Next Article in Journal
Analytical Minimization of Interior Permanent Magnet Machine Torque Pulsations by Design of Sculpted Rotor
Previous Article in Journal
Investigations of the Thermal Parameters of Hybrid Sol–Gel Coatings Using Nondestructive Photothermal Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Protection of Energy Network Infrastructures Applying a Dynamic Topology Virtualization

Cybersecurity Department, Peter the Great St. Petersburg Polytechnic University, 195251 St. Petersburg, Russia
*
Author to whom correspondence should be addressed.
Energies 2022, 15(11), 4123; https://doi.org/10.3390/en15114123
Submission received: 31 March 2022 / Revised: 30 May 2022 / Accepted: 1 June 2022 / Published: 3 June 2022

Abstract

:
Rapid progress of computing and info-communication technologies (ICT) has changed the ecosystem of power production and delivery. Today, an energy network is a complex set of interrelated devices and information systems covering all areas of electric power operations and applying ICT based on open standards, such as IEC 60870, IEC 61850, and IEC 61970. According to IEC 62351, the energy networks are faced with high cybersecurity risks caused by open communications, security requirements rarely considered in the energy facilities, partial and difficult upgrades, and incompatibility of secure tools with industrial solutions. This situation results in new security challenges, e.g., denial of service attacks on the connected controllers, dispatching centers, process control systems, and terminals. IEC 62351 describes possible ways to comprehensive security in the energy networks. Most of them used in traditional networks (e.g., firewalls, intrusion detection systems) can be adapted to the energy networks. Honeypot systems as a protection measure help us to mitigate the attacks and maintain necessary security in the networks. Due to the large scale of an energy network and heterogeneity of its components, a new design, deployment, and management strategy for the honeypot systems are required. The paper suggests a new method for organizing a virtual network infrastructure of a hybrid honeypot system and a dynamic management method that adapts the network topology to the attacker’s actions according to the development graph of potential attacks. This technique allows us to dynamically build virtual networks of arbitrary scale. Because of the similarity of the virtual network to the virtualized origin and providing the level of interactivity of its nodes corresponding to real devices, this technique deploys an energy network indistinguishable from the real one for the attackers. A prototype of our honeypot system has been implemented, and experiments on it have demonstrated the more efficient use of the computing resources, the faster reaction to the attacker’s actions, and the deployment of different sizes of virtual networks for the given limits of the computing resources.

1. Introduction

An electric power system is a complex technical infrastructure responsible for the control and monitoring of technological processes, the physical nature of which determines the high speed of their flow. Components of this infrastructure have undergone significant changes over the past decades due to the development of info-communication technologies (ICT). The introduction of new hardware and software has provided new opportunities to automate control, improve the efficiency and reliability of energy networks, and increase the speed of reaction to critical incidents. The traditional power grid has been transformed into a smart grid [1]. In conventional energy networks, cybersecurity has a low priority as control systems were developed like isolated solutions. Modern industrial control systems (ICS) and smart industrial devices such as programmable logic controllers (PLCs), operator control panels (HMIs), intelligent electronic devices (IEDs), and remote-control modules (RTUs) implement open standards IEC 60870, IEC 61850, and IEC 61970. Global integration and interconnectivity with corporate services, coupled with high levels of openness, have increased cybersecurity risks for modern energy networks.
Correct operation of a control system directly depends on the security of the network infrastructure components on which it is built. Security flaws are regularly found in various software, which is potentially vulnerable. According to the 2021 Claroty Team 82 report [2], 637 vulnerabilities were identified in ICS devices from 76 vendors (Figure 1). The authors note that about 80% of them were discovered by third-parties unaffiliated with the manufacturing companies. The number of zero-day vulnerabilities is never known.
Conventional security mechanisms (e.g., firewalls, intrusion detection and prevention systems (IDS/IPS), antivirus solutions) can be adapted to protect the energy network infrastructure. However, these protection tools do not allow tracking APT attacks, during which attackers use various undeclared software features, configuration errors, zero-day vulnerabilities, and other weaknesses of the system components that had not been foreseen during implementation. The solution to this is the introduction of honeypot systems.
A honeypot system provides the following capabilities:
  • collecting information on the attackers’ tactics and techniques to improve security incident response strategy;
  • identifying new attack vectors and exploitation of zero-day vulnerabilities;
  • detecting potential intrusions;
  • presenting a response time required to counteract the attacks and protect the system;
  • hiding the real network infrastructure (network masking).
We suggest a formal description of the network infrastructure and the process of attack. On this basis, a new method for organizing a virtual network infrastructure as a honeypot and a dynamic management method that adapts a network topology to the attacker’s actions according to the development graph of potential attacks are proposed. This technique ensures the efficient use of the computing resources, which allows us to build a virtual network of different sizes. Because of the similarity of the virtual network behavior to the origin and providing the level of interactivity of its nodes corresponding to the co-work of real devices, our method allows us to deploy a network indistinguishable from a real one, from the attacker’s point of view. The prototype of our honeypot system has been implemented, and the provided experiments have shown the more efficient use of the computing resources, the faster response to the attacker’s actions, and deployment of different sizes of virtual networks for the given limits of the computing resources.
The novelty of our contribution is the proposed method of dynamic virtual network topology management based on a potential attack graph. Our method deploys a virtual network infrastructure of arbitrary scale, according to which the virtual network infrastructure changes its configuration in case of limited computing resources in the energy network dynamically adapting to the attacker’s activity.
The rest of the paper is organized as follows: Section 2 observes the related works and presents our method for dynamic virtual topology management on a honeypot system based on a potential attack graph; Section 3 discusses our implementation and experimental results; and, finally, Section 4 concludes our work.

