp. 1–8. [Google Scholar]
- Lee, S.; Lee, S.; Yoo, H.; Kwon, S.; Shon, T. Design and implementation of cybersecurity testbed for industrial IoT systems. J. Supercomput. 2018, 74, 4506–4520. [Google Scholar] [CrossRef]
- Jarmakiewicz, J.; Maślanka, K.; Parobczak, K. Development of cyber security testbed for critical infrastructure. In Proceedings of the International Conference on Military Communications and Information Systems, Cracow, Poland, 18–19 May 2015; pp. 1–10. [Google Scholar]
- Wu, M.; Song, J.; Lucas Lin, L.W.; Aurelle, N.; Liu, Y.; Ding, B.; Song, Z.; Moon, Y.B. Establishment of intrusion detection testbed for CyberManufacturing systems. Procedia Manuf. 2018, 26, 1053–1064. [Google Scholar] [CrossRef]
- Chan, E.Y.; Chan, H.; Chan, K.; Chan, P.; Chanson, S.T.; Cheung, M.; Chong, C.; Chow, K.; Hui, A.K.; Hui, L.C.K.; et al. Intrusion detection routers: Design, implementation and evaluation using an experimental testbed. IEEE J. Sel. Areas Commun. 2006, 24, 1889–1900. [Google Scholar] [CrossRef]
- Vigna, G.; Robertson, W.; Balzarotti, D. Testing network-based intrusion detection signatures using mutant exploits. In Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 25–29 October 2004; pp. 21–30. [Google Scholar]
- Rossey, L.M.; Cunningham, R.K.; Fried, D.J.; Rabek, J.C.; Lippmann, R.P.; Haines, J.W.; Zissman, M.A. LARIAT: Lincoln adaptable real-time information assurance testbed. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 9–16 March 2002; Volume 6. [Google Scholar]
- Singaraju, G.; Teo, L.; Zheng, Y. A testbed for quantitative assessment of intrusion detection systems using fuzzy logic. In Proceedings of the 2nd IEEE International Information Assurance Workshop, Charlotte, NC, USA, 8–9 April 2004; pp. 79–93. [Google Scholar]
- Haines, J.W.; Goulet, S.A.; Durst, R.S.; Champion, T.G. LLsim: Network simulation for correlation and response testing. In Proceedings of the Systems, Man and Cybernetics Society, Information Assurance Workshop, West Point, NY, USA, 18–20 June 2003; pp. 243–250. [Google Scholar]
- Zilberman, P.; Puzis, R.; Bruskin, S.; Shwarz, S.; Elovici, Y. Sok: A survey of open-source threat emulators. arXiv 2020, arXiv:2003.01518. [Google Scholar]
- Cheong, J. AutoTTP: Automated Tactics Techniques & Procedures 2019. Available online: https://github.com/jymcheong/AutoTTP (accessed on 22 September 2025).
- BC-Security. Empire: Post-Exploitation Framework. Available online: https://github.com/BC-SECURITY/Empire (accessed on 22 September 2025).
- Bader, L.; Serror, M.; Lamberts, O.; Sen, O.; van der Velde, D.; Hacker, I.; Filter, J.; Padilla, E.; Henze, M. Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. In Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), Delft, The Netherlands, 3–7 July 2023; pp. 1065–1081. [Google Scholar] [CrossRef]
- Peuster, M.; Karl, H.; van Rossem, S. MeDICINE: Rapid prototyping of production-ready network services in multi-PoP environments. In Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Palo Alto, CA, USA, 7–10 November 2016; pp. 148–153. [Google Scholar] [CrossRef]
- Thurner, L.; Scheidler, A.; Schäfer, F.; Menke, J.H.; Dollichon, J.; Meier, F.; Meinecke, S.; Braun, M. Pandapower—An Open-Source Python Tool for Convenient Modeling, Analysis, and Optimization of Electric Power Systems. IEEE Trans. Power Syst. 2018, 33, 6510–6521. [Google Scholar] [CrossRef]
- IEC 60870-5-104; Telecontrol Equipment and Systems—Part 5-104: Transmission Protocols—Network Access for IEC 60870-5-101 Using Standard Transport Profiles. International Electrotechnical Commission: Geneva, Switzerland, 2006.
- The MITRE Corporation. Adversarial Tactics, Techniques and Common Knowledge (ATT&CK). 2015. Available online: https://attack.mitre.org/ (accessed on 22 September 2025).
- The MITRE Corporation. ATT&CK for Enterprise. 2015. Available online: https://attack.mitre.org/matrices/enterprise/ (accessed on 22 September 2025).
- The MITRE Corporation. ATT&CK for Industrial Control Systems. 2020. Available online: https://attack.mitre.org/matrices/ics/ (accessed on 22 September 2025).
- Codetta Raiteri, D.; Franceschinis, G.; Gribaudo, M. Defining formalisms and models in the Draw-Net Modelling System. In Proceedings of the International Workshop on Modelling of Objects, Components and Agents, Turku, Finland, 26 June 2006; pp. 123–144. [Google Scholar]
- Marco, G.; Mazzocca, N.; Francesco, M.; Vittorini, V. Multisolution of complex performability models in the OsMoSys/DrawNET framework. In Proceedings of the Second International Conference on the Quantitative Evaluation of Systems (QEST’05), Torino, Italy, 19–22 September 2005; pp. 85–94. [Google Scholar] [CrossRef]
- Calvarese, F.; Di Marco, A.; Malavolta, I. Towards a graphical representation for the Æmilia Architecture Description Language. In Proceedings of the 2nd Quantitative Information Workshop (infQ), Lipari, Italy, 27–29 June 2011. [Google Scholar]
- Gilmore, S.; Gribaudo, M. Graphical modelling of process algebras with DrawNET. In Proceedings of the Tools presentation at the Multiconference on Measurement, Modelling and Evaluation of Computer-Communication Systems, Urbana, IL, USA, 2–5 September 2003. [Google Scholar]
- The MITRE Corporation. Cyber Analytics Repository (CAR). Available online: https://car.mitre.org/ (accessed on 22 September 2025).
