Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

被引:47
|
作者
Rao, Nageswara S. V. [1 ]
Poole, Stephen W. [1 ]
Ma, Chris Y. T. [2 ]
He, Fei [3 ]
Zhuang, Jun [4 ]
Yau, David K. Y. [5 ]
机构
[1] Oak Ridge Natl Lab, Div Math & Comp Sci, Oak Ridge, TN 37831 USA
[2] Adv Digital Sci Ctr, Singapore, Singapore
[3] Texas A&M Univ, Dept Mech & Ind Engn, Kingsville, TX USA
[4] SUNY Buffalo, Dept Ind & Syst Engn, Buffalo, NY USA
[5] Singapore Univ Technol & Design, Dept Comp Sci, Singapore, Singapore
关键词
Cyber infrastructures; cyber-physical networks; game theory; SECURITY; EQUILIBRIUM; DECEPTION; TERRORISM; SECRECY; FACE;
D O I
10.1111/risa.12362
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.
引用
收藏
页码:694 / 710
页数:17
相关论文
共 50 条
  • [1] Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
    He, Fei
    Chandrasekar, Santhosh
    Rao, Nageswara S., V
    Ma, Chris Y. T.
    2019 22ND INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION 2019), 2019,
  • [2] Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions
    Rao, Nageswara S., V
    Ma, Chris Y. T.
    He, Fei
    IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (02) : 483 - 497
  • [3] Discrete game-theoretic analysis of defense in correlated cyber-physical systems
    He, Fei
    Zhuang, Jun
    Rao, Nageswara S. V.
    ANNALS OF OPERATIONS RESEARCH, 2020, 294 (1-2) : 741 - 767
  • [4] Discrete game-theoretic analysis of defense in correlated cyber-physical systems
    Fei He
    Jun Zhuang
    Nageswara S. V. Rao
    Annals of Operations Research, 2020, 294 : 741 - 767
  • [5] Infrastructure Resilience Using Cyber-Physical Game-Theoretic Approach
    Rao, Nageswara S., V
    Poole, Steve W.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    2013 6TH INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS), 2013, : 31 - 36
  • [6] A Game-Theoretic Approach for Defending Cyber-Physical Systems From Observability Attacks
    Maccarone, Lee T.
    Cole, Daniel G.
    ASCE-ASME JOURNAL OF RISK AND UNCERTAINTY IN ENGINEERING SYSTEMS PART B-MECHANICAL ENGINEERING, 2020, 6 (02):
  • [7] Game-Theoretic Resilience Analysis of Cyber-Physical Systems
    He, Fei
    Zhuang, Jun
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    Yau, David K. Y.
    2013 IEEE 1ST INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, NETWORKS, AND APPLICATIONS (CPSNA), 2013, : 90 - 95
  • [8] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [9] Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
    Li, Yuzhe
    Shi, Ling
    Cheng, Peng
    Chen, Jiming
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) : 2831 - 2836
  • [10] A Survey of Cyber-Physical Systems From a Game-Theoretic Perspective
    Tushar, Wayes
    Yuen, Chau
    Saha, Tapan K. K.
    Nizami, Sohrab
    Alam, Mollah Rezaul
    Smith, David B. B.
    Poor, H. Vincent
    IEEE ACCESS, 2023, 11 : 9799 - 9834