2. Materials and Methods

2.1. The Related Works

The general classification of honeypot systems is presented in [3]. Honeypots can be divided according to the following characteristics:
  • interaction: high interactive or low interactive;
  • configuration: static or dynamic;
  • scalability;
  • resources required to deploy a honeypot system.
Low interactive honeypot systems are utilities that use various mechanisms to mimic the behavior of a real operating system or individual service. Due to its lightweight, a virtual network can be implemented in an arbitrarily scalable way by running multiple instances of the simulator. HoneyD simulator [4] is an example of this type of a honeypot. When interacting with this honeypot, the attacker’s actions are limited—he can only scan and connect to the open ports specified in the configuration file, and execute requests, the responses to which are implemented in scripts. Thus, the disadvantages of these honeypot systems are easy detection and a small amount of information collected about the attacker.
To increase the amount of gathered information about the attacker, the research works [5,6,7,8,9,10,11,12,13] propose honeypot systems with the possibility of self-adaptation, for which methods of game theory, Markov decision-making and machine learning are applied. High interactive honeypot systems are real operating systems or a set of real services for attackers. Highly interactive systems collect a large amount of information about the attacker: the data collection tools, and malware used, operating system or service vulnerabilities exploited, and methods of movement within the network. This type of honeypot requires significant computing resources to provide scalability, for the nodes are virtual machines or real devices. Ref. [14] proposes the solution to the issue of scalability of high interactive honeypots. IoTPOT implements the Telnet protocol and consists of many low interactive components that simulate real service by sending TCP responses and banners provided by the script, and a high interactive component to which commands unknown to simulators are redirected. Guarnizo et al. [15] and Tambe et al. [16] have proposed a method for creating a high interactive honeypot, in which scalability is ensured by using VPN tunnels, allowing the nodes to appear as several virtual nodes with different IP addresses. The disadvantage of this approach is the inability of the network to hold an attacker’s attention. By connecting to virtual nodes, which are implemented by one real node in the network, it is possible to determine that it has already been attacked before.
Molina et al. [17] have proposed a high interactive honeypot system that uses network function virtualization (NFV) and software-defined network (SDN). NFV is used to deploy network nodes with the possibility of their dynamic configuration and reconfiguration, and SDN is applied to change the configuration of the virtual network, filtering traffic and its redirection between the real network and the honeypot system. The deployment of this honeypot system requires significant computing resources to run the virtual machines.
In contrast to the typical implementation of a dynamic honeypot, ref. [18] proposes changing not the network configuration, but the position of genuine and spoofed services. To access the particular service, they use a secure communication protocol, which provides a mechanism for updating the IP address of the target node. An attacker cannot use this protocol because of a lack of cryptographic parameters and as a consequence has access to the service within a certain time interval between changes of system services positions. By the example of DoS attack, the effectiveness of this honeypot was demonstrated—smoothing load schedule on a node by distributing it among several nodes. The disadvantage of this approach is the complexity of its integration into a real network infrastructure because of the necessity to use a proprietary protocol, which requires each client to additionally listen to the port to get the service IP address updates.
The vast majority of honeypot systems for the energy networks are low interactive as presented in [19,20,21,22,23,24,25]. This is due to the high cost of real ICS devices and the inability to create virtual nodes running their firmware. Ref. [26] proposes a honeypot system architecture, which in addition to the virtual machine with Conpot [27] simulating the RTU devices includes virtual and real HMI panels to perform network interaction with RTU, thus betraying the realism of the network infrastructure.
Existing implementations of the high interactive honeypot for the energy networks use an architecture based on the real control devices (controllers) [28,29] or architecture with many low interactive nodes that proxy traffic to real ICS devices [30].

2.2. Motivation

The actual infrastructure of the energy network includes a large number of different devices. The honeypot systems discussed earlier do not allow deploying a network of a similar or larger scale due to the lack of tools for ICS virtualization. However, access to these tools becomes necessary to improve the security of the energy networks. The following paper proposes a new method of dynamic network topology virtualization that allows the deployment of a network of arbitrary scale, considering the limited computing resources in the energy networks.