- Eaton, J.W. Octave. Available online: https://www.gnu.org/software/octave/ (accessed on 22 September 2025).
- Rapid7. Metasploit Framework. Available online: https://www.metasploit.com (accessed on 22 September 2025).
- Docker, Inc. Docker Stack CLI Reference. Available online: https://docs.docker.com/reference/cli/docker/stack/ (accessed on 22 September 2025).
- Docker, Inc. Docker Swarm. Available online: https://docs.docker.com/engine/swarm/ (accessed on 22 September 2025).
- Cerotti, D.; Codetta Raiteri, D.; Egidi, L.; Franceschinis, G.; Portinale, L.; Dondossola, G.; Terruggia, R. Analysis and Detection of Cyber Attack Processes targeting Smart Grids. In Proceedings of the IEEE-PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Bucharest, Romania, 29 September–2 October 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Cerotti, D.; Codetta Raiteri, D.; Dondossola, G.; Egidi, L.; Franceschinis, G.; Portinale, L.; Terruggia, R. A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems. In Proceedings of the 3rd Italian Conference on Cyber Security, Pisa, Italy, 13–15 February 2019; Degano, P., Zunino, R., Eds.; Volume 2315. CEUR Workshop Proceedings. [Google Scholar]
- Sabur, A.; Chowdhary, A.; Huang, D.; Alshamrani, A. Toward scalable graph-based security analysis for cloud networks. Comput. Netw. 2022, 206, 108795. [Google Scholar] [CrossRef]
- Kahn, A.B. Topological sorting of large networks. Commun. ACM 1962, 5, 558–562. [Google Scholar] [CrossRef]
- Miller, M. Metasploit’s Meterpreter. Last Modified 26 December 2004. Available online: https://www.hick.org/code/skape/papers/meterpreter.pdf (accessed on 22 September 2025).
- Rapid7. Meterpreter — Metasploit Documentation. Available online: https://docs.metasploit.com/docs/using-metasploit/advanced/meterpreter/meterpreter.html (accessed on 22 September 2025).
- Junior, G.T.; Clara Araujo Gomes Da Silva, A.; Dos Santos, R.P.; Kassab, M.; Graciano Neto, V.V. Are SoIS the Majority of SoS? An Exploratory Investigation of Subtypes of Systems-of-Systems in the Literature. In Proceedings of the 2025 IEEE/ACM 13th International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS), Ottawa, ON, Canada, 3 May 2025; pp. 9–16. [Google Scholar] [CrossRef]
- Linnosmaa, J.; Alanen, J.; Karadeniz, S.; Tiusanen, R.; Berger, J.; Malm, T.; Viitanen, K. System of Systems Modelling for Safety and Cyber Security Assessments; Number VTT-R-00555-24 in VTT Research Report; VTT Technical Research Centre of Finland: Espoo, Finland, 2024. [Google Scholar]
- Fontes, R.R.; Afzal, S.; Brito, S.H.B.; Santos, M.A.S.; Rothenberg, C.E. Mininet-WiFi: Emulating software-defined wireless networks. In Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM), Barcelona, Spain, 13–15 November 2015; pp. 384–389. [Google Scholar] [CrossRef]
- Guo, R.; Chen, Q.; Tong, S.; Liu, H. Knowledge-Aided Generative Adversarial Network: A Transfer Gradient-Less Adversarial Attack for Deep Learning-Based Soft Sensors. In Proceedings of the 2024 14th Asian Control Conference (ASCC), Dalian, China, 5–8 July 2024; pp. 1254–1259. [Google Scholar]











| Icon | Meaning | Icon | Meaning |
|---|---|---|---|
![]() | network | ![]() | firewall |
![]() | host | ![]() | application |
![]() | IED | ![]() | virtual environment |
![]() | compromised asset | ![]() | communication channel |
![]() | analysis target |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cerotti, D.; Codetta Raiteri, D.; Dondossola, G.; Egidi, L.; Franceschinis, G.; Portinale, L.; Savarro, D.; Terruggia, R. Evaluation of Cyberattack Detection Models in Power Grids: Automated Generation of Attack Processes. Appl. Sci. 2025, 15, 10677. https://doi.org/10.3390/app151910677
Cerotti D, Codetta Raiteri D, Dondossola G, Egidi L, Franceschinis G, Portinale L, Savarro D, Terruggia R. Evaluation of Cyberattack Detection Models in Power Grids: Automated Generation of Attack Processes. Applied Sciences. 2025; 15(19):10677. https://doi.org/10.3390/app151910677
Chicago/Turabian StyleCerotti, Davide, Daniele Codetta Raiteri, Giovanna Dondossola, Lavinia Egidi, Giuliana Franceschinis, Luigi Portinale, Davide Savarro, and Roberta Terruggia. 2025. "Evaluation of Cyberattack Detection Models in Power Grids: Automated Generation of Attack Processes" Applied Sciences 15, no. 19: 10677. https://doi.org/10.3390/app151910677
APA StyleCerotti, D., Codetta Raiteri, D., Dondossola, G., Egidi, L., Franceschinis, G., Portinale, L., Savarro, D., & Terruggia, R. (2025). Evaluation of Cyberattack Detection Models in Power Grids: Automated Generation of Attack Processes. Applied Sciences, 15(19), 10677. https://doi.org/10.3390/app151910677










