<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Dynamics of SCADA System Malware: Impacts on Smart Grid Electricity Networks and Countermeasures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Adeyinka A. Falaye</string-name>
          <email>1falaye.adeyinka@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oluwafemi Osho</string-name>
          <email>2femi.osho@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maxwell I. Emehian</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Seun Ale</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Cyber Security Science, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>139</fpage>
      <lpage>145</lpage>
      <abstract>
        <p>-Supervisory Control and Data Acquisition (SCADA) system malware have contributed to the degradation of most critical installations across the globe, especially the power grids. This study seeks to investigate the dynamics of spread of malware targeted at SCADA systems on smart-grid electricity networks. We develop a mathematical model for the propagation of SCADA malware. The infectious-free and endemic equilibrium are obtained, with the former tested and found to be locally asymptotically stable. We investigate using numerical simulations the effects of antivirus, and the combination of vulnerability scanning and security patches. Our results emphasize the importance of the proposed countermeasures at reducing or eliminating the risks posed by the SCADA system malware.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Keywords – SCADA; Smart Grid; Reproduction Number;
Local Stability; Programming logic controller</p>
      <p>I.</p>
      <p>INTRODUCTION</p>
      <p>
        According to the 2016 Digital Cyber Crime Unit of
Microsoft Corporation, malware attacks cost global economy
an estimated 3 trillion US Dollars annually [
        <xref ref-type="bibr" rid="ref5">1</xref>
        ]. This is higher
than entire GDP estimate of Africa in 2015 [2], [3], and
approximately the external reserve of the People’s Republic
of China which stood at about 3.17 trillion US Dollars as at
September 2016 [4].
      </p>
      <p>In this modern era, there is an increasing spate of
dependency on the effectiveness and efficiency of a
wellstructured electric power system, a major infrastructure in
the economic development of a country or society and also a
backbone to the proper functioning of other critical
infrastructures, which very much need electric power to
function at full capacity. These include infrastructures such
as telecommunications, internet, water, air traffic control and
transportation [5]. Though these infrastructures can operate
without main power supply for a short period of time, in the
long run, longer and larger outages in power may put them in
jeopardy, and as a result, creating a crippling effect on the
economy. These power outages can be as a result of
technical or/and operational faults. However, over the years,
they have also been caused by targeted malware attacks on
the Supervisory Control and Data Acquisition (SCADA)
systems, which control the flow of data and information on
most modern power grids.</p>
      <p>Control systems such as SCADA systems are structured
to achieve/maintain set goals by reducing the probability of
unwanted behavior, to meet demand of the critical
infrastructure the system is controlling, and to obtain
maximum production profit. SCADA systems are mostly
found in critical national infrastructures such as the electric
power grid, transportation systems and oil and gas
distributions. And it is because of their critical nature that
these SCADA systems remain at high risk of attack from an
instantaneously growing set of attackers, who are highly
skilled and motivated. SCADA systems consist of several
components including programming logic controllers
(PLCs)/remote terminal units, which communicate with the
SCADA servers and perform most of the supervisory and
overriding controls, such as controlling continuous flow of
signals, and providing enabling conditions for fault
detention.</p>
      <p>To effectively run a functional power grid, there is a
strong dependency on SCADA systems. But keeping the
systems secure and immune to malware attacks from
external forces, as well as internally generated errors, is very
essential in avoiding outages. This is a massive challenge
because of the complexity of the SCADA systems and their
operation on real-time, as well as their connectivity to the
internet, all of which makes the systems perform their
various duties.</p>
      <p>Malware attacks have over time evolved from the more
common internet worm and virus attacks to more precise
attacks on target systems. While there have been significant
damages by these internet worms and virus attacks, present
set of malware are designed to specifically steal information
which are considered confidential, take control of systems
for malicious purposes, create pathways (backdoors) through
which other attacks can be launched or cause complete
breakdown of targeted infrastructures. A typical example of
such malware is Stuxnet [6].</p>
      <p>Malware attacks on SCADA systems vary from mere
invasive forms (e.g. to steal confidential information or to
analysis the traffic of power supply by the system) to more
invasive forms (e.g. to take control of the system or to cause
a disruption in the normal functions of the systems) [7].
