Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network

The Industrial Control System (ICS) is widely used in industrial processes, such as power grids, water conservancy, natural gas, petrochemical and so on. More and more cyber attacks are targeting the ICS worldwide. This paper presents a novel honeynet-based epidemic model in ICS network. The honeyne...

Full description

Bibliographic Details
Main Authors: Qiang Fu, Yu Yao, Chuan Sheng, Wei Yang
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9076604/
_version_ 1818624198608683008
author Qiang Fu
Yu Yao
Chuan Sheng
Wei Yang
author_facet Qiang Fu
Yu Yao
Chuan Sheng
Wei Yang
author_sort Qiang Fu
collection DOAJ
description The Industrial Control System (ICS) is widely used in industrial processes, such as power grids, water conservancy, natural gas, petrochemical and so on. More and more cyber attacks are targeting the ICS worldwide. This paper presents a novel honeynet-based epidemic model in ICS network. The honeynet is an active approach that can attract malware attacks and provide sample information and immunization strategy of the malware. An epidemic model with immunization and quarantine in ICS network is formulated to explore the dynamics of the malware propagation, and the honeynet potency is analyzed as well. Theoretical analysis reveals the disease-free and endemic equilibrium of our model, then the local and global stability of the disease-free (endemic) equilibrium are examined by the basic reproduction number. Furthermore, numerical experiments show that the honeypot with more system vulnerabilities is conducive to suppress the malware epidemic, and the honeynet with lower average degree power low index can be more effectively. In addition, simulation experiments provide the actual behavior of malware propagation in the ICS network and verification of our derivations.
first_indexed 2024-12-16T18:53:09Z
format Article
id doaj.art-7b61cfa9a03d402bbd1cd9c8c745b222
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-16T18:53:09Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-7b61cfa9a03d402bbd1cd9c8c745b2222022-12-21T22:20:36ZengIEEEIEEE Access2169-35362020-01-018815828159310.1109/ACCESS.2020.29896129076604Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System NetworkQiang Fu0https://orcid.org/0000-0002-5490-2419Yu Yao1https://orcid.org/0000-0001-5458-541XChuan Sheng2Wei Yang3College of Computer Science and Engineering, Northeastern University, Shenyang, ChinaCollege of Computer Science and Engineering, Northeastern University, Shenyang, ChinaCollege of Computer Science and Engineering, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaThe Industrial Control System (ICS) is widely used in industrial processes, such as power grids, water conservancy, natural gas, petrochemical and so on. More and more cyber attacks are targeting the ICS worldwide. This paper presents a novel honeynet-based epidemic model in ICS network. The honeynet is an active approach that can attract malware attacks and provide sample information and immunization strategy of the malware. An epidemic model with immunization and quarantine in ICS network is formulated to explore the dynamics of the malware propagation, and the honeynet potency is analyzed as well. Theoretical analysis reveals the disease-free and endemic equilibrium of our model, then the local and global stability of the disease-free (endemic) equilibrium are examined by the basic reproduction number. Furthermore, numerical experiments show that the honeypot with more system vulnerabilities is conducive to suppress the malware epidemic, and the honeynet with lower average degree power low index can be more effectively. In addition, simulation experiments provide the actual behavior of malware propagation in the ICS network and verification of our derivations.https://ieeexplore.ieee.org/document/9076604/ICS networkhoneynetmalware propagation modelepidemic dynamicssimulation
spellingShingle Qiang Fu
Yu Yao
Chuan Sheng
Wei Yang
Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
IEEE Access
ICS network
honeynet
malware propagation model
epidemic dynamics
simulation
title Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
title_full Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
title_fullStr Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
title_full_unstemmed Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
title_short Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
title_sort interplay between malware epidemics and honeynet potency in industrial control system network
topic ICS network
honeynet
malware propagation model
epidemic dynamics
simulation
url https://ieeexplore.ieee.org/document/9076604/
work_keys_str_mv AT qiangfu interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork
AT yuyao interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork
AT chuansheng interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork
AT weiyang interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork