=Paper= {{Paper |id=Vol-1830/Paper90 |storemode=property |title=Dynamics of SCADA System Malware: Impacts on Smart Grid Electricity Networks and Countermeasures |pdfUrl=https://ceur-ws.org/Vol-1830/Paper90.pdf |volume=Vol-1830 |authors=Adeyinka A. Falaye,Oluwafemi Osho,Maxwell I. Emehian,Seun Ale }} ==Dynamics of SCADA System Malware: Impacts on Smart Grid Electricity Networks and Countermeasures== https://ceur-ws.org/Vol-1830/Paper90.pdf
                      International Conference on Information and Communication Technology and Its Applications
                                                             (ICTA 2016)
                                                    Federal University of Technology, Minna, Nigeria
                                                                   November 28 – 30, 2016




Dynamics of SCADA System Malware: Impacts on Smart Grid Electricity Networks
                          and Countermeasures


                      Adeyinka A. Falaye1, Oluwafemi Osho2, Maxwell I. Emehian3, and Seun Ale4
                      1
                     Department of Computer Science, Federal University of Technology, Minna, Nigeria
                  2
                   Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
                      3,4
                          Department of Mathematics, Federal University of Technology, Minna, Nigeria
                                      {1falaye.adeyinka, 2femi.osho}@futminna.edu.ng

Abstract—Supervisory Control and Data Acquisition (SCADA)                systems, which control the flow of data and information on
system malware have contributed to the degradation of most               most modern power grids.
critical installations across the globe, especially the power                Control systems such as SCADA systems are structured
grids. This study seeks to investigate the dynamics of spread of         to achieve/maintain set goals by reducing the probability of
malware targeted at SCADA systems on smart-grid                          unwanted behavior, to meet demand of the critical
electricity networks. We develop a mathematical model for                infrastructure the system is controlling, and to obtain
the propagation of SCADA malware. The infectious-free and                maximum production profit. SCADA systems are mostly
endemic equilibrium are obtained, with the former tested and             found in critical national infrastructures such as the electric
found to be locally asymptotically stable. We investigate using          power grid, transportation systems and oil and gas
numerical simulations the effects of antivirus, and the                  distributions. And it is because of their critical nature that
combination of vulnerability scanning and security patches.              these SCADA systems remain at high risk of attack from an
Our results emphasize the importance of the proposed                     instantaneously growing set of attackers, who are highly
countermeasures at reducing or eliminating the risks posed by
                                                                         skilled and motivated. SCADA systems consist of several
the SCADA system malware.
                                                                         components including programming logic controllers
   Keywords – SCADA; Smart Grid; Reproduction Number;                    (PLCs)/remote terminal units, which communicate with the
Local Stability; Programming logic controller                            SCADA servers and perform most of the supervisory and
                                                                         overriding controls, such as controlling continuous flow of
                                                                         signals, and providing enabling conditions for fault
                          I.   INTRODUCTION                              detention.
    According to the 2016 Digital Cyber Crime Unit of                        To effectively run a functional power grid, there is a
Microsoft Corporation, malware attacks cost global economy               strong dependency on SCADA systems. But keeping the
an estimated 3 trillion US Dollars annually [1]. This is higher          systems secure and immune to malware attacks from
than entire GDP estimate of Africa in 2015 [2], [3], and                 external forces, as well as internally generated errors, is very
approximately the external reserve of the People’s Republic              essential in avoiding outages. This is a massive challenge
of China which stood at about 3.17 trillion US Dollars as at             because of the complexity of the SCADA systems and their
September 2016 [4].                                                      operation on real-time, as well as their connectivity to the
    In this modern era, there is an increasing spate of                  internet, all of which makes the systems perform their
dependency on the effectiveness and efficiency of a well-                various duties.
structured electric power system, a major infrastructure in                  Malware attacks have over time evolved from the more
the economic development of a country or society and also a              common internet worm and virus attacks to more precise
backbone to the proper functioning of other critical                     attacks on target systems. While there have been significant
infrastructures, which very much need electric power to                  damages by these internet worms and virus attacks, present
function at full capacity. These include infrastructures such            set of malware are designed to specifically steal information
as telecommunications, internet, water, air traffic control and          which are considered confidential, take control of systems
transportation [5]. Though these infrastructures can operate             for malicious purposes, create pathways (backdoors) through
without main power supply for a short period of time, in the             which other attacks can be launched or cause complete
long run, longer and larger outages in power may put them in             breakdown of targeted infrastructures. A typical example of
jeopardy, and as a result, creating a crippling effect on the            such malware is Stuxnet [6].
economy. These power outages can be as a result of                           Malware attacks on SCADA systems vary from mere
technical or/and operational faults. However, over the years,            invasive forms (e.g. to steal confidential information or to
they have also been caused by targeted malware attacks on                analysis the traffic of power supply by the system) to more
the Supervisory Control and Data Acquisition (SCADA)                     invasive forms (e.g. to take control of the system or to cause