Figure 1 depicts a SCADA system malware attack.</p>
      <p>In this paper, we investigate the effectiveness of existing
control strategies for SCADA system malware, specifically,
the use of antivirus signatures, and also propose a new
control strategy, which combines vulnerability scanning and
implementation of security patches.</p>
      <p>The ensuing contents of this paper are organized thus:
Section II describes related works. Section III introduces the
proposed model, as well as its variables and parameters. In
Section IV, the equilibrium points, effective reproduction
number and the local stability of the infectious-free
equilibrium point are presented. Section V presents the
numerical simulations and analysis of obtained results. The
study is finally concluded in Section VI.</p>
      <p>II.</p>
      <p>RELATED WORKS</p>
      <p>The need to fully grasp the dynamics of the spread of
various malwares has over the years necessitated the
formulation of various models. The use of epidemiology in
many of the models has been inspired by the near
similarities which the spread of malware share with
biological virus [8]. Mathematically, epidemiology has
developed quite rapidly since the mid 20th century [9].</p>
      <p>One main procedure used in epidemiology is application
of a compartmental model, where the population is divided
into various sectors according to their epidemic status.
Another important procedure entails the use of a system of
differential equations.</p>
      <p>
        Many existing models of malware propagation find their
root in some classical classic epidemiology models including
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]–[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], and often consider malware attacks on computer
systems. For instance, [9] developed an SIR model to
determine the dynamics of malware attacks on computer
networks. Misra, Verma and Sharma [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] also focused on
computer network. Their model considered two states:
infected and susceptible. The effect of anti-malware was
equally investigated. Liu, Liu, Liu, Cui, and Huang [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]
proposed a new compartmental model. They however
investigated the effect of heterogeneous immunization on the
spread of the malware. Piqueira, Vasconcelos, Gabriel and
Araujo [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], on their part, considered more states.
Specifically, using simple systems identification techniques,
they developed a model named SAIC (Susceptible,
Antidotal, Infectious, Contaminated), based on the SIR
model [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]–[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], the SIS model was modified to
include what was termed a re-introduction parameter, which
represents the re-introduction of an existing computer virus
or the introduction of a new virus.
      </p>
      <p>
        Few studies have considered spread of malware on other
systems. One of these is the work of [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. They combined
generic epidemiological models with graph theory to model
and monitor the evolution of malware that target telephony
networks, specifically, the Private Branch eXchanges (PBX).
      </p>
      <p>In modeling attacks on SCADA systems, studies have
considered different SCADA systems, and focused on
various attacks. While many have modeled other attacks few
studies have attempted malware attacks on SCADA
networks.</p>
      <p>
        On smart-grid/electric power systems, [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] presented a
framework that models a category of cyber-physical
switching vulnerabilities. Chopade, Bikdash, and Kateeb
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] proposed a flexible and extensible framework for
survivability of smart –grid and SCADA systems. They
considered survival under severe emergencies, vulnerabilities
and WMD attacks. The work of [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] focused on the
development of a novel hierarchical method applied to Petri
nets to model coordinated attacks on smart grid, while that of
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] entailed the simulation and evaluation of the impacts of
data integrity attacks on automatic generation control.
      </p>
      <p>
        Regarding other SCADA systems, [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], focusing on
stealthy deception attacks, proposed some enhanced
hydrodynamic models which were used for detection of
physical faults and cyber attacks to automated canal systems;
while an aspect-oriented model for evaluating the security of
automotive cyber-physical systems was proposed by [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
They focused on four attacks: man-in-the-middle, fuzz,
interruption and replay attacks.
      </p>
      <p>
        On the other hand, in modeling attacks that affect any
type of SCADA system, [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] and [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] proposed models for
intrusion detection. While in the former, the models were
Modus/TCP-based, in the latter study, behavioral modeling
was applied. Another study, by [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], entails a SCADA
security framework which includes real-time monitoring,
anomaly detection, impact analysis, and mitigation
strategies, and the proposal and evaluation of a new
algorithm which considers both password policies and port
auditing for evaluating cybersecurity.
      </p>
      <p>
        One of the few studies, however, that considered
malware propagation on SCADA networks is [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. The
authors modeled Stuxnet attack using Boolean Logic Driven
Markov Processes (BDMP).
