Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework

被引:4
作者
Xiao, Kaiming [1 ]
Zhu, Cheng [1 ]
Xie, Junjie [1 ]
Zhou, Yun [1 ]
Zhu, Xianqiang [1 ]
Zhang, Weiming [1 ]
机构
[1] Natl Univ Def Technol, Sci & Technol Informat Syst Engn Lab, Changsha 410073, Peoples R China
基金
中国国家自然科学基金;
关键词
cyber-physical systems; stealth malware propagation; Stackelberg game; network interdiction; dynamic defense; ATTACKS; NETWORK; INTERDICTION; INFRASTRUCTURE;
D O I
10.3390/e22080894
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Stealth malware is a representative tool of advanced persistent threat (APT) attacks, which poses an increased threat to cyber-physical systems (CPS) today. Due to the use of stealthy and evasive techniques, stealth malwares usually render conventional heavy-weight countermeasures inapplicable. Light-weight countermeasures, on the other hand, can help retard the spread of stealth malwares, but the ensuing side effects might violate the primary safety requirement of CPS. Hence, defenders need to find a balance between the gain and loss of deploying light-weight countermeasures, which normally is a challenging task. To address this challenge, we model the persistent anti-malware process as a shortest-path tree interdiction (SPTI) Stackelberg game with both static version (SSPTI) and multi-stage dynamic version (DSPTI), and safety requirements of CPS are introduced as constraints in the defender's decision model. The attacker aims to stealthily penetrate the CPS at the lowest cost (e.g., time, effort) by selecting optimal network links to spread, while the defender aims to retard the malware epidemic as much as possible. Both games are modeled as bi-level integer programs and proved to be NP-hard. We then develop a Benders decomposition algorithm to achieve the Stackelberg equilibrium of SSPTI, and design a Model Predictive Control strategy to solve DSPTI approximately by sequentially solving an1+delta approximation of SSPTI. Extensive experiments have been conducted by comparing proposed algorithms and strategies with existing ones on both static and dynamic performance metrics. The evaluation results demonstrate the efficiency of proposed algorithms and strategies on both simulated and real-case-based CPS networks. Furthermore, the proposed dynamic defense framework shows its advantage of achieving a balance between fail-secure ability and fail-safe ability while retarding the stealth malware propagation in CPS.
引用
收藏
页数:26
相关论文
共 57 条
[31]   Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model [J].
Nandi, Apurba K. ;
Medal, Hugh R. ;
Vadlamani, Satish .
COMPUTERS & OPERATIONS RESEARCH, 2016, 75 :118-131
[32]   New dynamic algorithms for shortest path tree computation [J].
Narváez, P ;
Siu, KY ;
Tzeng, HY .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (06) :734-746
[33]   The structure and function of complex networks [J].
Newman, MEJ .
SIAM REVIEW, 2003, 45 (02) :167-256
[34]   Structure and tie strengths in mobile communication networks [J].
Onnela, J.-P. ;
Saramaki, J. ;
Hyvonen, J. ;
Szabo, G. ;
Lazer, D. ;
Kaski, K. ;
Kertesz, J. ;
Barabasi, A.-L. .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2007, 104 (18) :7332-7336
[35]   Cybersecurity games and investments: A decision support approach [J].
Panaousis, Emmanouil ;
Fielder, Andrew ;
Malacaria, Pasquale ;
Hankin, Chris ;
Smeraldi, Fabrizio .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8840 :266-286
[36]  
Parandehgheibi M, 2013, IEEE GLOB COMM CONF, P2164, DOI 10.1109/GLOCOM.2013.6831395
[37]  
Paré PE, 2015, IEEE DECIS CONTR P, P3554, DOI 10.1109/CDC.2015.7402769
[38]   Defending against terrorist attacks with limited resources [J].
Powell, Robert .
AMERICAN POLITICAL SCIENCE REVIEW, 2007, 101 (03) :527-541
[39]   A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation [J].
Pu, Cong ;
Lim, Sunho .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :834-842
[40]   A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions [J].
Rudd, Ethan M. ;
Rozsa, Andras ;
Gunther, Manuel ;
Boult, Terrance E. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1145-1172