                                                                   139
                                        International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

a disruption in the normal functions of the systems) [7].                   On smart-grid/electric power systems, [19] presented a
Figure 1 depicts a SCADA system malware attack.                         framework that models a category of cyber-physical
    In this paper, we investigate the effectiveness of existing         switching vulnerabilities. Chopade, Bikdash, and Kateeb
control strategies for SCADA system malware, specifically,              [20] proposed a flexible and extensible framework for
the use of antivirus signatures, and also propose a new                 survivability of smart –grid and SCADA systems. They
control strategy, which combines vulnerability scanning and             considered survival under severe emergencies, vulnerabilities
implementation of security patches.                                     and WMD attacks. The work of [21] focused on the
    The ensuing contents of this paper are organized thus:              development of a novel hierarchical method applied to Petri
Section II describes related works. Section III introduces the          nets to model coordinated attacks on smart grid, while that of
proposed model, as well as its variables and parameters. In             [22] entailed the simulation and evaluation of the impacts of
Section IV, the equilibrium points, effective reproduction              data integrity attacks on automatic generation control.
number and the local stability of the infectious-free                       Regarding other SCADA systems, [23], focusing on
equilibrium point are presented. Section V presents the                 stealthy deception attacks, proposed some enhanced
numerical simulations and analysis of obtained results. The             hydrodynamic models which were used for detection of
study is finally concluded in Section VI.                               physical faults and cyber attacks to automated canal systems;
                                                                        while an aspect-oriented model for evaluating the security of
                                                                        automotive cyber-physical systems was proposed by [24].
                    II.   RELATED WORKS                                 They focused on four attacks: man-in-the-middle, fuzz,
                                                                        interruption and replay attacks.
    The need to fully grasp the dynamics of the spread of                   On the other hand, in modeling attacks that affect any
various malwares has over the years necessitated the                    type of SCADA system, [25] and [26] proposed models for
formulation of various models. The use of epidemiology in               intrusion detection. While in the former, the models were
many of the models has been inspired by the near                        Modus/TCP-based, in the latter study, behavioral modeling
similarities which the spread of malware share with                     was applied. Another study, by [27], entails a SCADA
biological virus [8]. Mathematically, epidemiology has                  security framework which includes real-time monitoring,
developed quite rapidly since the mid 20th century [9].                 anomaly detection, impact analysis, and mitigation
    One main procedure used in epidemiology is application              strategies, and the proposal and evaluation of a new
of a compartmental model, where the population is divided               algorithm which considers both password policies and port
into various sectors according to their epidemic status.                auditing for evaluating cybersecurity.
Another important procedure entails the use of a system of                  One of the few studies, however, that considered
differential equations.                                                 malware propagation on SCADA networks is [28]. The
    Many existing models of malware propagation find their              authors modeled Stuxnet attack using Boolean Logic Driven
root in some classical classic epidemiology models including            Markov Processes (BDMP).
[10]–[13], and often consider malware attacks on computer
systems. For instance, [9] developed an SIR model to
                                                                                        III.   FORMULATION OF MODEL
determine the dynamics of malware attacks on computer
networks. Misra, Verma and Sharma [14] also focused on                      A model formulation involves a process whereby the
computer network. Their model considered two states:                    basic assumptions of the model are clearly stated while
infected and susceptible. The effect of anti-malware was                relating these assumptions from the real world to the
equally investigated. Liu, Liu, Liu, Cui, and Huang [15]                mathematical model [12]. The assumptions of the proposed
proposed a new compartmental model. They however                        model include:
investigated the effect of heterogeneous immunization on the                 The entire population is divided into four (4) states
spread of the malware. Piqueira, Vasconcelos, Gabriel and                       i.e. the Vulnerable Class, the Infectious Class, the
Araujo [16], on their part, considered more states.                             Immune Class and the Recovered Class; all based on
Specifically, using simple systems identification techniques,                   their epidemiological status.
they developed a model named SAIC (Susceptible,                              Every new PLC added to the network is considered
Antidotal, Infectious, Contaminated), based on the SIR                          to be vulnerable, while a few of them are considered
model [10]–[12]. In [17], the SIS model was modified to                         to be infected.
include what was termed a re-introduction parameter, which                   The rate at which new PLCs are added to the
represents the re-introduction of an existing computer virus                    network and existing ones which die due to non-
or the introduction of a new virus.                                             infectious reason is assumed to be constant.
    Few studies have considered spread of malware on other                   The active population includes all the PLCs.
systems. One of these is the work of [18]. They combined                     There is a vertical transmission into the infectious
generic epidemiological models with graph theory to model                       class as a result of connectivity to the internet.
and monitor the evolution of malware that target telephony                   It is assumed that there is an external factor i.e. a
networks, specifically, the Private Branch eXchanges (PBX).                     Universal Serial Bus (USB) device that can be
    In modeling attacks on SCADA systems, studies have                          introduced into the smart grid network, as mountable
considered different SCADA systems, and focused on                              devices, to transfer and copy files.
various attacks. While many have modeled other attacks few                   All model parameters are constant.
studies have attempted malware attacks on SCADA                              All interactions within the network occur
networks.                                                                       homogeneously.