      </p>
      <p>III.</p>
      <p>FORMULATION OF MODEL</p>
      <p>
        A model formulation involves a process whereby the
basic assumptions of the model are clearly stated while
relating these assumptions from the real world to the
mathematical model [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The assumptions of the proposed
model include:
 The entire population is divided into four (4) states
i.e. the Vulnerable Class, the Infectious Class, the
Immune Class and the Recovered Class; all based on
their epidemiological status.
 Every new PLC added to the network is considered
to be vulnerable, while a few of them are considered
to be infected.
 The rate at which new PLCs are added to the
network and existing ones which die due to
noninfectious reason is assumed to be constant.
 The active population includes all the PLCs.
 There is a vertical transmission into the infectious
class as a result of connectivity to the internet.
 It is assumed that there is an external factor i.e. a
Universal Serial Bus (USB) device that can be
introduced into the smart grid network, as mountable
devices, to transfer and copy files.
 All model parameters are constant.
 All interactions within the network occur
homogeneously.
      </p>
      <p>Another basic procedure of modelling is the description
of the various notations, as well as the parameters used in the
formulation of the model.</p>
      <p>The various notations are described below:




</p>
      <p>V(t), which represents the number of vulnerable
SCADA PLCs/software-based remote terminal units
(RTUs) within each substations over an electric
smart grid network at time, t, after connection has
been established.</p>
      <p>I(t), which represents the number of infectious
SCADA PLCs/RTUs within each substations over
an electric smart-grid</p>
      <p>network at time, t, after
connection has been established.</p>
      <p>IMUN(t), which represents the number of immune
SCADA PLCs/RTUs within each substations over
an electric smart grid</p>
      <p>network at time, t, after
connection has been established.</p>
      <p>R(t), which represents the number of recovered
SCADA PLCs/RTUs within each substations over
an electric smart grid</p>
      <p>network at time, t, after
connection has been established.</p>
      <p>USB(t), which represents the number of Universal
Serial Bus (USB) devices used by employees on any
of the substations</p>
      <p>within an electric smart grid
at time, t, after connection has been
network
established.
The following are the parameters used in the model:
N(t), which represents the total number of SCADA
PLCs/RTUs within each substations over an electric
smart grid network at time, t, after connection has
been established.
 is the constant rate at which new PLCs are, on the
average, added to the electric smart grid network.
 is the probability of recruiting PLCs from 
number of PLCs.
β is the constant rate of interaction of the vulnerable
class with the infectious class.
 is the natural death rate or death due to
noninfectious reason.
 1 is the proportion of time of scanning due to
implementation of vulnerability scanning of the
network.
network.
 2 is the rate of the effectiveness of detection of
vulnerabilities due to vulnerability scanning of the

antivirus.
 3 is the rate of removal of vulnerabilities due to
implementation of security patches on the network.
 is the rate of vertical transmission of infected</p>
    </sec>
    <sec id="sec-2">
      <title>PLCs into the network. is the rate of recovery due to application of</title>
      <p />
      <p>=   −      −    −  1 2 3 ( )
=     −      −    −    −   
     ( )
 
  ( )</p>
      <p>( )</p>
      <p>( )
 
=  1 2 3 ( ) −      
=    −   
(1)
=      −     
=  −   −  −    ( )</p>
    </sec>
    <sec id="sec-3">
      <title>An external factor</title>
      <p>was also considered but do not
constitute part of the population of the entire system, i.e.</p>
