Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

被引:47
|
作者
Rao, Nageswara S. V. [1 ]
Poole, Stephen W. [1 ]
Ma, Chris Y. T. [2 ]
He, Fei [3 ]
Zhuang, Jun [4 ]
Yau, David K. Y. [5 ]
机构
[1] Oak Ridge Natl Lab, Div Math & Comp Sci, Oak Ridge, TN 37831 USA
[2] Adv Digital Sci Ctr, Singapore, Singapore
[3] Texas A&M Univ, Dept Mech & Ind Engn, Kingsville, TX USA
[4] SUNY Buffalo, Dept Ind & Syst Engn, Buffalo, NY USA
[5] Singapore Univ Technol & Design, Dept Comp Sci, Singapore, Singapore
关键词
Cyber infrastructures; cyber-physical networks; game theory; SECURITY; EQUILIBRIUM; DECEPTION; TERRORISM; SECRECY; FACE;
D O I
10.1111/risa.12362
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.
引用
收藏
页码:694 / 710
页数:17
相关论文
共 50 条
  • [31] Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks
    Lai, Rong
    Qiu, Xiaoyu
    Wu, Jiajing
    IEEE ACCESS, 2019, 7 : 61342 - 61352
  • [32] Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks
    Wang, Yinan
    Yan, Gangfeng
    Zheng, Ronghao
    APPLIED SCIENCES-BASEL, 2018, 8 (05):
  • [33] Secure framework against cyber attacks on cyber-physical robotic systems
    Bhardwaj, Akashdeep
    Alshehri, Mohammad Dahman
    Kaushik, Keshav
    Alyamani, Hasan J.
    Kumar, Manoj
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
  • [34] Coordinated cyber-physical attacks of cyber-physical power system
    Yang Y.
    Lan S.
    Qin Z.
    Liu H.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2020, 40 (02): : 97 - 102
  • [35] Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling
    Ntalampiras, Stavros
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (01) : 104 - 111
  • [36] Stabilization of Linear Cyber-Physical Systems Against Attacks via Switching Defense
    Liu, Shenyu
    Martinez, Sonia
    Cortes, Jorge
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (12) : 7326 - 7341
  • [37] Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability
    Qu, Zhengwei
    Shi, Hualiang
    Wang, Yunjing
    Yin, Guiliang
    Abu-Siada, Ahmed
    PROCESSES, 2022, 10 (07)
  • [38] A game-theoretic approach of cyberattack resilient constraint-following control for cyber-physical systems
    Zhang, Xinrong
    Chen, Ye-Hwa
    Zhang, Dongsheng
    Zhao, Ruiying
    Guo, Lei
    AD HOC NETWORKS, 2024, 153
  • [39] A game-theoretic approach for ensuring trustworthiness in cyber-physical systems with applications to multiloop UAV control
    Jithish, J.
    Sankaran, Sriram
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [40] Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
    Kwon, Cheolhyeon
    Hwang, Inseok
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2272 - 2279