                                                                  140
                                        International Conference on Information and Communication Technology and Its Applications (ICTA 2016)




                                          Figure 1. Model of a SCADA system malware attack

    Another basic procedure of modelling is the description                   N(t), which represents the total number of SCADA
of the various notations, as well as the parameters used in the                PLCs/RTUs within each substations over an electric
formulation of the model.                                                      smart grid network at time, t, after connection has
    The various notations are described below:                                 been established.
     V(t), which represents the number of vulnerable
        SCADA PLCs/software-based remote terminal units                   The following are the parameters used in the model:
        (RTUs) within each substations over an electric                    𝛼 is the constant rate at which new PLCs are, on the
        smart grid network at time, t, after connection has                   average, added to the electric smart grid network.
        been established.                                                  𝑝 is the probability of recruiting PLCs from 𝛼
     I(t), which represents the number of infectious                         number of PLCs.
        SCADA PLCs/RTUs within each substations over                       β is the constant rate of interaction of the vulnerable
        an electric smart-grid network at time, t, after                      class with the infectious class.
        connection has been established.                                   𝛾 is the natural death rate or death due to non-
     IMUN(t), which represents the number of immune                          infectious reason.
        SCADA PLCs/RTUs within each substations over                       𝑎1 is the proportion of time of scanning due to
        an electric smart grid network at time, t, after                      implementation of vulnerability scanning of the
        connection has been established.                                      network.
     R(t), which represents the number of recovered                       𝑎2 is the rate of the effectiveness of detection of
        SCADA PLCs/RTUs within each substations over                          vulnerabilities due to vulnerability scanning of the
        an electric smart grid network at time, t, after                      network.
        connection has been established.                                   𝑎3 is the rate of removal of vulnerabilities due to
     USB(t), which represents the number of Universal                        implementation of security patches on the network.
        Serial Bus (USB) devices used by employees on any                  𝜃 is the rate of vertical transmission of infected
        of the substations within an electric smart grid                      PLCs into the network.
        network at time, t, after connection has been                      𝜇 is the rate of recovery due to application of
        established.                                                          antivirus.
                                                                  141
                                           International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

