Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Abstract
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general,more »
- Authors:
-
- Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Computer Science and Mathematics Division
- Advanced Digital Sciences Center (ADSC), Fusionopolis (Singapore)
- Texas A&M Univ.-Kingsville, Kingsville TX (United States). Dept. of Mechanical and Industrial Engineering
- State University of New York, Buffalo, NY (United States). Dept. of Industrial and Systems Engineering
- Singapore University of Technology and Design (Singapore). Dept. of Computer Science
- Publication Date:
- Research Org.:
- Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
- Sponsoring Org.:
- Work for Others (WFO); USDOE Office of Science (SC); USDOD
- OSTI Identifier:
- 1327573
- Alternate Identifier(s):
- OSTI ID: 1401132
- Grant/Contract Number:
- AC05-00OR22725
- Resource Type:
- Accepted Manuscript
- Journal Name:
- Risk Analysis
- Additional Journal Information:
- Journal Volume: 36; Journal Issue: 4; Journal ID: ISSN 0272-4332
- Publisher:
- Wiley
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; cyber-physical systems; game theory; infrastructure resilience
Citation Formats
Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, and Yau, David K. Y. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models. United States: N. p., 2015.
Web. doi:10.1111/risa.12362.
Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, & Yau, David K. Y. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models. United States. https://doi.org/10.1111/risa.12362
Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, and Yau, David K. Y. Mon .
"Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models". United States. https://doi.org/10.1111/risa.12362. https://www.osti.gov/servlets/purl/1327573.
@article{osti_1327573,
title = {Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models},
author = {Rao, Nageswara S. V. and Poole, Stephen W. and Ma, Chris Y. T. and He, Fei and Zhuang, Jun and Yau, David K. Y.},
abstractNote = {The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.},
doi = {10.1111/risa.12362},
journal = {Risk Analysis},
number = 4,
volume = 36,
place = {United States},
year = {Mon Apr 06 00:00:00 EDT 2015},
month = {Mon Apr 06 00:00:00 EDT 2015}
}
Web of Science
Works referenced in this record:
Robust Allocation of a Defensive Budget Considering an Attacker's Private Information: Robust Allocation of a Defensive Budget
journal, November 2011
- Nikoofal, Mohammad E.; Zhuang, Jun
- Risk Analysis, Vol. 32, Issue 5
Algorithmic Game Theory
book, September 2007
- Nisan, Noam; Roughgarden, Tim; Tardos, Eva
- Cambridge University Press
Critical infrastructure protection under imperfect attacker perception
journal, May 2010
- Jenelius, Erik; Westin, Jonas; Holmgren, Åke J.
- International Journal of Critical Infrastructure Protection, Vol. 3, Issue 1
Reasons for Secrecy and Deception in Homeland-Security Resource Allocation: Perspective
journal, July 2010
- Zhuang, Jun; Bier, Vicki M.
- Risk Analysis, Vol. 30, Issue 12
Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N -Player Game with Errors
journal, May 2010
- Zhuang, Jun
- The Engineering Economist, Vol. 55, Issue 2
Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker: Cost of Equity in Homeland Security Resource Allocation
journal, December 2012
- Shan, Xiaojun; Zhuang, Jun
- Risk Analysis, Vol. 33, Issue 6
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game
journal, July 2013
- Shan, Xiaojun; Zhuang, Jun
- European Journal of Operational Research, Vol. 228, Issue 1
Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
journal, October 2007
- Zhuang, Jun; Bier, Vicki M.
- Operations Research, Vol. 55, Issue 5
A Differential Game Related to Terrorism: Nash and Stackelberg Strategies
journal, January 2010
- Novak, A. J.; Feichtinger, G.; Leitmann, G.
- Journal of Optimization Theory and Applications, Vol. 144, Issue 3
Cyber Physical Systems: Design Challenges
conference, May 2008
- Lee, Edward A.
- 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC)
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
journal, July 2010
- Ten, Chee-Wooi; Manimaran, Govindarasu; Liu, Chen-Ching
- IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 40, Issue 4
A survey on networking games in telecommunications
journal, February 2006
- Altman, E.; Boulogne, T.; El-Azouzi, R.
- Computers & Operations Research, Vol. 33, Issue 2
Secrecy and Deception at Equilibrium, with Applications to Anti‐Terrorism Resource Allocation
journal, October 2010
- Zhuang, Jun; Bier, Vicki M.