      <p>Thus, the total population of SCADA system PLCs is
given as
  is the death rate due to SCADA malware attack on</p>
    </sec>
    <sec id="sec-4">
      <title>Letting</title>
      <p> 
is the rate of natural recruitment of Universal
     =   ;     =   ;     1 2 3 = 
the electric smart grid network.</p>
      <p>Serial Bus (USB) devices into the network.</p>
      <p>A VIMR (Vulnerable Class, Infectious Class, Immune
Class and Recovered Class) model, depicted in Figure 2, is
proposed to explain the dynamics of spread of malicious
codes. The total size of the population is N, where N = V + I
+ M + R, and varies with time.</p>
      <p>The system in (1) above as well as the external factor
becomes</p>
      <p>=   −      −    −   ( )
 
 
  ( )</p>
      <p>( )</p>
      <p>=    +   −  −  −   ( )</p>
      <p>=   ( ) −   
=    −   
(2)
  ( )</p>
      <p>=  −   
IV. INFECTIOUS-FREE AND ENDEMIC EQUILIBRIUM POINTS</p>
      <p>AND EFFECTIVE REPRODUCTION NUMBER</p>
      <p>Points whereby the SCADA systems and electric smart
grid configuration do not change with time or when no force
is acting on the system, are known as the equilibrium points.</p>
    </sec>
    <sec id="sec-5">
      <title>We obtained the equilibrium points and also tested for stability of the equilibrium points.</title>
      <p>A. Equilibrium Points</p>
    </sec>
    <sec id="sec-6">
      <title>For equilibrium points, we have that</title>
      <p>We obtain Infectious-Free Equilibrium
  ( )   ( )   ( )   ( )
 
=
 
=
=
 
= 0
 0 =</p>
      <p>, 
 +  +  −    +    −  −  −  −   
  +  +  −  
 +    −  −  −  −   
  −  −  −  
   −  −  −  

=
B. Effective Reproduction Number and Local Stability</p>
      <p>A major procedure in modeling the dynamics of malware
is the effective reproduction number denoted by  0and it
also helps in predicting part of the population which will not
be infected.</p>
      <p>System (2) has an infectious-free equilibrium whereby
the infective part of the
population is zero
while the
vulnerable and immune remain positive denoted by
 0 =  ,  = 0,  ,  = 0 </p>
      <p>Thus, analyzing the local stability of the infectious-free
equilibrium give the endemic point whereby there will be a
rise or reduction to zero when a small number of infectious
PLCs are brought into a highly vulnerable population.</p>
      <p>Eliminating R, system (2) reduces to
=   −     
−   
−   ( )
=   
+   −  −  − 
 
(3)</p>
      <p>We obtain the effective reproduction number  0 by
investigating the local stability
of the infectious-free
equilibrium.</p>
    </sec>
    <sec id="sec-7">
      <title>Theorem 1:</title>
      <p>The infectious-free equilibrium is locally
asymptotically stable whenever  0 &lt; 1</p>
      <p>We obtain the Jacobian of system (3) at infectious-free
equilibrium
 =
−( +  )
0</p>
      <p>−  ( )
  
+ [  −  −  −  ]
</p>
      <p>Reducing the matrix to an upper triangular matrix, we
have a characteristic equation as
− −   −    −    +   +   +   +   +  2 +  
−  
− −   −    −    +   +   +   +   +  2 +</p>
      <p>Similarly, population-dependent parameter values usually
have
to
be
inputted
based
on
computer
malware
epidemiology and population data. We set out in Table II
parameters and corresponding values.
Since  0 &lt; 1, thus we have a local stability, which
implies that the malware can be curtailed through appropriate
corresponding countermeasure parameters.


application of anti-virus
signatures
with
time i.e.( =
0.1, 0.5, 0.9), we discovered that if the anti-virus is used at
the rate of 10% (i.e. on 1 out of 10 systems), the infectious
class of PLCs continue to increase instantaneously from the
initial population of 5,000 to above 15,000 in the first two
days of interaction with the vulnerable class. The instant
increase then tends to stabilize a bit, mostly due to the little
effect of the disinfected PLCs. It then rises instantaneously,
and after the next 5 days, rises to above 25,000, at 50% (i.e.