        𝛿 is the death rate due to SCADA malware attack on                          Letting
         the electric smart grid network.
        𝜑 is the rate of natural recruitment of Universal                          𝐼𝑀𝑈𝑁 𝑡 = 𝑀 𝑡 ; 𝑈𝑆𝐵 𝑡 = 𝑈 𝑡 ; 𝑎𝑛𝑑𝑎1 𝑎2 𝑎3 = 𝑎
         Serial Bus (USB) devices into the network.
                                                                                   The system in (1) above as well as the external factor
   A VIMR (Vulnerable Class, Infectious Class, Immune                           becomes
Class and Recovered Class) model, depicted in Figure 2, is
proposed to explain the dynamics of spread of malicious                                  𝑑𝑉(𝑡)
codes. The total size of the population is N, where N = V + I                                  = 𝛼𝑝 − 𝛽𝑉 𝑡 𝐼 𝑡 − 𝛾𝑉 𝑡 − 𝑎𝑉(𝑡)
                                                                                          𝑑𝑡
+ M + R, and varies with time.


                                                                                          𝑑𝐼(𝑡)
                                                                                                = 𝛽𝑉 𝑡 + 𝛼𝜃 − 𝜇 − 𝛿 − 𝛾 𝐼(𝑡)
                                                                                           𝑑𝑡
                                                                                                   𝑑𝑀(𝑡)
                                                                                                         = 𝑎𝑉(𝑡) − 𝛾𝑀 𝑡
                                                                                                    𝑑𝑡



                                                                                                 𝑑𝑅(𝑡)
                                                                                                       = 𝜇𝐼 𝑡 − 𝛾𝑅 𝑡                        (2)
                                                                                                  𝑑𝑡
  Figure 2. The Flow of Malicious Codes into a Smart Grid Network
                                                                                And
    Our main aim is to study the dynamics of SCADA
system malware and based on our assumptions in the smart                                            𝑑𝑈(𝑡)
grid network, the dynamics of the SCADA system malware                                                    = 𝜑−𝜇 𝑈 𝑡
consists of the following system of ordinary differential                                            𝑑𝑡
equations:

       𝑑𝑉(𝑡)
             = 𝛼𝑝 − 𝛽𝑉 𝑡 𝐼 𝑡 − 𝛾𝑉 𝑡 − 𝑎1 𝑎2 𝑎3 𝑉(𝑡)                              IV.    INFECTIOUS-FREE AND ENDEMIC EQUILIBRIUM POINTS
        𝑑𝑡                                                                                 AND EFFECTIVE REPRODUCTION NUMBER
                                                                                    Points whereby the SCADA systems and electric smart
  𝑑𝐼 𝑡                                                                          grid configuration do not change with time or when no force
       = 𝛼𝜃𝐼 𝑡 − 𝛽𝑉 𝑡 𝐼 𝑡 − 𝜇𝐼 𝑡 − 𝛿𝐼 𝑡 − 𝛾𝐼 𝑡                                  is acting on the system, are known as the equilibrium points.
   𝑑𝑡
                                                                                We obtained the equilibrium points and also tested for
                                                                                stability of the equilibrium points.
          𝑑𝐼𝑀𝑈𝑁(𝑡)
                   = 𝑎1 𝑎2 𝑎3 𝑉(𝑡) − 𝛾𝐼𝑀𝑈𝑁 𝑡                                    A. Equilibrium Points
             𝑑𝑡
                                                                                   For equilibrium points, we have that

                𝑑𝑅(𝑡)
                      = 𝜇𝐼 𝑡 − 𝛾𝑅 𝑡                                 (1)                        𝑑𝑉(𝑡) 𝑑𝐼(𝑡) 𝑑𝑀(𝑡) 𝑑𝑅(𝑡)
                 𝑑𝑡                                                                                 =     =     =      =0
                                                                                                𝑑𝑡    𝑑𝑡    𝑑𝑡    𝑑𝑡
   An external factor was also considered but do not
constitute part of the population of the entire system, i.e.                         We obtain Infectious-Free Equilibrium

                                                                                                         𝛼𝑝        𝑎𝛼𝑝
                                                                                                 𝐸0 =       , 0,          ,0 
             𝑑𝑈𝑆𝐵(𝑡)                                                                                    𝛾+𝑎      𝛾(𝛾 + 𝑎)
                     = 𝜑𝑈𝑆𝐵 𝑡 − 𝜇𝑈𝑆𝐵 𝑡
               𝑑𝑡
                                                                                     And the Endemic Equilibrium