- Defence and Peace Economics, Vol. 22, Issue 1
Modelling ‘contracts’ between a terrorist group and a government in a sequential game
journal, June 2012
- He, F.; Zhuang, J.
- Journal of the Operational Research Society, Vol. 63, Issue 6
Subsidies in Interdependent Security With Heterogeneous Discount Rates
journal, March 2007
- Zhuang, Jun; Bier, Vicki M.; Gupta, Ashish
- The Engineering Economist, Vol. 52, Issue 1
Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games
journal, September 2013
- Jose, Victor Richmond R.; Zhuang, Jun
- Military Operations Research, Vol. 18, Issue 3
Game strategies in network security
journal, February 2005
- Lye, Kong-wei; Wing, Jeannette M.
- International Journal of Information Security, Vol. 4, Issue 1-2
From wireless sensor networks towards cyber physical systems
journal, August 2011
- Wu, Fang-Jing; Kao, Yu-Fen; Tseng, Yu-Chee
- Pervasive and Mobile Computing, Vol. 7, Issue 4
Dynamic Game Theoretic Model of Multi-Layer Infrastructure Networks
journal, June 2005
- Zhang, Pengcheng; Peeta, Srinivas; Friesz, Terry
- Networks and Spatial Economics, Vol. 5, Issue 2
Modeling secrecy and deception in a multiple-period attacker–defender signaling game
journal, June 2010
- Zhuang, Jun; Bier, Vicki M.; Alagoz, Oguzhan
- European Journal of Operational Research, Vol. 203, Issue 2
Game-theoretic resilience analysis of Cyber-Physical Systems
conference, August 2013
- He, Fei; Zhuang, Jun; Rao, Nageswara S. V.
- 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)
Geometric considerations distribution of sensors in ad-hoc sensor networks
conference, May 2007
- Brown, Ted; Sarioz, Deniz; Bar-Noy, Amotz
- Defense and Security Symposium, SPIE Proceedings
The Complexity of Finding Nash Equilibria
book, September 2007
- Papadimitriou, Christos H.
- Algorithmic Game Theory
Works referencing / citing this record:
Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures
journal, July 2018
- Rao, Nageswara; Ma, Chris; He, Fei
- Games, Vol. 9, Issue 3
A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
journal, February 2018
- Orojloo, Hamed; Azgomi, Mohammad Abdollahi
- Journal of Network and Systems Management, Vol. 26, Issue 4
Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts: Deterrence and Risk Preferences in Sequential Attacker-Defender Games
journal, March 2017
- Payyappalli, Vineet M.; Zhuang, Jun; Jose, Victor Richmond R.
- Risk Analysis, Vol. 37, Issue 11
Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes
journal, October 2018
- Levitin, Gregory; Xing, Liudong; Huang, Hong‐Zhong
- Risk Analysis, Vol. 39, Issue 4
Interdependent Network Recovery Games
journal, October 2017
- Smith, Andrew M.; González, Andrés D.; Dueñas‐Osorio, Leonardo
- Risk Analysis, Vol. 40, Issue 1
Security Events and Vulnerability Data for Cybersecurity Risk Estimation: Cybersecurity Risk Estimation
journal, August 2017
- Allodi, Luca; Massacci, Fabio
- Risk Analysis, Vol. 37, Issue 8
Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas
journal, March 2018
- Kim, Meejoung
- Wireless Networks, Vol. 25, Issue 6
Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber‐Physical Attacks on Electricity Distribution Infrastructure Networks
journal, February 2019
- Oughton, Edward J.; Ralph, Daniel; Pant, Raghav
- Risk Analysis, Vol. 39, Issue 9
Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems
journal, April 2019
- Tian, Wen; Ji, Xiao‐Peng; Liu, Weiwei
- ETRI Journal, Vol. 41, Issue 5
Risk and the Five Hard Problems of Cybersecurity
journal, March 2019
- Scala, Natalie M.; Reilly, Allison C.; Goethals, Paul L.
- Risk Analysis, Vol. 39, Issue 10
Stochastic counterfactual risk analysis for the vulnerability assessment of cyber-physical attacks on electricity distribution infrastructure networks
text, January 2019
- Oughton, Edward; Ralph, Daniel; Pant, R.
- Apollo - University of Cambridge Repository