DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

Abstract

The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general,more » and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

Authors:
 [1];  [1];  [2];  [3];  [4];  [5]
  1. Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Computer Science and Mathematics Division
  2. Advanced Digital Sciences Center (ADSC), Fusionopolis (Singapore)
  3. Texas A&M Univ.-Kingsville, Kingsville TX (United States). Dept. of Mechanical and Industrial Engineering
  4. State University of New York, Buffalo, NY (United States). Dept. of Industrial and Systems Engineering
  5. Singapore University of Technology and Design (Singapore). Dept. of Computer Science
Publication Date:
Research Org.:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Org.:
Work for Others (WFO); USDOE Office of Science (SC); USDOD
OSTI Identifier:
1327573
Alternate Identifier(s):
OSTI ID: 1401132
Grant/Contract Number:  
AC05-00OR22725
Resource Type:
Accepted Manuscript
Journal Name:
Risk Analysis
Additional Journal Information:
Journal Volume: 36; Journal Issue: 4; Journal ID: ISSN 0272-4332
Publisher:
Wiley
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING; cyber-physical systems; game theory; infrastructure resilience

Citation Formats

Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, and Yau, David K. Y. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models. United States: N. p., 2015. Web. doi:10.1111/risa.12362.
Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, & Yau, David K. Y. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models. United States. https://doi.org/10.1111/risa.12362
Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, and Yau, David K. Y. Mon . "Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models". United States. https://doi.org/10.1111/risa.12362. https://www.osti.gov/servlets/purl/1327573.
@article{osti_1327573,
title = {Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models},
author = {Rao, Nageswara S. V. and Poole, Stephen W. and Ma, Chris Y. T. and He, Fei and Zhuang, Jun and Yau, David K. Y.},
abstractNote = {The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.},
doi = {10.1111/risa.12362},
journal = {Risk Analysis},
number = 4,
volume = 36,
place = {United States},
year = {Mon Apr 06 00:00:00 EDT 2015},
month = {Mon Apr 06 00:00:00 EDT 2015}
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record

Citation Metrics:
Cited by: 42 works
Citation information provided by
Web of Science

Save / Share:

Works referenced in this record:

Algorithmic Game Theory
book, September 2007


Critical infrastructure protection under imperfect attacker perception
journal, May 2010

  • Jenelius, Erik; Westin, Jonas; Holmgren, Åke J.
  • International Journal of Critical Infrastructure Protection, Vol. 3, Issue 1
  • DOI: 10.1016/j.ijcip.2009.10.002

Reasons for Secrecy and Deception in Homeland-Security Resource Allocation: Perspective
journal, July 2010


Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game
journal, July 2013


Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
journal, October 2007


A Differential Game Related to Terrorism: Nash and Stackelberg Strategies
journal, January 2010

  • Novak, A. J.; Feichtinger, G.; Leitmann, G.
  • Journal of Optimization Theory and Applications, Vol. 144, Issue 3
  • DOI: 10.1007/s10957-009-9643-z

Cyber Physical Systems: Design Challenges
conference, May 2008

  • Lee, Edward A.
  • 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC)
  • DOI: 10.1109/ISORC.2008.25

Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
journal, July 2010

  • Ten, Chee-Wooi; Manimaran, Govindarasu; Liu, Chen-Ching
  • IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 40, Issue 4
  • DOI: 10.1109/TSMCA.2010.2048028

A survey on networking games in telecommunications
journal, February 2006


Secrecy and Deception at Equilibrium, with Applications to Anti‐Terrorism Resource Allocation
journal, October 2010


Modelling ‘contracts’ between a terrorist group and a government in a sequential game
journal, June 2012

  • He, F.; Zhuang, J.
  • Journal of the Operational Research Society, Vol. 63, Issue 6
  • DOI: 10.1057/jors.2011.49

Subsidies in Interdependent Security With Heterogeneous Discount Rates
journal, March 2007


Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games
journal, September 2013

  • Jose, Victor Richmond R.; Zhuang, Jun
  • Military Operations Research, Vol. 18, Issue 3
  • DOI: 10.5711/1082598318233

Game strategies in network security
journal, February 2005

  • Lye, Kong-wei; Wing, Jeannette M.
  • International Journal of Information Security, Vol. 4, Issue 1-2
  • DOI: 10.1007/s10207-004-0060-x

From wireless sensor networks towards cyber physical systems
journal, August 2011


Dynamic Game Theoretic Model of Multi-Layer Infrastructure Networks
journal, June 2005

  • Zhang, Pengcheng; Peeta, Srinivas; Friesz, Terry
  • Networks and Spatial Economics, Vol. 5, Issue 2
  • DOI: 10.1007/s11067-005-2627-0

Modeling secrecy and deception in a multiple-period attacker–defender signaling game
journal, June 2010

  • Zhuang, Jun; Bier, Vicki M.; Alagoz, Oguzhan
  • European Journal of Operational Research, Vol. 203, Issue 2
  • DOI: 10.1016/j.ejor.2009.07.028

Game-theoretic resilience analysis of Cyber-Physical Systems
conference, August 2013

  • He, Fei; Zhuang, Jun; Rao, Nageswara S. V.
  • 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)
  • DOI: 10.1109/CPSNA.2013.6614252

Geometric considerations distribution of sensors in ad-hoc sensor networks
conference, May 2007

  • Brown, Ted; Sarioz, Deniz; Bar-Noy, Amotz
  • Defense and Security Symposium, SPIE Proceedings
  • DOI: 10.1117/12.723534

The Complexity of Finding Nash Equilibria
book, September 2007


Works referencing / citing this record:

Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures
journal, July 2018

  • Rao, Nageswara; Ma, Chris; He, Fei
  • Games, Vol. 9, Issue 3
  • DOI: 10.3390/g9030052

A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
journal, February 2018

  • Orojloo, Hamed; Azgomi, Mohammad Abdollahi
  • Journal of Network and Systems Management, Vol. 26, Issue 4
  • DOI: 10.1007/s10922-018-9449-0

Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts: Deterrence and Risk Preferences in Sequential Attacker-Defender Games
journal, March 2017

  • Payyappalli, Vineet M.; Zhuang, Jun; Jose, Victor Richmond R.
  • Risk Analysis, Vol. 37, Issue 11
  • DOI: 10.1111/risa.12768

Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes
journal, October 2018

  • Levitin, Gregory; Xing, Liudong; Huang, Hong‐Zhong
  • Risk Analysis, Vol. 39, Issue 4
  • DOI: 10.1111/risa.13219

Interdependent Network Recovery Games
journal, October 2017

  • Smith, Andrew M.; González, Andrés D.; Dueñas‐Osorio, Leonardo
  • Risk Analysis, Vol. 40, Issue 1
  • DOI: 10.1111/risa.12923

Security Events and Vulnerability Data for Cybersecurity Risk Estimation: Cybersecurity Risk Estimation
journal, August 2017


Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems
journal, April 2019


Risk and the Five Hard Problems of Cybersecurity
journal, March 2019

  • Scala, Natalie M.; Reilly, Allison C.; Goethals, Paul L.
  • Risk Analysis, Vol. 39, Issue 10
  • DOI: 10.1111/risa.13309

Stochastic counterfactual risk analysis for the vulnerability assessment of cyber-physical attacks on electricity distribution infrastructure networks
text, January 2019

  • Oughton, Edward; Ralph, Daniel; Pant, R.
  • Apollo - University of Cambridge Repository
  • DOI: 10.17863/cam.36950