Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

被引:47
|
作者
Rao, Nageswara S. V. [1 ]
Poole, Stephen W. [1 ]
Ma, Chris Y. T. [2 ]
He, Fei [3 ]
Zhuang, Jun [4 ]
Yau, David K. Y. [5 ]
机构
[1] Oak Ridge Natl Lab, Div Math & Comp Sci, Oak Ridge, TN 37831 USA
[2] Adv Digital Sci Ctr, Singapore, Singapore
[3] Texas A&M Univ, Dept Mech & Ind Engn, Kingsville, TX USA
[4] SUNY Buffalo, Dept Ind & Syst Engn, Buffalo, NY USA
[5] Singapore Univ Technol & Design, Dept Comp Sci, Singapore, Singapore
关键词
Cyber infrastructures; cyber-physical networks; game theory; SECURITY; EQUILIBRIUM; DECEPTION; TERRORISM; SECRECY; FACE;
D O I
10.1111/risa.12362
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.
引用
收藏
页码:694 / 710
页数:17
相关论文
共 50 条
  • [41] Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation
    Abercrombie, Robert K.
    Sheldon, Frederick T.
    2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, : 455 - 462
  • [42] Defending Cyber-Physical Systems against DoS Attacks
    Nur, Abdullah Yasin
    Tozal, Mehmet Engin
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2016, : 334 - 336
  • [43] Security of SCADA Systems Against Cyber-Physical Attacks
    Do, Van Long
    Fillatre, Lionel
    Nikiforov, Igor
    Willett, Peter
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) : 28 - 45
  • [44] Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks
    Adepu, Sridhar
    Shrivastava, Siddhant
    Mathur, Aditya
    IEEE INTERNET COMPUTING, 2016, 20 (05) : 38 - 45
  • [45] Securing the Internet of Drones Against Cyber-Physical Attacks
    Lv Z.
    Li Y.
    Wu J.
    Lv H.
    Lv, Zhihan (lvzhihan@gmail.com), 1600, Institute of Electrical and Electronics Engineers Inc. (04): : 74 - 78
  • [46] RUNTIME INTEGRITY FOR CYBER-PHYSICAL INFRASTRUCTURES
    Jenkins, Jonathan
    Burmester, Mike
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 153 - 167
  • [47] A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems
    Farraj, Abdallah
    Hammad, Eman
    Al Daoud, Ashraf
    Kundur, Deepa
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) : 1846 - 1855
  • [48] A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
    Orojloo, Named
    Azgomi, Mohammad Abdollahi
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2018, 26 (04) : 929 - 965
  • [49] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [50] Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model
    Tian, Wen
    Ji, Xiaopeng
    Liu, Weiwei
    Liu, Guangjie
    Lin, Rong
    Zhai, Jiangtao
    Dai, Yuewei
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (01): : 193 - 211