2.3. A Hybrid Honeypot

One of the main objectives of the honeypot systems is to divert an attacker from the resources of the protected network. In order to provide this function, a semblance of the virtual and real networks is necessary. This can be achieved by using the high interactive nodes—the virtual machines. However, with the limited computing resources, it is impossible to implement a network of arbitrary scale using the nodes of this kind, as the maximal possible number of the simultaneously working machines is fixed. Thus, it is necessary to use a hybrid honeypot system.
A hybrid honeypot system is a system consisting of nodes of two types (Figure 2):
  • simulated node (simulator): a software tool that implements the TCP/IP stack of a real operating system and emulates interaction with “working” services acting as the node;
  • virtualized node: a virtual machine with the operating system installed on it, which allows us to exactly replicate the node of the real network.
The high interactivity of the hybrid honeypot system is ensured by switching the mode of the nodes according to the condition of their reachability for an attacker:
  • simulator mode: a node at this stage of an attack is not reachable by an attacker;
  • virtualizable mode: in the current state of the system, a node can be reached by an attacker.
The hybrid honeypot system responds to an attacker by changing the mode of the operation of the virtual network nodes.
Formally, a network consists of the complete graphs K m (Figure 2), as each of the m nodes can contact its neighbors directly (ping) in the subnetworks. Generally, a network can be represented as a finite set G of the complete graphs K m , the sets of vertices of which intersect:
G = { K m i ( i ) | V ( K m i ( i ) ) V ( K m j ( j ) ) = v , i j } ,
where V is the set of vertices of the graph, n is the number of the networks in G.
L N ( G ) = { K m ( i ) , 1 i , j n } ,
L N i ( G ) = K m ( i ) ,
# L N ( G ) = n .
The vertices which belong to several complete graphs will be called a boundary node
V i n t e r ( G ) = { v | v V ( K m 1 ( 1 ) ) & & v V ( K m k ( k ) ) & K m 1 ( 1 ) G & & K m k ( k ) G , 1 k n } .
To renumber the boundary vertices for each j-th vertex, set a binary vector x j of length n, where the i-th element corresponds to L N i ( G ) . The units are set at the positions corresponding to the local networks to which this vertex belongs.
During the attack, the attacker compromises the network nodes. Hence, the set of the compromised nodes is the path of the attack:
p a t h = { v | v V ( G ) & c o m p r o m i s e d ( v ) } .
The state of the hybrid honeypot system is described by the set of the compromised nodes together with the set of the nodes that could potentially be compromised at a given time:
x = k { i | c o m p r o m i s e d ( v i ) , 1 i # V i n t e r ( G ) } x k ,
S i = { L N j ( G ) | 1 j n & x [ j ] = 1 } .
The correct work of the system is provided if at each possible state of the system the consumed resources do not exceed the physically accessible ones:
i R C ( S i ) R C s y s t e m , R C ( S i ) = l = 0 # V ( S i ) R C ( v l ) .
Thus, to evaluate the computing resources required for the hybrid honeypot system, it is necessary to specify the condition for changing the mode of the nodes from the simulated to the virtualizable mode.
Condition 1. 
The mode change from the simulated to the virtualizable node is performed in case of compromise of the adjacent node according to the virtual network infrastructure graph. □
The development of the worst-case scenario in terms of the resources required, given the condition 1 introduced, is shown in Figure 3. An attacker had initially compromised the input node A. The response of the honeypot system to this action is to put the nodes B, C, and D adjacent to it into the virtualizable mode. D was then compromised and the nodes on subnet L N 3 became reachable to the attacker. The response to this is to change their mode of operation to the virtualizable ode. Subsequent hijacking of the node H leads to the virtualization mode of the nodes in the subnet L N 5 .
In this path of the attack, the honeypot system has moved to state S, in which 17 nodes are virtualizable. Hence, R C ( S ) is equal to the sum of resources consumed by each of the virtual machines. To reduce the number of the simultaneously working machines, we introduce an additional condition 2.
Condition 2. 
When an attacker moves to another subnet, the mode of operation of the nodes in the considered subnet can be changed to the simulated node. □
The attacker has sequentially compromised the nodes A, D, and H. According to the introduced condition, he can continue to propagate in the network L N 3 or L N 5 . B and C can be put into the simulated mode, thus reducing the number of the virtualized machines in the system state S to 15. Note that the attacker, interacting with node H, still has direct access to the compromised nodes A, D, and at any time and can attack the nodes B and C. Therefore, the application of this condition is inadmissible.
Research [14] has pointed out that devices with known vulnerabilities tend to be attacked more frequently than nodes with unknown ones. Thus, to reduce the number of the single-moment virtual machines running, it is necessary to integrate the specially prepared vulnerable nodes into the virtual network infrastructure graph when designing it. The intruder moves within the network using the techniques given in the MITRE ATT&KE knowledge base [31]. By integrating all possible paths of the attacker’s transitions between the vulnerable nodes, a potential attacks development graph is built.
Condition 3. 
The node, which according to the potential attacks’ development graph cannot be attacked, remains simulated. □
Let the potential attacks development graph includes all the boundary nodes, as well as a number of nodes from subnets: one node from the network L N 2 , L N 3 , L N 4 and three nodes from the network L N 5 . Then in the above attack path the honeypot system will perform the following actions Figure 4:
  • Node A compromised—change the mode of the nodes B, C and D to virtualizable.
  • Node D compromised—the nodes H and M are switched to virtualizable mode.
  • Node H compromised—the nodes O, P and Q became virtualized.
The graph describing the state of the honeypot system S under condition 3 contains only 9 nodes, which are the virtual machines. The number of nodes in the potential attacks’ development graph can be chosen by taking into account the available computing resources and the time requirements for the personnel to develop a response.
Suppose an attacker explored subnets L N 3 and L N 5 and switched to compromise the node B, no longer interacting with the nodes D and H. Then to access the non-adjacent node H the attacker must start interacting with the adjacent node D. Based on this, let us formulate an additional condition.
Condition 4. 
The node that is not adjacent to the node with which the attacker interacts, in the absence of interaction within a given period of time, must be transferred to the simulated node. □
Thus, if the attacker does not interact with the nodes D and H, then the nodes M, H, O, P and Q will be transferred to the simulated node. The state S of the honeypot system will change to S , which includes only 4 nodes that are the virtual machines. Note that when the compromised node H is switched to the simulator mode, the state of the virtual machine must be saved to recover later.