on 2 out of 10 systems) it increases to about 10,000 in the
next one and half days due to interaction with the vulnerable
class of PLCs, before it starts decreasing gradually in the
next two to five days to little below 5,000, mostly due to the
positive effect of the anti-virus signatures; though this
happens with a possibility of re-infection. But at 90% (i.e. on
9 out of every 10), the infectious population of PLCs
increase minimally to about 7,000 in the first day due to the
interaction</p>
      <p>with the vulnerable class before it gradually
decreases mainly due to the very high effect of the antivirus
signatures and the infectious population
of PLCs
will
continually decline till it goes into extinction after 5days.</p>
      <p>Figure 4 shows the variation in the rate of natural
recruitment of the USB devices into the network. At 10%
usage of USB devices for transfer and copying of files, there
is an instant increase in the population of infectious PLCs
from the initial 5,000 to above 10,000 after just one and half
days due to interaction between the vulnerable class and the
USB devices plugged into the system, which of course, some</p>
      <p />
      <p>0
=
=
− − 
0
1
2
3
4
5
1
2
3
4
5
6
7
8</p>
      <p>V
I
M
R
B
a
Varies
2
0.1
0.1
Varies
Varies
0.2
0.1</p>
      <p>Source
Assumed
Assumed
Assumed
Assumed
Assumed</p>
      <p>Source
Assumed
Assumed
Assumed
Assumed
Assumed
Assumed
Assumed
Assumed
are infected. But population of the infectious PLCs then
stabilizes mostly due to the implementation of anti-virus
signatures which at this point gradually detects infected USB
devices. After the second day, the population of the
infectious PLCs begins a rapid decline due to the disinfection
of the infected USB devices by the anti-virus signatures until
it the infected power line carries goes into extinction totally
after five days.</p>
      <p>Figure 5 shows the variation in the rate of vulnerability
scanning, detection of vulnerability and implementation of
security patches. At 10% vulnerability scanning, detention of
vulnerability and implementation of security patches, the
infectious population of PLCs increases from the initial
5,000 to above 14,000 in the one and half days due to the
interaction with the vulnerable class, then it stabilizes a bit
and decreases gradually to about 7,000 due to the
implementation of the security patches. At 50% vulnerability
scanning, detention of vulnerability and implementation of
security patches, the population of the infectious PLCs
increases to about 11,000 in one and half days due to the
interaction with the vulnerable class but stabilizes and then
decreases gradually to about 5,000 (the initial population)
mainly due to the detection and implementation of the
security patches. But at 90% vulnerability scanning,
detention of vulnerability and implementation of security
patches, the population of the infectious PLCs increase from
the initial 5,000 to almost 10,000 in the first day mainly due
to the interaction with the vulnerable class, then stabilizes a
bit and gradually declines until it goes into extinction in the
next 5 days, mainly due to the effect of the vulnerability
scanning, detention of vulnerability and implementation of
security patches.</p>
      <p>From Figures 3, 4 &amp; 5, it was discovered that there is
always an instantaneous increase in the infectious class of
the PLCs due to their interaction with the vulnerable class of
the PLCs; and the consequences of this initial increase
include power outages, damages to equipments, as well as
financial losses. These are mainly due to the fact that these
infectious PLCs can be used by interest groups or syndicates
to carry out their agenda before such infections are detected
and mitigated.</p>
      <p>VI.</p>
      <p>CONCLUSION</p>
      <p>We developed a model for the dynamics of SCADA
system malware on smart-grid electricity networks for a
population consisting of the Vulnerable, Infected, Immune
and Recovered classes of PLCs or Remote Terminal Units.
We also incorporated an external factor, the Universal Serial
Bus (USB), and considered three control parameters:
vulnerability scanning, detection from vulnerability scanning
and the implementation of security patches.</p>
      <p>Our findings highlight the necessity of control strategies,
viz. antivirus, vulnerability scanning, and application of
security patches, at mitigating malware spread on SCADA
systems.</p>
      <p>Future studies could consider other parameters including
human behavior. Many studies have confirmed that many
security breaches are the result of non-technical factors. In
this study, the propagation was considered as a function of
time. Propagation as a function of geographical spread and
cost should be explored.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          , “Digital Crimes Unit Fact Sheet.” Knoema, “IMF World Economic Outlook (WEO),
          <year>October 2015</year>
          .” [Online]. Available: https://knoema.com/IMFWEO2015Oct/imfworld-economic
          <article-title>-outlook-weo-october-</article-title>
          <year>2015</year>
          . [Accessed:
          <fpage>22</fpage>
          -
          <lpage>Oct2016</lpage>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Knoema</surname>
          </string-name>
          , “
          <source>World GDP Ranking</source>
          <year>2016</year>
          |
          <article-title>Data</article-title>
          and Charts | Forecast.” [Online]. Available: https://knoema.com/nwnfkne/world-gdpranking
          <article-title>-2016-data-and-charts-forecast</article-title>
          . [Accessed:
          <fpage>22</fpage>
          -Oct-2016].
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Trading</given-names>
            <surname>Economics</surname>
          </string-name>
          , “
          <source>China Foreign Exchange Reserves</source>
          <year>1980</year>
          -
          <year>2016</year>
          .” [Online]. Available: http://www.tradingeconomics.com/china/foreign-exchange-reserves.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [Accessed:
          <fpage>21</fpage>
          -Oct-2016].
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          1, no.
          <issue>3</issue>
          , pp.