   Thus, the total population of SCADA system PLCs is
given as
                                                                                𝐸∗
             𝑑𝑁(𝑡)                                                                 𝜇 + 𝛿 + 𝛾 − 𝛼𝜃 𝑎 + 𝛾 𝛼𝜃 − 𝜇 − 𝛿 − 𝛾 − 𝛽𝛼𝑝
                   = 𝛼 − 𝛾𝑁 − 𝛿 − 𝛼𝜃 𝐼(𝑡)                                       =                ,                           ,
              𝑑𝑡                                                                         𝛽              𝛼𝜃 − 𝜇 − 𝛿 − 𝛾 𝛽
                                                                                𝑎 𝜇 + 𝛿 + 𝛾 − 𝛼𝜃    𝑎 + 𝛾 𝛼𝜃 − 𝜇 − 𝛿 − 𝛾 − 𝛽𝛼𝑝
                                                                                                 ,𝜇                            
                                                                                       𝛽𝛾                𝛾 𝛼𝜃 − 𝜇 − 𝛿 − 𝛾 𝛽
                                                                          142
                                            International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

B. Effective Reproduction Number and Local Stability                                V.      NUMERICAL SIMULATIONS AND ANALYSIS
    A major procedure in modeling the dynamics of malware                        We set out in Table I, variables and hypothetical values
is the effective reproduction number denoted by 𝑅0 and it                    of our model.
also helps in predicting part of the population which will not                   Similarly, population-dependent parameter values usually
be infected.                                                                 have to be inputted based on computer malware
    System (2) has an infectious-free equilibrium whereby                    epidemiology and population data. We set out in Table II
the infective part of the population is zero while the                       parameters and corresponding values.
vulnerable and immune remain positive denoted by

                     𝐸 0 = 𝑉, 𝐼 = 0, 𝑀, 𝑅 = 0                                TABLE I.       HYPOTHETICAL MODEL VARIABLES AND POPULATION-
                                                                                                       DEPENDENT
    Thus, analyzing the local stability of the infectious-free                       S/N    Variables   Hypothetical values    Source
equilibrium give the endemic point whereby there will be a                            1        V               20             Assumed
rise or reduction to zero when a small number of infectious                           2         I               5             Assumed
PLCs are brought into a highly vulnerable population.                                 3        M               10             Assumed
                                                                                      4        R                0             Assumed
    Eliminating R, system (2) reduces to                                              5        B                7             Assumed


           𝑑𝑉(𝑡)
                 = 𝛼𝑝 − 𝛽𝑉 𝑡 𝐼 𝑡 − 𝛾𝑉 𝑡 − 𝑎𝑉(𝑡)
            𝑑𝑡                                                                  TABLE II.     HYPOTHETICAL MODEL POPULATION PARAMETERS
                                                                                     S/N    Parameter   Hypothetical Values     Source
                                                                                      1         a             Varies           Assumed
       𝑑𝐼(𝑡)
             = 𝛽𝑉 𝑡 + 𝛼𝜃 − 𝜇 − 𝛿 − 𝛾 𝐼 𝑡                         (3)                  2                        2              Assumed
        𝑑𝑡                                                                            3                        0.1            Assumed

   We obtain the effective reproduction number 𝑅0 by                                  4                        0.1            Assumed
investigating the local stability of the infectious-free                              5                       Varies          Assumed
equilibrium.                                                                          6                       Varies          Assumed