2.4. Potential Attacks Development Graph

The potential attacks development graph can be represented by several methods.
Figure 5 shows a network diagram. Let us consider several common types of the attack graphs on this sample [32]:
  • Full attack graph is a graph representing every possible sequence of attacks. The nodes of the graph are states and the edges are transition conditions. As the number of states increases, the size of this graph increases rapidly as O ( n ! ) . Figure 6a shows part of the complete attack graph.
  • A prediction graph is a graph in which a new node is added provided that there are no ancestors using the same vulnerability to reach the same state. The value of nodes and edges is similar to the full graph. This graph eliminates most of the redundant structure of the full graph, as a consequence, its construction takes less time, and correctly predicts the impact of removing any of the vulnerability instances in the network. Figure 6b shows an example of a prediction graph.
  • A graph with several preconditions (MP-graph) is a graph that consists of nodes of three types: states, preconditions, and vulnerabilities. The edges indicate only the direction of transition between the nodes of the graph. In addition to the information contained in the full graph and the prediction graph, this graph also shows all the states that can be reached from the current state using cycles. Figure 6c shows an MP-graph in which the only precondition is the reachability of the network nodes.
Therefore, among the given types of attack graphs, the MP-graph is the fastest, it fully represents possible transitions between the states without structure redundancy, and it can be converted into a complete graph or prediction graph.

3. Results

3.1. Implementation of a Hybrid Honeypot Based on a Potential Attack Development Graph

The architecture of the implemented prototype of the hybrid honeypot system based on the development graph of potential attacks is shown in Figure 7.
The action collection component is responsible for detecting events produced by an attacker in a system under his control and sending them to the management server.
The system management component performs the simulator and the virtual machine management based on the events received from the action collection components. The simulated node management component implements starting and stopping simulators as requested by the control component.
The virtualizable node management component performs operations on the virtual machines of the implemented network.
Based on the input configuration file, which describes the development graph of potential attacks for the implemented network, the developed system deploys the virtual network and changes its structure in terms of node type changes.

3.1.1. The Actions Collection Component

The action collection component consists of two tools: the network client and the kernel event collection tool. The kernel event collection tool is an open-source project Fibratus [33], which can be used to detect the events related to processes, threads, dynamic libraries, files, registry keys, networking, and working with the system object identifiers.
The HTTP client communicates with the system management component to initialize the list of expected events and send the detected user actions, and runs the means of collecting user actions and processing the monitored events according to the received list. The following API requests are used when communicating with the server: GET request /agent/init/—initialization of the list of events, POST request /agent/event/—events sending. The header of each request specifies the identifier of the sending node.
The tools used are part of the honeypot prototype and do not provide a sufficient level of indistinguishability of a virtual network node from a real device.

3.1.2. The Simulated Node Management Component

The simulated node management component is the HTTP server implemented using the FastAPI web framework [34] and the Uvicorn asynchronous server [35]. The function of this component is to manage HoneyD simulator instances [4].
HoneyD is a daemon that creates simulated nodes on the network, which can run different operating systems and contain different services by using the nmap-os-db fingerprint database of the Nmap utility and extending it with Perl and sh scripts [36].
The simulated node management component runs each node simulator as a separate process, allowing each node to be disabled and enabled independently.
To interact with the management server, this component provides the API requests shown in Table 1.

3.1.3. Configuration File

The configuration file contains a potential attack development graph for the virtual network being implemented in JSON format, whose structure is described by a grammar developed using the Pydantic module for the Python programming language. Figure 8 shows an example of a file describing a virtual network of four nodes.
The node with identifier 0 has no parent (parent_id: null) and has two children (children). Since this node is the entry point of the network, only a virtual machine with the universal unique identifier 1dd99331-0455-4b7f-bf51-1c3748918e79 is defined.
The node with identifier 1 is a boundary node, so the “ip” list contains two IP addresses. The field “simulator” contains the path to the simulator configuration file. Since the initial state of the node is simulator (initial_system: simulator), the virtual machine is initially disabled. If there is no communication between the attacker and the node operating in the virtualized mode, after the timeout interval specified in the “timeout” parameter the node will be switched to the simulated node. If a node has been compromised, a snapshot of its state will be created before shutting down the virtual machine.

3.1.4. The Virtualizable Node Management Component

The virtualizable node management component performs operations on the virtual machines on the implemented network and communicates with the simulated node management component to synchronize with the current active node type. Virtual machines are managed using the Libvirt-python 6.10 module, which provides an interface for remote interaction with the hypervisor. To improve the experience of interacting with this API, the Connect, and Instance classes have been implemented.
In order to establish a connection to the hypervisor, a username and password specified when configuring the hypervisor must be provided. This component is implemented as a Worker class, which is initialized by an object of the ConnectionSetup class that contains the KVM connection parameters.
The virtualizable node management component performs the tasks placed by the system management component one by one. Each task is described by the structure shown in Figure 9.
The “sim_id” and “sim_action” fields are optional, because some nodes may not have a simulator configuration, like the node with identifier 0 described in the previous subsection. The “vm_action” field contains possible virtual machine operations:
  • power on: enabling the specified virtual machine;
  • power off: shutting the node down with an ACPI command;
  • suspend: suspends the virtual machine, with the current state saved on the hard disk;
  • resume: reactivation of the node by restoring the previously saved state;
  • revert: restores the machine to a specified snapshot, which name is specified in the “snapshot_name” field of the subobject of the Action class;
  • force off: instantly disconnects a node.
When a task is received, a virtual machine operation is initially performed and then a /stop/ or /start/ POST request is sent to the simulated node management component to stop or start, respectively.
The method of pausing and resuming the virtualizable nodes with which the attacker has interacted is selected to create a snapshot of the state and then restore it. This method preserves all the results of the attacker’s work on a given operating system while providing a faster recovery speed than a normal startup.

