Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
The Industrial Control System (ICS) is widely used in industrial processes, such as power grids, water conservancy, natural gas, petrochemical and so on. More and more cyber attacks are targeting the ICS worldwide. This paper presents a novel honeynet-based epidemic model in ICS network. The honeyne...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9076604/ |
_version_ | 1818624198608683008 |
---|---|
author | Qiang Fu Yu Yao Chuan Sheng Wei Yang |
author_facet | Qiang Fu Yu Yao Chuan Sheng Wei Yang |
author_sort | Qiang Fu |
collection | DOAJ |
description | The Industrial Control System (ICS) is widely used in industrial processes, such as power grids, water conservancy, natural gas, petrochemical and so on. More and more cyber attacks are targeting the ICS worldwide. This paper presents a novel honeynet-based epidemic model in ICS network. The honeynet is an active approach that can attract malware attacks and provide sample information and immunization strategy of the malware. An epidemic model with immunization and quarantine in ICS network is formulated to explore the dynamics of the malware propagation, and the honeynet potency is analyzed as well. Theoretical analysis reveals the disease-free and endemic equilibrium of our model, then the local and global stability of the disease-free (endemic) equilibrium are examined by the basic reproduction number. Furthermore, numerical experiments show that the honeypot with more system vulnerabilities is conducive to suppress the malware epidemic, and the honeynet with lower average degree power low index can be more effectively. In addition, simulation experiments provide the actual behavior of malware propagation in the ICS network and verification of our derivations. |
first_indexed | 2024-12-16T18:53:09Z |
format | Article |
id | doaj.art-7b61cfa9a03d402bbd1cd9c8c745b222 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-16T18:53:09Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-7b61cfa9a03d402bbd1cd9c8c745b2222022-12-21T22:20:36ZengIEEEIEEE Access2169-35362020-01-018815828159310.1109/ACCESS.2020.29896129076604Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System NetworkQiang Fu0https://orcid.org/0000-0002-5490-2419Yu Yao1https://orcid.org/0000-0001-5458-541XChuan Sheng2Wei Yang3College of Computer Science and Engineering, Northeastern University, Shenyang, ChinaCollege of Computer Science and Engineering, Northeastern University, Shenyang, ChinaCollege of Computer Science and Engineering, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaThe Industrial Control System (ICS) is widely used in industrial processes, such as power grids, water conservancy, natural gas, petrochemical and so on. More and more cyber attacks are targeting the ICS worldwide. This paper presents a novel honeynet-based epidemic model in ICS network. The honeynet is an active approach that can attract malware attacks and provide sample information and immunization strategy of the malware. An epidemic model with immunization and quarantine in ICS network is formulated to explore the dynamics of the malware propagation, and the honeynet potency is analyzed as well. Theoretical analysis reveals the disease-free and endemic equilibrium of our model, then the local and global stability of the disease-free (endemic) equilibrium are examined by the basic reproduction number. Furthermore, numerical experiments show that the honeypot with more system vulnerabilities is conducive to suppress the malware epidemic, and the honeynet with lower average degree power low index can be more effectively. In addition, simulation experiments provide the actual behavior of malware propagation in the ICS network and verification of our derivations.https://ieeexplore.ieee.org/document/9076604/ICS networkhoneynetmalware propagation modelepidemic dynamicssimulation |
spellingShingle | Qiang Fu Yu Yao Chuan Sheng Wei Yang Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network IEEE Access ICS network honeynet malware propagation model epidemic dynamics simulation |
title | Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network |
title_full | Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network |
title_fullStr | Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network |
title_full_unstemmed | Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network |
title_short | Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network |
title_sort | interplay between malware epidemics and honeynet potency in industrial control system network |
topic | ICS network honeynet malware propagation model epidemic dynamics simulation |
url | https://ieeexplore.ieee.org/document/9076604/ |
work_keys_str_mv | AT qiangfu interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork AT yuyao interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork AT chuansheng interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork AT weiyang interplaybetweenmalwareepidemicsandhoneynetpotencyinindustrialcontrolsystemnetwork |