   Theorem 1: The infectious-free equilibrium is locally
                                                                                      7                        0.2            Assumed
                                                                                      8        𝛾                0.1            Assumed
asymptotically stable whenever 𝑅0 < 1
                                                                                 Figure 3 shows the different rates of recovery due to
   We obtain the Jacobian of system (3) at infectious-free                   application of anti-virus signatures with time i.e.(𝜇 =
equilibrium                                                                  0.1, 0.5, 0.9), we discovered that if the anti-virus is used at
                                                                             the rate of 10% (i.e. on 1 out of 10 systems), the infectious
                 −(𝛾 + 𝑎)           −𝛽𝑉(𝑡)                                   class of PLCs continue to increase instantaneously from the
           𝐽=                                        
                    0        𝛽𝑉 𝑡 + [𝛼𝜃 − 𝜇 − 𝛿 − 𝛾]                         initial population of 5,000 to above 15,000 in the first two
                                                                             days of interaction with the vulnerable class. The instant
   Reducing the matrix to an upper triangular matrix, we                     increase then tends to stabilize a bit, mostly due to the little
have a characteristic equation as                                            effect of the disinfected PLCs. It then rises instantaneously,
                                                                             and after the next 5 days, rises to above 25,000, at 50% (i.e.
𝐽0                                                                           on 2 out of 10 systems) it increases to about 10,000 in the
                                    −𝛽𝛼𝑝
     −𝛾 − 𝑎                                                                  next one and half days due to interaction with the vulnerable
                                     𝛾+𝑎                                     class of PLCs, before it starts decreasing gradually in the
=                                                                 
                − −𝛽𝛼𝑝 − 𝛼𝛾𝜃 − 𝑎𝛼𝜃 + 𝛾𝜇 + 𝑎𝛾 + 𝛿𝛾 + 𝑎𝛿 + 𝛾 2 + 𝑎𝛾            next two to five days to little below 5,000, mostly due to the
       0
                                     𝛾+𝑎                                     positive effect of the anti-virus signatures; though this
                                                                             happens with a possibility of re-infection. But at 90% (i.e. on
                                                                             9 out of every 10), the infectious population of PLCs
    We assume our effective reproduction number to be the                    increase minimally to about 7,000 in the first day due to the
leading Eigen value, thus we assume                                          interaction with the vulnerable class before it gradually
                                                                             decreases mainly due to the very high effect of the antivirus
                      𝑅0                                                     signatures and the infectious population of PLCs will
  − −𝛽𝛼𝑝 − 𝛼𝛾𝜃 − 𝑎𝛼𝜃 + 𝛾𝜇 + 𝑎𝛾 + 𝛿𝛾 + 𝑎𝛿 + 𝛾 2 + 𝑎𝛾                          continually decline till it goes into extinction after 5days.
=                                                                               Figure 4 shows the variation in the rate of natural
                       𝛾+𝑎
                                                                             recruitment of the USB devices into the network. At 10%
                                                                             usage of USB devices for transfer and copying of files, there
                                                                             is an instant increase in the population of infectious PLCs
    Since 𝑅0 < 1, thus we have a local stability, which                      from the initial 5,000 to above 10,000 after just one and half
implies that the malware can be curtailed through appropriate                days due to interaction between the vulnerable class and the
corresponding countermeasure parameters.                                     USB devices plugged into the system, which of course, some

                                                                       143
                                        International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

are infected. But population of the infectious PLCs then
stabilizes mostly due to the implementation of anti-virus
signatures which at this point gradually detects infected USB
devices. After the second day, the population of the
infectious PLCs begins a rapid decline due to the disinfection
of the infected USB devices by the anti-virus signatures until
it the infected power line carries goes into extinction totally
after five days.
     Figure 5 shows the variation in the rate of vulnerability
scanning, detection of vulnerability and implementation of
security patches. At 10% vulnerability scanning, detention of
vulnerability and implementation of security patches, the
infectious population of PLCs increases from the initial
5,000 to above 14,000 in the one and half days due to the
interaction with the vulnerable class, then it stabilizes a bit
and decreases gradually to about 7,000 due to the
implementation of the security patches. At 50% vulnerability            Figure 3. The Different Rate of Recovery due to Application of the Anti-
                                                                                             Virus Signatures with Time
scanning, detention of vulnerability and implementation of
security patches, the population of the infectious PLCs
increases to about 11,000 in one and half days due to the
interaction with the vulnerable class but stabilizes and then
decreases gradually to about 5,000 (the initial population)
mainly due to the detection and implementation of the
security patches. But at 90% vulnerability scanning,
detention of vulnerability and implementation of security
patches, the population of the infectious PLCs increase from
the initial 5,000 to almost 10,000 in the first day mainly due
to the interaction with the vulnerable class, then stabilizes a
bit and gradually declines until it goes into extinction in the
next 5 days, mainly due to the effect of the vulnerability
scanning, detention of vulnerability and implementation of
security patches.
     From Figures 3, 4 & 5, it was discovered that there is
always an instantaneous increase in the infectious class of
the PLCs due to their interaction with the vulnerable class of
the PLCs; and the consequences of this initial increase
include power outages, damages to equipments, as well as
financial losses. These are mainly due to the fact that these             Figure 4. The Variation in the Rate of Natural Recruitment of USB
infectious PLCs can be used by interest groups or syndicates                                  Devices into the System
to carry out their agenda before such infections are detected
and mitigated.