3.1.5. The System Management Component

The system management component inputs a configuration file with the graph of potential attacks and the file with authentication data for connecting to the hypervisor.
When parsing the potential attack evolution graph, the structure is checked for correctness using the grammar described earlier and for consistency of the node configurations specified in it according to the following rules:
  • There should be no nodes without at least one type of node implementation.
  • When the initial node type (initial_state) is specified:
    • in the absence of a given simulator, the original node type must not be a simulator;
    • in the absence of a given virtual machine, the initial node type must not be a virtual machine;
    • if the base state of the virtual machine is “power on”, the initial node type cannot be specified as a simulator.
  • If both a virtual machine and a simulator are specified in the configuration, the original node type must be specified.
  • If no simulator is specified, the initial state of the virtual machine cannot be “power off”.
After checking the configuration file, the simulated node management component is initialized with the POST request /new/, and the simulators required at the initial stage are launched.
Several instances of the virtualizable node management component are created to manage virtual machines. Their number affects the speed of execution of the virtual machine operations, since the operation to return to the snapshot is blocked. Therefore, this parameter should be chosen according to the amount of the available resources and the development graph of potential attacks on the implemented virtual network.
Interaction of the system management component with instances of the management component of the virtualized node is performed by means of a task queue (Figure 10).
This component is an HTTP server that provides an API for interacting with the action collection component:
  • initializing a list of expected events when the virtualizable node starts up;
  • receiving data about events caused by an attacker’s actions.
When events are received, a task is generated according to the potential attack development graph, which is sent to the queue for execution by one of the instances of the virtualizable node management component.

3.2. Testing a Hybrid Honeypot Based on a Graph of Potential Attack Developments

In order to compare the parameters of a hybrid honeypot system operating under the specified conditions of the node mode change, the simulator has been developed that uses the specified server characteristics, virtual network infrastructure graph, attack path description, time of operations performed by an attacker and a hybrid honeypot system to analyze the honeypot system behavior and generate charts of resource consumption, number of running virtual machines and presence of system reaction delays versus time. The response is understood as a set of actions that are performed as a response to an attacker’s actions.
The virtual network infrastructure graph with renumbered vertices is shown in Figure 11. The development graph of potential attacks includes the following nodes— { 0 , 1 , 2 , 3 , 7 , 8 , 10 , 15 , 16 , 17 , 20 , 21 , 25 , 27 } .
Table 2, Table 3 and Table 4 show the characteristics under which the simulations were performed for each of the given conditions of the hybrid honeypot system. The idle time parameter of the virtualized node (timeout) is equal to 4 s.
A standard attack scenario consists of the following steps: compromise the host, log on to it, download and run the necessary utilities (netcat, nmap, and others), and scan the subnet to identify the next target. In case of moving to an already compromised node, you only need to run the utilities.
Let the attack path is p a t h 1 = { 0 , 1 , 7 , 8 , 20 , 3 , 16 , 15 , 27 } . Figure 12 shows the simulation result for the hybrid honeypot system operating according to the first condition (a) and the combination of the third and fourth conditions (b).
According to the results, the state S denotes the hybrid honeypot system, which changes the mode of the nodes according to the first condition, before the compromise of node 8 included 12 virtual machines. When boundary node 8 is compromised, 4 more L S 4 subnet nodes must be started. However, due to a lack of resources, the system stopped responding to the attacker.
The hybrid honeypot system running conditions 3 and 4 reacts correctly to the attacker’s movements through the virtual network. At 420 seconds, five virtualizable nodes of subnets L S 1 , L N 2 , L N 4 are switched to the simulated mode because the attacker has switched to another subnet L S 3 .
Figure 13 shows the simulation results for p a t h 2 = { 0 , 1 , 7 , 8 , 20 , 3 , 16 , 15 , 27 , 1 , 8 , 18 } . The re-entry of nodes 1 and 8 is due to the need to rerun utilities loaded after the compromise.
There is a delay in the graph of the system response delays when attempting to compromise node 18—it was necessary to switch the node’s mode of operation to virtualizable. This is due to the fact that this node is not included in the graph of potential attacks and the hybrid honeypot system had not enabled a virtual machine for in advance.

4. Discussion

Ensuring the security of modern energy networks is an important challenge, because a successful attack on smart grids and smart power plants can disrupt fast-flowing physical processes, destroy expensive components and disable important infrastructure.
Based on the formal specification of the network infrastructure and the attack process, a new method was developed to dynamically manage the virtual network infrastructure of a hybrid honeypot system based on a potential attack development graph, which, by providing high interactivity of nodes and similar network scale, is indistinguishable from the real ones, from the attacker’s point of view.
In our study, the existing methods for implementing the honeypot systems for the energy networks have been already observed and reviewed. The main factor constraining the development of this area is the closed nature of ICS device manufacturers. However, with the emergence of enterprise services and global integration, openness is necessary to improve the security of network infrastructure. Table 5 summarizes our work comparing our solution with the existing honeypot systems examined in Section 2.1.
Ensuring high interactivity, understood as the ability to anchor an attacker to each node of the implemented network, is an important feature of a honeypot system, on which the ability to solve the problems presented in Section 1 depends. Our solution, unlike others, allows entrenchment on the attacked network nodes by granting access to an individual virtual machine rather than a simulator or a single virtual machine, satisfying this qualitative characteristic.
The energy networks may have a significant size. Therefore, the scalability with respect to computing resources requirement is also an important comparative feature. The developed method allows the more efficient usage of the resources, compared with those shown in Table 5. On average, under the attack conditions only 14 of 29 nodes of the erected virtual network will be virtual machines, which is 48% of the total network size (this is presented in Section 3.2).
The proposed honeypot system builds the section of the virtual network infrastructure visible to the attacker; at the same time, other solutions build the whole network or the nearest portion of the infrastructure. Therefore, the proposed approach allows the building of the more realistic (for the attacker) virtual model of the under-attacking network.
In the future, we are focusing on solving the drawback of the proposed method, which is the delay in case an attacker chooses a node that is not provided by the potential attack graph as a target for compromise. We also plan to develop methods to analyze the actions collected from virtual network nodes, detect compromised scenarios, and further optimize the algorithm of the node mode changing. Our method can be also applied to industrial wireless sensor networks (WSNs) in combination with security and anomaly detection techniques, given their [37,38,39] characteristics.

