A game-theoretic approach to model and quantify the security of cyber-physical systems

被引:46
作者
Orojloo, Hamed [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Trustworthy Comp Lab, Tehran, Iran
关键词
Cyber-physical system (CPS); Security modeling; Security evaluation; Game theory; ATTACKS;
D O I
10.1016/j.compind.2017.03.007
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The security of cyber-physical systems (CPSs) has become an active research area in recent years. The goal of attackers in these systems is often disrupting physical processes. However, breaking into a CPS is not the same as disrupting its physical process. To achieve the desired physical disruptions, an attacker needs to deep understanding about the failure conditions of the system, its control principles, and signal processing. For a better evaluation of the security of these systems, considering these issues is necessary. This paper presents a modeling approach to evaluate the security of CPSs. In the proposed model, the system moves discretely between different states, and in each state, the system evolves continuously according to a system of ordinary differential equations. The security modeling process of CPSs is divided into two phases of intrusion and disruption. In each phase, a game-theoretic paradigm with different parameters predicts the interactions between the attacker and the system. By solving the model, the security of CPSs is estimated in terms of metrics, such as mean-time-to-system shutdown and availability. Finally, the security of a chemical plant is investigated as an illustrative example. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:44 / 57
页数:14
相关论文
共 28 条
[1]   A stochastic model of attack process for the evaluation of security metrics [J].
Almasizadeh, Jaafar ;
Azgomi, Mohammad Abdollahi .
COMPUTER NETWORKS, 2013, 57 (10) :2159-2180
[2]  
[Anonymous], 2001, Probability and statistics with reliability, queueing, and computer science applications
[3]  
[Anonymous], 2011, Real-Time Systems: Design Principles for Distributed Embedded Applications
[4]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[5]  
[Anonymous], 1989, P 3 INT WORKSH PETR
[6]   Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems [J].
Backhaus, Scott ;
Bent, Russell ;
Bono, James ;
Lee, Ritchie ;
Tracey, Brendan ;
Wolpert, David ;
Xie, Dongping ;
Yildiz, Yildiray .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (04) :2320-2327
[7]   Systems engineering framework for cyber physical security and resilience [J].
DiMase D. ;
Collier Z.A. ;
Heffner K. ;
Linkov I. .
Environment Systems and Decisions, 2015, 35 (2) :291-300
[8]   A modeling framework for the resilience analysis of networked systems-of-systems based on functional dependencies [J].
Filippini, Roberto ;
Silva, Andres .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2014, 125 :82-91
[9]  
Gollmann D, 2015, P CPSS 2015, P1, DOI DOI 10.1145/2732198.2732208
[10]   Robust Cyber-Physical Systems: Concept, models, and implementation [J].
Hu, Fei ;
Lu, Yu ;
Vasilakos, Athanasios V. ;
Hao, Qi ;
Ma, Rui ;
Patil, Yogendra ;
Zhang, Ting ;
Lu, Jiang ;
Li, Xin ;
Xiong, Neal N. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :449-475