Literature DB >> 25847370

Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

Nageswara S V Rao1, Stephen W Poole1, Chris Y T Ma2, Fei He3, Jun Zhuang4, David K Y Yau5.   

Abstract

The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.
© 2015 Society for Risk Analysis.

Keywords:  Cyber infrastructures; cyber-physical networks; game theory

Mesh:

Year:  2015        PMID: 25847370     DOI: 10.1111/risa.12362

Source DB:  PubMed          Journal:  Risk Anal        ISSN: 0272-4332            Impact factor:   4.000


  4 in total

1.  Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.

Authors:  Edward J Oughton; Daniel Ralph; Raghav Pant; Eireann Leverett; Jennifer Copic; Scott Thacker; Rabia Dada; Simon Ruffle; Michelle Tuveson; Jim W Hall
Journal:  Risk Anal       Date:  2019-02-27       Impact factor: 4.000

2.  An Adversarial Risk Analysis Framework for Cybersecurity.

Authors:  David Rios Insua; Aitor Couce-Vieira; Jose A Rubio; Wolter Pieters; Katsiaryna Labunets; Daniel G Rasines
Journal:  Risk Anal       Date:  2019-06-10       Impact factor: 4.000

Review 3.  Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

Authors:  Mohamed S Abdalzaher; Karim Seddik; Maha Elsabrouty; Osamu Muta; Hiroshi Furukawa; Adel Abdel-Rahman
Journal:  Sensors (Basel)       Date:  2016-06-29       Impact factor: 3.576

4.  The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.

Authors:  Luca Allodi; Fabio Massacci; Julian Williams
Journal:  Risk Anal       Date:  2021-05-07       Impact factor: 4.302

  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.