Author Contributions

Conceptualization, D.Z. and E.Z.; methodology, validation, M.K.; software, E.Z.; formal analysis, resources, D.Z.; writing—original draft preparation, E.Z.; writing—review and editing, M.K.; visualization, E.Z.; supervision, D.Z.; project administration, funding acquisition, M.K. All authors have read and agreed to the published version of the manuscript.

Funding

The research is funded by the Ministry of Science and Higher Education of the Russian Federation as part of the World-class Research Center program: Advanced Digital Technologies (contract No. 075-15-2022-311 dated 20 April 2022).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ICSindustrial control system
ICTinfocommunication technologies
PLCdevices such as programmable logic controller
HMIoperator control panel
IEDintelligent electronic device
RTUremote control module
VPNvirtual private network
SDNsoftware-defined network
NFVnetwork functions virtualization

References

  1. Paul, S. A review of smart technology (Smart Grid) and its features. In Proceedings of the 2014 1st International Conference on Non Conventional Energy (ICONCE 2014), Kalyani, India, 16–17 January 2014; Volume 10, pp. 200–203. [Google Scholar]
  2. Claroty Biannual Ics Risk & Vulnerability Report: 1H 2021. Available online: https://claroty.com/wp-content/uploads/2021/08/Claroty_Biannual_ICS_Risk_Vulnerability_Report_1H_2021.pdf (accessed on 20 February 2022).
  3. Franco, J. A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems. IEEE Commun. Surv. Tutor. 2021, 10, 2351–2383. [Google Scholar] [CrossRef]
  4. Repository HoneyD. Available online: https://github.com/DataSoft/Honeyd (accessed on 20 January 2022).
  5. Wagener, G. Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour. Ph.D. Dissertation, Institut National Polytechnique de Lorraine-INPL, Nancy, France, 2011. [Google Scholar]
  6. Pauna, A. Improved self adaptive honeypots capable of detecting rootkit malware. In Proceedings of the IEEE 2012 9th International Conference on Communications (COMM), Bucharest, Romania, 21–23 June 2012; pp. 281–284. [Google Scholar]
  7. Pauna, A.; Bica, I. RASSH-Reinforced adaptive SSH honeypot. In Proceedings of the IEEE 2014 10Th International Conference on Communications (COMM), Bucharest, Romania, 29–31 May 2012; pp. 1–6. [Google Scholar]
  8. Wang, K.; Du, M.; Maharjan, S.; Sun, Y. Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 2017, 8, 2474–2482. [Google Scholar] [CrossRef]
  9. Pauna, A.; Iacob, A.C.; Bica, I. Qrassh-a self-adaptive ssh honeypot driven by q-learning. In Proceedings of the IEEE 2018 International Conference on Communications (COMM), Bucharest, Romania, 14–16 June 2018; pp. 441–446. [Google Scholar]
  10. Pauna, A.; Bica, I.; Pop, F.; Castiglione, A. On the rewards of self-adaptive IoT honeypots. Ann. Telecommun. 2019, 74, 501–515. [Google Scholar] [CrossRef]
  11. Boumkheld, N.; Panda, S.; Rass, S.; Panaousis, E. Honeypot type selection games for smart grid networks. In International Conference on Decision and Game Theory for Security; Springer: Berlin/Heidelberg, Germany, 2019; pp. 85–96. [Google Scholar]
  12. Diamantoulakis, P.; Dalamagkas, C.; Radoglou-Grammatikis, P.; Sarigiannidis, P.; Karagiannidis, G. Game theoretic honeypot deployment in smart grid. Sensors 2020, 20, 4199. [Google Scholar] [CrossRef] [PubMed]
  13. Ovasapyan, T.D.; Nikulkin, V.A.; Moskvin, D.A. Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks. Autom. Control Comput. Sci. 2021, 55, 1104–1110. [Google Scholar] [CrossRef]
  14. Pa, Y.M.; Suzuki, S.; Yoshioka, K.; Matsumoto, T.; Kasama, T.; Rossow, C. IoTPOT: A novel honeypot for revealing current IoT threats. J. Inf. Process. 2016, 24, 522–533. [Google Scholar] [CrossRef] [Green Version]
  15. Guarnizo, J.D.; Tambe, A.; Bhunia, S.S.; Ochoa, M.; Tippenhauer, N.O.; Shabtai, A.; Elovici, Y. Siphon: Towards scalable high-interaction physical honeypots. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, Abu Dhabi, United Arab Emirates, 2 April 2017; pp. 57–68. [Google Scholar]
  16. Tambe, A.; Aung, Y.L.; Sridharan, R.; Ochoa, M.; Tippenhauer, N.O.; Shabtai, A.; Elovici, Y. Detection of threats to IoT devices using scalable VPN-forwarded honeypots. In Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, Richardson, TX, USA, 25–27 March 2019; pp. 85–96. [Google Scholar]
  17. Zarca, A.M.; Bernabe, J.B.; Skarmeta, A.; Calero, J.M. Virtual IoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks. IEEE J. Sel. Areas Commun. 2020, 38, 1262–1277. [Google Scholar] [CrossRef]
  18. Shi, L.; Li, Y.; Liu, T.; Liu, J.; Shan, B.; Chen, H. Dynamic distributed honeypot based on blockchain. IEEE Access 2019, 7, 72234–72246. [Google Scholar] [CrossRef]
  19. Vasilomanolakis, E.; Srinivasa, S.; Cordero, C.G.; Mühlhäuser, M. Multi-Stage attack detection and signature generation with ICS honeypots. In Proceedings of the NOMS 2016—2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 25–29 April 2016; pp. 1227–1232. [Google Scholar]
