A propagation model with defensive measures for PLC-PC worms in industrial networks

被引:20
作者
Yao, Yu [1 ]
Sheng, Chuan [1 ]
Fu, Qiang [1 ]
Liu, Hanxin [1 ]
Wang, Dajin [2 ]
机构
[1] Northeastern Univ, Coll Comp Sci & Engn, Shenyang 110169, Liaoning, Peoples R China
[2] Montclair State Coll, Dept Comp Sci, Montclair, NJ 07043 USA
关键词
Industrial security; ICS network; PLC-PC worms; Propagation model; Defensive measures; EPIDEMIC MODEL; TRANSMISSION; SPREAD; SENSOR;
D O I
10.1016/j.apm.2019.01.014
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Programmable logic controllers (PLCs) are important components of industrial control systems (ICSs), which are digital electronic devices with microprocessors and lack network security considerations. With the explosion of cyber-attacks on the ICS network, the concept of the worm known as PLC-PC worm that can spread between the Internet and ICS network has attracted a great deal of attention. In this paper, for the first time, we propose a propagation model to explore the spreadbehavior of PLC-PC worms across the PLC-PC coupled network. Theoretical analysis of the model shows the disease-free and endemic equilibriums of the network with defensive measures. And the stability of the model is examined by an epidemic threshold value. Several numerical and simulation experiments are presented to illustrate the analysis. Based on the results, some ideas for restraining the spread of PLC-PC worms or reducing the security threats of the ICS network are suggested. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:696 / 713
页数:18
相关论文
共 44 条
[1]  
Abe S, 2017, 2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), P717, DOI 10.23919/SICE.2017.8105603
[2]   Statistical mechanics of complex networks [J].
Albert, R ;
Barabási, AL .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :47-97
[3]  
[Anonymous], 2011, W32.Stuxnet Dossier
[4]   The Cousins of Stuxnet: Duqu, Flame, and Gauss [J].
Bencsath, Boldizsar ;
Pek, Gabor ;
Buttyan, Levente ;
Felegyhazi, Mark .
FUTURE INTERNET, 2012, 4 (04) :971-1003
[5]  
Boguñá M, 2003, LECT NOTES PHYS, V625, P127
[6]   Information survival threshold in sensor and P2P networks [J].
Chakrabarti, Deepayan ;
Leskovec, Jure ;
Faloutsos, Christos ;
Madden, Samuel ;
Guestrin, Carlos ;
Faloutsos, Michalis .
INFOCOM 2007, VOLS 1-5, 2007, :1316-1324
[7]   Worm propagation model in mobile network [J].
Chen, Zhide ;
Wang, Meng ;
Xu, Li ;
Wu, Wei .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04) :1134-1144
[8]  
CSSP DHS, 2009, REC PRACT IMPR IND C
[9]  
DIEKMANN O, 1990, J MATH BIOL, V28, P365
[10]  
Formby D., 2017, Out of control: Ransomware for industrial systems