Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework

被引:4
作者
Xiao, Kaiming [1 ]
Zhu, Cheng [1 ]
Xie, Junjie [1 ]
Zhou, Yun [1 ]
Zhu, Xianqiang [1 ]
Zhang, Weiming [1 ]
机构
[1] Natl Univ Def Technol, Sci & Technol Informat Syst Engn Lab, Changsha 410073, Peoples R China
基金
中国国家自然科学基金;
关键词
cyber-physical systems; stealth malware propagation; Stackelberg game; network interdiction; dynamic defense; ATTACKS; NETWORK; INTERDICTION; INFRASTRUCTURE;
D O I
10.3390/e22080894
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Stealth malware is a representative tool of advanced persistent threat (APT) attacks, which poses an increased threat to cyber-physical systems (CPS) today. Due to the use of stealthy and evasive techniques, stealth malwares usually render conventional heavy-weight countermeasures inapplicable. Light-weight countermeasures, on the other hand, can help retard the spread of stealth malwares, but the ensuing side effects might violate the primary safety requirement of CPS. Hence, defenders need to find a balance between the gain and loss of deploying light-weight countermeasures, which normally is a challenging task. To address this challenge, we model the persistent anti-malware process as a shortest-path tree interdiction (SPTI) Stackelberg game with both static version (SSPTI) and multi-stage dynamic version (DSPTI), and safety requirements of CPS are introduced as constraints in the defender's decision model. The attacker aims to stealthily penetrate the CPS at the lowest cost (e.g., time, effort) by selecting optimal network links to spread, while the defender aims to retard the malware epidemic as much as possible. Both games are modeled as bi-level integer programs and proved to be NP-hard. We then develop a Benders decomposition algorithm to achieve the Stackelberg equilibrium of SSPTI, and design a Model Predictive Control strategy to solve DSPTI approximately by sequentially solving an1+delta approximation of SSPTI. Extensive experiments have been conducted by comparing proposed algorithms and strategies with existing ones on both static and dynamic performance metrics. The evaluation results demonstrate the efficiency of proposed algorithms and strategies on both simulated and real-case-based CPS networks. Furthermore, the proposed dynamic defense framework shows its advantage of achieving a balance between fail-secure ability and fail-safe ability while retarding the stealth malware propagation in CPS.
引用
收藏
页数:26
相关论文
共 57 条
[1]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[2]  
Barbosa R.R., 2012, Passive and Active Measurement, P126
[3]  
Barbosa R.R. R., 2014, ANOMALY DETECTION SC
[4]   Shortest path network interdiction with asymmetric information [J].
Bayrak, Halil ;
Bailey, Matthew D. .
NETWORKS, 2008, 52 (03) :133-140
[5]   The Cousins of Stuxnet: Duqu, Flame, and Gauss [J].
Bencsath, Boldizsar ;
Pek, Gabor ;
Buttyan, Levente ;
Felegyhazi, Mark .
FUTURE INTERNET, 2012, 4 (04) :971-1003
[6]   Optimal and robust epidemic response for multiple networks [J].
Bloem, Michael ;
Alpcan, Tansu ;
Basar, Tamer .
CONTROL ENGINEERING PRACTICE, 2009, 17 (05) :525-533
[7]   Sequential Interdiction with Incomplete Information and Learning [J].
Borrero, Juan S. ;
Prokopyev, Oleg A. ;
Saure, Denis .
OPERATIONS RESEARCH, 2019, 67 (01) :72-89
[8]   Catastrophic cascade of failures in interdependent networks [J].
Buldyrev, Sergey V. ;
Parshani, Roni ;
Paul, Gerald ;
Stanley, H. Eugene ;
Havlin, Shlomo .
NATURE, 2010, 464 (7291) :1025-1028
[9]  
Chen P, 2014, LECT NOTES COMPUT SC, V8735, P63, DOI 10.1007/978-3-662-44885-4_5
[10]  
Chun B.N., 2003, IRBTR03 INT CORP SAN, V33