          <fpage>2</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Teixeira</surname>
          </string-name>
          , G. Dán,
          <string-name>
            <given-names>H.</given-names>
            <surname>Sandberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K. H.</given-names>
            <surname>Johansson</surname>
          </string-name>
          , “
          <article-title>A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator,”</article-title>
          <source>IFAC Proc</source>
          . Vol., vol.
          <volume>18</volume>
          , no.
          <source>PART 1</source>
          , pp.
          <fpage>11271</fpage>
          -
          <lpage>11277</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Gervasi</surname>
          </string-name>
          , “
          <article-title>Encryption Scheme for Secured Communication of Web Based Control Systems</article-title>
          ,” pp.
          <fpage>609</fpage>
          -
          <lpage>618</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>M. H. R. Khouzani</surname>
            and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Sarkar</surname>
          </string-name>
          , “
          <article-title>Dynamic malware attack in energy-constrained mobile wireless networks,” in 2010 Information Theory</article-title>
          and Applications Workshop, ITA 2010 - Conference Proceedings,
          <year>2010</year>
          , pp.
          <fpage>408</fpage>
          -
          <lpage>418</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>B. K.</given-names>
            <surname>Mishra</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Prajapati</surname>
          </string-name>
          , “
          <article-title>Dynamic Model on the Transmission of Malicious Codes in Network,”</article-title>
          <string-name>
            <surname>Int. J. Comput. Netw. Inf. Secur.</surname>
          </string-name>
          , vol.
          <volume>10</volume>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>W. O.</given-names>
            <surname>Kermack</surname>
          </string-name>
          and
          <string-name>
            <surname>A. G.</surname>
          </string-name>
          <article-title>McKendrick, “A Contribution to the Mathematical Theory of Epidemics,”</article-title>
          <source>Proc. R. Soc. London. Ser. A, Contain. Pap. a Math. Phys. Character</source>
          , vol.
          <volume>115</volume>
          , no.
          <issue>772</issue>
          , pp.
          <fpage>700</fpage>
          -
          <lpage>721</lpage>
          ,
          <year>1927</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>W. O.</given-names>
            <surname>Kermack</surname>
          </string-name>
          and
          <string-name>
            <surname>A. G. McKendrick,</surname>
          </string-name>
          “
          <article-title>Contributions to the mathematical theory of epidemics-III. Further studies of the problem of endemicity</article-title>
          ,
          <source>” Proc. R. Soc. London. Ser. A, Contain. Pap. a Math. Phys. Character</source>
          , vol.
          <volume>141</volume>
          , no.
          <issue>843</issue>
          , pp.
          <fpage>94</fpage>
          -
          <lpage>122</lpage>
          ,
          <year>1933</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>W. O.</given-names>
            <surname>Kermack</surname>
          </string-name>
          and
          <string-name>
            <surname>A. G. McKendrick,</surname>
          </string-name>
          “
          <article-title>Contribution to the Mathematical Theory of Edipemics. II. The Problem of Endemicity,”</article-title>
          <source>Proc. R. Soc. London. Ser. A, Contain. Pap. a Math. Phys. Character</source>
          , vol.
          <volume>138</volume>
          , no.
          <issue>834</issue>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>83</lpage>
          ,
          <year>1932</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N. T. J.</given-names>
            <surname>Bailey</surname>
          </string-name>
          ,
          <source>The Mathematical Theory of Infectious Diseases</source>
          , 2nd ed. New York: Hafner Press,
          <year>1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>A. K. Misra</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Verma</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , “
          <article-title>Capturing the interplay between malware and anti-malware in a computer network</article-title>
          ,
          <source>” Appl. Math. Comput.</source>
          , vol.
          <volume>229</volume>
          , pp.
          <fpage>340</fpage>
          -
          <lpage>349</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>W.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cui</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          , “
          <article-title>Modeling the spread of malware with the influence of heterogeneous immunization</article-title>
          ,
          <source>” Appl. Math. Model.</source>
          , vol.
          <volume>40</volume>
          , pp.
          <fpage>3141</fpage>
          -
          <lpage>3152</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J. R. C.</given-names>
            <surname>Piqueira</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. A. De Vasconcelos</surname>
            ,
            <given-names>C. E. C. J.</given-names>
          </string-name>
          <string-name>
            <surname>Gabriel</surname>
            , and
            <given-names>V. O.</given-names>
          </string-name>
          <string-name>
            <surname>Araujo</surname>
          </string-name>
          , “
          <article-title>Dynamic models for computer viruses</article-title>
          ,” Comput. Secur., vol.
