Optimal Secret Protections in Discrete-Event Systems

被引:14
作者
Ma, Ziyue [1 ]
Cai, Kai [2 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Peoples R China
[2] Osaka City Univ, Dept Elect & Informat Engn, Osaka 5588585, Japan
基金
日本学术振兴会; 中国国家自然科学基金;
关键词
Security; Automata; Law; Supervisory control; Password; Discrete-event systems; Cyber-physical systems; cyber-physical systems; discrete-event systems; secret protection; security; SUPERVISORY CONTROL; INTRUSION DETECTION; OPACITY; ENFORCEMENT; ATTACKS;
D O I
10.1109/TAC.2021.3091438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we study a security problem of protecting secrets in discrete-event systems modeled by deterministic finite automata. In the system, some states are defined as secrets, each of which is associated with a security level. The problem is to design an event-protecting policy such that any event sequence from the initial state that reaches a secret state contains a number of protected events no less than the required level of security. To solve this secret securing problem, we first develop a layered structure called the security automaton. Then, we show that the problem is transformed to a supervisory control problem in the security automaton. We consider two criteria of optimality on protecting policies: 1) disruptiveness, i.e., protecting policies with a minimum degree of disturbance to legal users' normal operations; and 2) cost, i.e., protecting policies with a minimal cost. For the optimality on disruptiveness, we prove that a minimally disruptive protecting policy is obtained by using the classical supervisory control theory in the security automaton. For the optimality on cost, we develop a method to obtain a protecting policy with minimal cost by finding a min-cut in the security automaton.
引用
收藏
页码:2816 / 2828
页数:13
相关论文
共 30 条
[1]  
Agarwal M, 2019, IEEE SYS MAN CYBERN, P1813, DOI 10.1109/SMC.2019.8914062
[2]   Opacity generalised to transition systems [J].
Bryans, Jeremy W. ;
Koutny, Maciej ;
Mazare, Laurent ;
Ryan, Peter Y. A. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (06) :421-435
[3]  
Cai K., 2020, Encyclopedia of Systems and Control, V2nd
[4]   Detection and mitigation of classes of attacks in supervisory control systems [J].
Carvalho, Lilian Kawakami ;
Wu, Yi-Chin ;
Kwong, Raymond ;
Lafortune, Stephane .
AUTOMATICA, 2018, 97 :121-133
[5]   Supervisory Control for Opacity [J].
Dubreil, Jeremy ;
Darondeau, Philippe ;
Marchand, Herve .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2010, 55 (05) :1089-1100
[6]   THEORETICAL IMPROVEMENTS IN ALGORITHMIC EFFICIENCY FOR NETWORK FLOW PROBLEMS [J].
EDMONDS, J ;
KARP, RM .
JOURNAL OF THE ACM, 1972, 19 (02) :248-&
[7]   Modeling and detection of cyber attacks on discrete event systems [J].
Fritz, Raphael ;
Zhang, Ping .
IFAC PAPERSONLINE, 2018, 51 (07) :285-290
[8]  
Gao C, 2019, IEEE SYS MAN CYBERN, P2352, DOI 10.1109/SMC.2019.8914035
[9]  
Goldberg Andrew V., 1986, Proceedings of the eighteenth annual ACM symposium on Theory of computing, STOC' 86, P136, DOI [10.1145/12130.12144, DOI 10.1145/12130.12144]
[10]   A Survey of Attack and Defense Techniques for Reputation Systems [J].
Hoffman, Kevin ;
Zage, David ;
Nita-Rotaru, Cristina .
ACM COMPUTING SURVEYS, 2009, 42 (01)