Optimal Secret Protections in Discrete-Event Systems

被引:12
作者
Ma, Ziyue [1 ]
Cai, Kai [2 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Peoples R China
[2] Osaka City Univ, Dept Elect & Informat Engn, Osaka 5588585, Japan
基金
中国国家自然科学基金; 日本学术振兴会;
关键词
Security; Automata; Law; Supervisory control; Password; Discrete-event systems; Cyber-physical systems; cyber-physical systems; discrete-event systems; secret protection; security; SUPERVISORY CONTROL; INTRUSION DETECTION; OPACITY; ENFORCEMENT; ATTACKS;
D O I
10.1109/TAC.2021.3091438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we study a security problem of protecting secrets in discrete-event systems modeled by deterministic finite automata. In the system, some states are defined as secrets, each of which is associated with a security level. The problem is to design an event-protecting policy such that any event sequence from the initial state that reaches a secret state contains a number of protected events no less than the required level of security. To solve this secret securing problem, we first develop a layered structure called the security automaton. Then, we show that the problem is transformed to a supervisory control problem in the security automaton. We consider two criteria of optimality on protecting policies: 1) disruptiveness, i.e., protecting policies with a minimum degree of disturbance to legal users' normal operations; and 2) cost, i.e., protecting policies with a minimal cost. For the optimality on disruptiveness, we prove that a minimally disruptive protecting policy is obtained by using the classical supervisory control theory in the security automaton. For the optimality on cost, we develop a method to obtain a protecting policy with minimal cost by finding a min-cut in the security automaton.
引用
收藏
页码:2816 / 2828
页数:13
相关论文
共 30 条
  • [1] Agarwal M, 2019, IEEE SYS MAN CYBERN, P1813, DOI 10.1109/SMC.2019.8914062
  • [2] Opacity generalised to transition systems
    Bryans, Jeremy W.
    Koutny, Maciej
    Mazare, Laurent
    Ryan, Peter Y. A.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (06) : 421 - 435
  • [3] Cai K., 2020, ENCY SYSTEMS CONTROL
  • [4] Detection and mitigation of classes of attacks in supervisory control systems
    Carvalho, Lilian Kawakami
    Wu, Yi-Chin
    Kwong, Raymond
    Lafortune, Stephane
    [J]. AUTOMATICA, 2018, 97 : 121 - 133
  • [5] Supervisory Control for Opacity
    Dubreil, Jeremy
    Darondeau, Philippe
    Marchand, Herve
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2010, 55 (05) : 1089 - 1100
  • [6] THEORETICAL IMPROVEMENTS IN ALGORITHMIC EFFICIENCY FOR NETWORK FLOW PROBLEMS
    EDMONDS, J
    KARP, RM
    [J]. JOURNAL OF THE ACM, 1972, 19 (02) : 248 - &
  • [7] Modeling and detection of cyber attacks on discrete event systems
    Fritz, Raphael
    Zhang, Ping
    [J]. IFAC PAPERSONLINE, 2018, 51 (07): : 285 - 290
  • [8] Gao C, 2019, IEEE SYS MAN CYBERN, P2352, DOI 10.1109/SMC.2019.8914035
  • [9] Goldberg A. V., 1986, P 18 ANN ACM S THEOR, V'86, P136, DOI [DOI 10.1145/12130.12144, 10.1145/12130.12144]
  • [10] A Survey of Attack and Defense Techniques for Reputation Systems
    Hoffman, Kevin
    Zage, David
    Nita-Rotaru, Cristina
    [J]. ACM COMPUTING SURVEYS, 2009, 42 (01)