                      VI.   CONCLUSION
    We developed a model for the dynamics of SCADA
system malware on smart-grid electricity networks for a
population consisting of the Vulnerable, Infected, Immune
and Recovered classes of PLCs or Remote Terminal Units.
We also incorporated an external factor, the Universal Serial
Bus (USB), and considered three control parameters:
vulnerability scanning, detection from vulnerability scanning
and the implementation of security patches.
    Our findings highlight the necessity of control strategies,
viz. antivirus, vulnerability scanning, and application of
security patches, at mitigating malware spread on SCADA
systems.
    Future studies could consider other parameters including
human behavior. Many studies have confirmed that many
security breaches are the result of non-technical factors. In
this study, the propagation was considered as a function of              Figure 5. The Variation in the Rate of Removal of Vulnerability due to
time. Propagation as a function of geographical spread and                   Vulnerability Scanning and Implementation of Security Patches
cost should be explored.

                                                                  144
                                               International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

                             REFERENCES                                            [16] J. R. C. Piqueira, A. A. De Vasconcelos, C. E. C. J. Gabriel, and V.
                                                                                        O. Araujo, “Dynamic models for computer viruses,” Comput. Secur.,
[1]  Microsoft, “Digital Crimes Unit Fact Sheet.”                                       vol. 27, pp. 355–359, 2008.
[2]  Knoema, “IMF World Economic Outlook (WEO), October 2015.”                     [17] J. C. Wierman and D. J. Marchette, “Modeling computer virus
     [Online]. Available: https://knoema.com/IMFWEO2015Oct/imf-                         prevalence with a susceptible-infected-susceptible model with
     world-economic-outlook-weo-october-2015. [Accessed: 22-Oct-                        reintroduction,” Comput. Stat. Data Anal., vol. 45, pp. 3–23, 2004.
     2016].
                                                                                   [18] I. Androulidakis, S. Huerta, V. Vlachos, and I. Santos, “Epidemic
[3] Knoema, “World GDP Ranking 2016 | Data and Charts | Forecast.”                      Model for Malware Targeting Telephony Networks,” in IEEE 23rd
     [Online].      Available:    https://knoema.com/nwnfkne/world-gdp-                 International Conference on Telecommunications, 2016, pp. 1–5.
     ranking-2016-data-and-charts-forecast. [Accessed: 22-Oct-2016].
                                                                                   [19] S. Liu, S. Mashayekh, D. Kundur, T. Zourntos, and K. Butler-Purry,
[4] Trading Economics, “China Foreign Exchange Reserves 1980-2016.”                     “A framework for modeling cyber-physical switching attacks in smart
     [Online].                                                  Available:              grid,” IEEE Trans. Emerg. Top. Comput., vol. 1, no. 2, pp. 273–285,
     http://www.tradingeconomics.com/china/foreign-exchange-reserves.                   2013.
     [Accessed: 21-Oct-2016].
                                                                                   [20] P. Chopade, M. Bikdash, and I. Kateeb, “Interdependency Modeling
[5] B. Les Cardwell and A. Shebanow, “The Efficacy and Challenges of                    for Survivability of Smart Grid and SCADA network under severe
     SCADA and Smart Grid Integration,” J. Cyber Secur. Inf. Syst., vol.                emergencies, vulnerability and WMD attacks,” Southeastcon, 2013
     1, no. 3, pp. 2–10, 2013.                                                          Proc. IEEE, no. April, pp. 1–7, 2013.
[6] A. Teixeira, G. Dán, H. Sandberg, and K. H. Johansson, “A cyber                [21] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, “Petri net
     security study of a SCADA energy management system: Stealthy                       modeling of cyber-physical attacks on smart grid,” IEEE Trans.
