tion (such as threats, vulnerabilities, observations,
etc.) obtained by analyzing locally detected anoma-
lies, can instead be manually reported by O-SOC op-
erators. N-SOCs are deployed by European Member
States joining the ECOSSIAN network, they are re-
sponsible for gaining cyber situational awareness on
the network on national CIs. Here cyber intelligence
is acquired by analyzing information gathered from
different data sources such as reporting O-SOCs, fed-
erated N-SOCs, publicly available sources, etc. Cyber
incident information aggregation, correlation, clus-
tering and analysis are the main functionalities pro-
vided at this level. Once the evaluation of the analy-
sis results is concluded, mitigation steps, advisories,
or early warnings are sent back to the reporting O-
SOCs. At the highest level an E-SOC performs anal-
ysis of strategic information shared by the different
N-SOCs and distributes advisories to targeted lower
level SOCs.
3 ILLUSTRATIVE SCENARIO
In this section we describe a fictional but realistic sce-
nario of advanced cyber attacks in today’s setting. It
further demonstrates the need for SOCs and coopera-
tion.
WonderLight is the main energy provider in Coun-
tryX, one of the European Member States. The corpo-
rate is structured in five different departments located
in three different sites on the national territory. Three
power plants of different size produce electricity dis-
tributed to more than 40% of the population.
Each chief of department receives a well-crafted
email, apparently sent by the CEO asking the recipi-
ent to click on a link to get access to the last quarterly
financial report. Two recipients (Dr. A and Dr. B)
click on the link and are directed to an empty web
page. Dr. A and Dr. B. close the web browser ig-
noring the effects of their clicks and keep carrying
out their activities. Mrs. C, who received the mes-
sage as well, suspects about the trustworthiness of the
email, but being uncertain of what to do, she deletes
the email from the mail client without clicking on the
link. The remaining two victims (Mrs. D and Dr.
E) are more familiar with cyber-security issues and
since they are aware that the financial report would
not be ready before three weeks, they immediately re-
alize the email they just received is malicious. They
report the security event to the company’s IT depart-
ment in charge, among other tasks, of investigating
cyber-security issues.
The IT department examines the reported issue,
but due to lack of resources (personnel, time, tools)
for a deep inspection, and noticing that the web page
is not reachable anymore when clicking on the re-
ceived link, they simply alert all the company em-
ployees about the occurred phishing attempts and in-
struct them not to click on any link received in similar
emails.
Moreover, Dr. A and Dr. B, by clicking on
the link, inadvertently downloaded through their web
browser a sophisticated malware undetectable by the
antivirus solutions installed on their machines. The
malware exploits a Windows vulnerability, executes
a daemon performing port scanning and communi-
cating with the command and control server through
an encrypted connection. The malicious software de-
tects a list of open ports and hence allows the at-
tackers to gain remote privileged access to the in-
fected computers. The attackers remotely connect
to these machines and thanks to their privileges are
able to browse through the corporate network, explore
privacy-sensitive documents, and get access to the In-
dustrial Control Systems (ICSs) managing the energy
production at the power plants.
The attackers are skilled and motivated activists
aiming at boycotting and damaging WonderLight’s
and other European energy providers’ reputation be-
cause of their questionable environmental policy. Af-
ter three weeks of undetected intrusion, the attackers
have gained a good knowledge of WonderLight’s in-
frastructure. They start maneuvering numerous Pro-
grammable Logic Controllers (PLCs) employed in the
ICSs at the main power plant, and gradually decrease
the energy production until shutting down entire por-
tions of the electrical network. This causes hours of
blackouts in several regions of the country until the
business continuity plan of WonderLight is activated,
the intrusion is detected and the normal energy pro-
duction is restored. Such an event implies a consider-
able loss of revenue and reputation for WonderLight.
If similar APTs target at the same time every other
energy provider in the country, the effects of such dis-
tributed attack can be dramatic (Reichl et al., 2013).
Although modern European States rely on CIs
employing state-of-the art intrusion detection sys-
tems (IDs) and off-the-shelf industrial control sys-
tems, they are not able to prevent the described attack
scenario because they lack of dedicated organization
and especially national cyber SOCs, the CIs do not
cooperate with one another, and they rarely examine
cyber threat intelligence generated by third parties.
Starting from the presented scenario we derive
in the following section the main functional require-
ments for the analysis system, deployed at the N-SOC
in the ECOSSIAN ecosystem, to tackle the outlined
security challenges.
A Collaborative Analysis System for Cross-organization Cyber Incident Handling
107