  20. Gallenstein, J. Integration of the Network and Application Layers of Automatically-Configured Programmable Logic Controller Honeypots. Master’s Thesis, Air Force Institute of Technology, Wright-Patterson AFB, OH, USA, 2017. [Google Scholar]
  21. Abe, S.; Tanaka, Y.; Uchida, Y.; Horata, S. Developing deception network system with traceback honeypot in ICS network. SICE J. Control. Meas. Syst. Integr. 2018, 11, 372–379. [Google Scholar] [CrossRef] [Green Version]
  22. Kołtyś, K.; Gajewski, R. Shape: A honeypot for electric power substation. J. Telecommun. Inf. Technol. 2015, 4, 37–43. [Google Scholar]
  23. Buza, D.I.; Juhász, F.; Miru, G.; Félegyházi, M.; Holczer, T. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. In International Workshop on Smart Grid Security; Springer: Berlin/Heidelberg, Germany, 2014; pp. 181–192. [Google Scholar]
  24. Serbanescu, A.; Obermeier, S.; Yu, D. ICS threat analysis using a large-scale honeynet. In Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), Ingolstadt, Germany, 17–18 September 2015; pp. 20–30. [Google Scholar]
  25. Mashima, D.; Chen, B.; Gunathilaka, P.; Tjiong, E.L. Towards a grid-wide, high-fidelity electrical substation honeynet. In Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, 23–27 October 2017; pp. 89–95. [Google Scholar]
  26. Pliatsios, D.; Sarigiannidis, P.; Liatifis, T.; Rompolos, K.; Siniosoglou, I. A novel and interactive industrial control system honeypot for critical smart grid infrastructure. In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar]
  27. Conpot ICS/SCADA Honeypot. Available online: http://conpot.org/ (accessed on 23 January 2022).
  28. Piggin, R.; Buffey, I. Active defence using an operational technology honeypot. In Proceedings of the 11th International Conference on System Safety and Cyber-Security (SSCS 2016), London, UK, 11–13 October 2016; pp. 1–6. [Google Scholar]
  29. Hilt, S.; Maggi, F.; Perine, C.; Remorin, L.; Rösler, M.; Vosseler, R. Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats, 3rd ed.; White Paper; Trend Micro: Tokyo, Japan, 2020. [Google Scholar]
  30. Winn, M.; Rice, M.; Dunlap, S.; Lopez, J.; Mullins, B. Constructing cost-effective and targetable industrial control system honeypots for production networks. Int. J. Crit. Infrastruct. Prot. 2015, 10, 47–58. [Google Scholar]
  31. MITRE ATT&KE Lateral Movement. Available online: https://attack.mitre.org/tactics/TA0008/ (accessed on 3 February 2022).
  32. Ingols, K.; Lippmann, R.; Piwowarski, K. Practical attack graph generation for network defense. In Proceedings of the 2006 22nd Annual Computer Security Applications Conference (ACSAC’06), Miami Beach, FL, USA, 11–15 December 2006; pp. 121–130. [Google Scholar]
  33. Tool documentation Fibratus. Available online: https://www.fibratus.io/#/overview/what-is-fibratus (accessed on 13 February 2022).
  34. Framework FastAPI. Available online: https://fastapi.tiangolo.com (accessed on 10 February 2022).
  35. Asynchronous Server Uvicorn Parameters. Available online: https://www.uvicorn.org/settings/ (accessed on 10 February 2022).
  36. Fingerprint Database Nmap. Available online: https://github.com/nmap/nmap/blob/master/nmap-os-db (accessed on 20 January 2022).
  37. Ovasapyan, T.D.; Ivanov, D.V. Security provision in wireless sensor networks on the basis of the trust model. Autom. Control. Comput. Sci. 2018, 52, 1042–1048. [Google Scholar] [CrossRef]
  38. Ovasapyan, T.D.; Moskvin, D.A. Security Provision in WSN on the Basis of the Adaptive Behavior of Nodes. In Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 27–28 July 2020; pp. 81–85. [Google Scholar]
  39. Fatin, A.D.; Pavlenko, E.Y. Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems. Autom. Control. Comput. Sci. 2021, 55, 1111–1114. [Google Scholar] [CrossRef]
Figure 1. Five leading manufacturers affected by vulnerabilities.
Figure 1. Five leading manufacturers affected by vulnerabilities.
Energies 15 04123 g001
Figure 2. Hybrid honeypot system virtual network schema: blue—the simulator, dark blue—the virtualized node.
Figure 2. Hybrid honeypot system virtual network schema: blue—the simulator, dark blue—the virtualized node.
Energies 15 04123 g002
Figure 3. Schema of the virtual network with three compromised nodes: dark blue—the virtualizable nodes, red—the compromised virtualizable nodes, blue—the simulators.
Figure 3. Schema of the virtual network with three compromised nodes: dark blue—the virtualizable nodes, red—the compromised virtualizable nodes, blue—the simulators.
Energies 15 04123 g003
Figure 4. Schema of a virtual network with three compromised nodes: dark blue—the virtualizable nodes, red—the compromised virtualizable nodes, blue—the simulators.
Figure 4. Schema of a virtual network with three compromised nodes: dark blue—the virtualizable nodes, red—the compromised virtualizable nodes, blue—the simulators.