     deception attacks on the state estimator,” IFAC Proc. Vol., vol. 18,               Smart Grid, vol. 2, no. 4, pp. 741–749, 2011.
     no. PART 1, pp. 11271–11277, 2011.
                                                                                   [22] S. Sridhar and G. Manimaran, “Data integrity attacks and their
[7] O. Gervasi, “Encryption Scheme for Secured Communication of Web                     impacts on SCADA control system,” IEEE PES Gen. Meet. PES
     Based Control Systems,” pp. 609–618, 2010.                                         2010, pp. 1–6, 2010.
[8] M. H. R. Khouzani and S. Sarkar, “Dynamic malware attack in                    [23] S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, “Cyber security
     energy-constrained mobile wireless networks,” in 2010 Information                  of water scada systems-part II: Attack detection using enhanced
     Theory and Applications Workshop, ITA 2010 - Conference                            hydrodynamic models,” IEEE Trans. Control Syst. Technol., vol. 21,
     Proceedings, 2010, pp. 408–418.                                                    no. 5, pp. 1679–1693, 2013.
[9] B. K. Mishra and A. Prajapati, “Dynamic Model on the Transmission              [24] A. Wasicek, P. Derler, and E. a. Lee, “Aspect-oriented Modeling of
     of Malicious Codes in Network,” Int. J. Comput. Netw. Inf. Secur.,                 Attacks in Automotive Cyber-Physical Systems,” in 2014 51st
     vol. 10, pp. 17–23, 2013.                                                          ACM/EDAC/IEEE Design Automation Conference (DAC), 2014, pp.
[10] W. O. Kermack and A. G. McKendrick, “A Contribution to the                         1–6.
     Mathematical Theory of Epidemics,” Proc. R. Soc. London. Ser. A,              [25] N. Goldenberg and A. Wool, “Accurate modeling of Modbus / TCP
     Contain. Pap. a Math. Phys. Character, vol. 115, no. 772, pp. 700–                 for intrusion detection in SCADA systems,” Int. J. Crit. Infrastruct.
     721, 1927.                                                                         Prot., vol. 6, no. 2, pp. 63–75, 2013.
[11] W. O. Kermack and A. G. McKendrick, “Contributions to the                     [26] A. Dolgikh, T. Nykodym, V. Skormin, and Z. Birnbaum, “Using
     mathematical theory of epidemics-III. Further studies of the problem               behavioral modeling and customized normalcy profiles as protection
     of endemicity,” Proc. R. Soc. London. Ser. A, Contain. Pap. a Math.                against targeted cyber-attacks,” in International Conference on
     Phys. Character, vol. 141, no. 843, pp. 94–122, 1933.                              Mathematical Methods, Models, and Architectures for Computer
[12] W. O. Kermack and A. G. McKendrick, “Contribution to the                           Network Security, 2012, pp. 191–202.
     Mathematical Theory of Edipemics. II. The Problem of Endemicity,”             [27] C. W. Ten, G. Manimaran, and C. C. Liu, “Cybersecurity for critical
     Proc. R. Soc. London. Ser. A, Contain. Pap. a Math. Phys. Character,               infrastructures: Attack and defense modeling,” IEEE Trans. Syst.
     vol. 138, no. 834, pp. 55–83, 1932.                                                Man, Cybern. Part ASystems Humans, vol. 40, no. 4, pp. 853–865,
[13] N. T. J. Bailey, The Mathematical Theory of Infectious Diseases, 2nd               2010.
     ed. New York: Hafner Press, 1975.                                             [28] S. Kriaa, M. Bouissou, and L. Piètre-Cambacédès, “Modeling the
[14] A. K. Misra, M. Verma, and A. Sharma, “Capturing the interplay                     Stuxnet attack with BDMP: Towards more formal risk assessments,”
     between malware and anti-malware in a computer network,” Appl.                     in 7th International Conference on Risks and Security of Internet and
     Math. Comput., vol. 229, pp. 340–349, 2014.                                        Systems, CRiSIS 2012, 2012, pp. 1–8.
[15] W. Liu, C. Liu, X. Liu, S. Cui, and X. Huang, “Modeling the spread
     of malware with the influence of heterogeneous immunization,” Appl.
     Math. Model., vol. 40, pp. 3141–3152, 2016.




                                                                             145