          <volume>27</volume>
          , pp.
          <fpage>355</fpage>
          -
          <lpage>359</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Wierman</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Marchette</surname>
          </string-name>
          , “
          <article-title>Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction</article-title>
          ,
          <source>” Comput. Stat. Data Anal.</source>
          , vol.
          <volume>45</volume>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>I.</given-names>
            <surname>Androulidakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Huerta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vlachos</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Santos</surname>
          </string-name>
          , “
          <article-title>Epidemic Model for Malware Targeting Telephony Networks,”</article-title>
          <source>in IEEE 23rd International Conference on Telecommunications</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mashayekh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kundur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zourntos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Butler-Purry</surname>
          </string-name>
          ,
          <article-title>“A framework for modeling cyber-physical switching attacks in smart grid</article-title>
          ,
          <source>” IEEE Trans. Emerg. Top. Comput.</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>285</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Chopade</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bikdash</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Kateeb</surname>
          </string-name>
          , “
          <article-title>Interdependency Modeling for Survivability of Smart Grid and SCADA network under severe emergencies, vulnerability</article-title>
          and WMD attacks,” Southeastcon,
          <source>2013 Proc. IEEE</source>
          , no.
          <source>April</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>T. M. Chen</surname>
            ,
            <given-names>J. C.</given-names>
          </string-name>
          <string-name>
            <surname>Sanchez-Aarnoutse</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Buford</surname>
          </string-name>
          , “
          <article-title>Petri net modeling of cyber-physical attacks on smart grid,”</article-title>
          <source>IEEE Trans. Smart Grid</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>741</fpage>
          -
          <lpage>749</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sridhar</surname>
          </string-name>
          and G. Manimaran, “
          <article-title>Data integrity attacks and their impacts on SCADA control system</article-title>
          ,
          <source>” IEEE PES Gen. Meet. PES</source>
          <year>2010</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Amin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Litrico</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Sastry</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Bayen</surname>
          </string-name>
          , “
          <article-title>Cyber security of water scada systems-part II: Attack detection using enhanced hydrodynamic models</article-title>
          ,
          <source>” IEEE Trans. Control Syst. Technol.</source>
          , vol.
          <volume>21</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>1679</fpage>
          -
          <lpage>1693</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Wasicek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Derler</surname>
          </string-name>
          , and E. a. Lee, “
          <article-title>Aspect-oriented Modeling of Attacks in Automotive Cyber-Physical Systems</article-title>
          ,” in
          <year>2014</year>
          51st ACM/EDAC/IEEE Design Automation Conference (DAC),
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>N.</given-names>
            <surname>Goldenberg</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Wool</surname>
          </string-name>
          , “
          <article-title>Accurate modeling of Modbus / TCP for intrusion detection in SCADA systems,”</article-title>
          <string-name>
            <given-names>Int. J.</given-names>
            <surname>Crit</surname>
          </string-name>
          . Infrastruct. Prot., vol.
          <volume>6</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>75</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dolgikh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Nykodym</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Skormin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Birnbaum</surname>
          </string-name>
          , “
          <article-title>Using behavioral modeling and customized normalcy profiles as protection against targeted cyber-attacks,”</article-title>
          <source>in International Conference on Mathematical Methods</source>
          , Models, and Architectures for Computer Network Security,
          <year>2012</year>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>C. W.</given-names>
            <surname>Ten</surname>
          </string-name>
          , G. Manimaran, and C. C. Liu, “
          <article-title>Cybersecurity for critical infrastructures: Attack and defense modeling,”</article-title>
          <source>IEEE Trans. Syst. Man, Cybern. Part ASystems Humans</source>
          , vol.
          <volume>40</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>853</fpage>
          -
          <lpage>865</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kriaa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bouissou</surname>
          </string-name>
          , and L.
          <string-name>
            <surname>Piètre-Cambacédès</surname>
          </string-name>
          ,
          <article-title>“Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments</article-title>
          ,
          <source>” in 7th International Conference on Risks and Security of Internet and Systems</source>
          ,
          <source>CRiSIS</source>
          <year>2012</year>
          ,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>