Energies 15 04123 g004
Figure 5. Network infrastructure diagram.
Figure 5. Network infrastructure diagram.
Energies 15 04123 g005
Figure 6. Attack graphs: (a) part of the complete attack graph; (b) the prediction graph; (c) the graph with several preconditions.
Figure 6. Attack graphs: (a) part of the complete attack graph; (b) the prediction graph; (c) the graph with several preconditions.
Energies 15 04123 g006
Figure 7. The hybrid honeypot architecture based on the potential attack development graph.
Figure 7. The hybrid honeypot architecture based on the potential attack development graph.
Energies 15 04123 g007
Figure 8. Configuration file describing the development graph of potential attacks.
Figure 8. Configuration file describing the development graph of potential attacks.
Energies 15 04123 g008
Figure 9. Task structure of the virtualizable node management component.
Figure 9. Task structure of the virtualizable node management component.
Energies 15 04123 g009
Figure 10. Schema of interaction between the system management component and instances of the management component of the virtualized node.
Figure 10. Schema of interaction between the system management component and instances of the management component of the virtualized node.
Energies 15 04123 g010
Figure 11. Virtual network graph of the hybrid honeypot system in the initial state.
Figure 11. Virtual network graph of the hybrid honeypot system in the initial state.
Energies 15 04123 g011
Figure 12. Charts of the resource consumption, the number of running virtual machines and the presence of delays in the system response at p a t h 1 : (a) the hybrid honeypot system operates following the Condition 1; (b) the hybrid honeypot system operates following the Conditions 3 and 4.
Figure 12. Charts of the resource consumption, the number of running virtual machines and the presence of delays in the system response at p a t h 1 : (a) the hybrid honeypot system operates following the Condition 1; (b) the hybrid honeypot system operates following the Conditions 3 and 4.
Energies 15 04123 g012
Figure 13. Charts of the resource consumption, the number of running virtual machines and the presence of delays in the system response at p a t h 2 .
Figure 13. Charts of the resource consumption, the number of running virtual machines and the presence of delays in the system response at p a t h 2 .
Energies 15 04123 g013
Table 1. Requests of the implemented API of the simulated node management component.
Table 1. Requests of the implemented API of the simulated node management component.
Request TypePathOptionsDescription
POST/new/[“id”: node ID, “path”: path to the HoneyD configuration file]Initialization of the structure describing the simulators and representing a dictionary, where the key is the node ID, the value is the path to the configuration file.
POST/start/List of node IDsRun the simulators whose identifiers were passed by the system management component, and save the Popen class object in the structure described earlier.
POST/stop/List of node IDsStops active simulator processes advising the transmitted identifiers.
Table 2. The specified characteristics of a virtual server.
Table 2. The specified characteristics of a virtual server.
ParameterValue
CPU, %400
RAM, Mb32,000
Disk I/O, %100
Table 3. Possible attacker’s actions and execution time.
Table 3. Possible attacker’s actions and execution time.
ParameterTime, s
Compromise2
Securing10
Loading the necessary tools30
Launching tools10
Scanning a subnet5 per subnet node
Table 4. Actions, time and resources of the hybrid honeypot system.
Table 4. Actions, time and resources of the hybrid honeypot system.
ParameterTime, sCPU, %RAM, MbDisk I/O, %
Power on770400015
Restore from snapshot355005
Working3020005
Snapshot creation455007
Shutting down1000
Table 5. Comparison of the honeypot solutions applied at the energy networks.
Table 5. Comparison of the honeypot solutions applied at the energy networks.
NameSimulatorsVirtual MachinesReal DevicesHigh InteractivityNetwork ScalabilityAvg. Resource Consumption, %
ShaPe [22]++
IoTPOT [14]+++100
CryPLH [23]++++100
Electrical Substation Honeynet [25]+++100
ICS honeypot [30]+++
Our solution++++48
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kalinin, M.; Zegzhda, D.; Zavadskii, E. Protection of Energy Network Infrastructures Applying a Dynamic Topology Virtualization. Energies 2022, 15, 4123. https://doi.org/10.3390/en15114123

AMA Style

Kalinin M, Zegzhda D, Zavadskii E. Protection of Energy Network Infrastructures Applying a Dynamic Topology Virtualization. Energies. 2022; 15(11):4123. https://doi.org/10.3390/en15114123

Chicago/Turabian Style

Kalinin, Maxim, Dmitry Zegzhda, and Evgenii Zavadskii. 2022. "Protection of Energy Network Infrastructures Applying a Dynamic Topology Virtualization" Energies 15, no. 11: 4123. https://doi.org/10.3390/en15114123

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop