BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks

被引:0
|
作者
Guirguis, Mina [1 ]
Tahsini, Alireza [1 ]
Siddique, Khan [2 ]
Novoa, Clara [2 ]
Moore, Justin [1 ]
Julien, Christine [3 ]
Dunstatter, Noah [1 ]
机构
[1] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
[2] Texas State Univ, Ingram Sch Engn, San Marcos, TX USA
[3] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
NETWORKED CONTROL-SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing Cyber-Physical Systems (CPS) against cyber-attacks is challenging due to the wide range of possible attacks - from stealthy ones that seek to manipulate/drop/delay control and measurement signals to malware that infects host machines that control the physical process. This has prompted the research community to address this problem through developing targeted methods that protect and check the run-time operation of the CPS. Since protecting signals and checking for errors result in performance penalties, they must be performed within the delay bounds dictated by the control loop. Due to the large number of potential checks that can be performed, coupled with various degrees of their effectiveness to detect a wide range of attacks, strategic assignment of these checks in the control loop is a critical endeavor. To that end, this paper presents a coherent runtime framework - which we coin BLOC - for orchestrating the CPS with check blocks to secure them against cyber attacks. BLOC capitalizes on game theoretical techniques to enable the defender to find an optimal randomized use of check blocks to secure the CPS while respecting the control-loop constraints. We develop a Stackelberg game model for stateless blocks and a Markov game model for stateful ones and derive optimal policies that minimize the worst-case damage from rational adversaries. We validate our models through extensive simulations as well as a real implementation for a HVAC system.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [2] Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis
    Li, Yuzhe
    Yang, Yake
    Chai, Tianyou
    Chen, Tongwen
    [J]. AUTOMATICA, 2022, 144
  • [3] Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
    Rao, Nageswara S. V.
    Poole, Stephen W.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    [J]. RISK ANALYSIS, 2016, 36 (04) : 694 - 710
  • [4] A Game-Theoretic Two-Stage Stochastic Programing Model to Protect CPS against Attacks
    Novoa, Clara
    Siddique, Khan
    Guirguis, Mina
    Tahsini, Alireza
    [J]. 2018 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2018, : 15 - 22
  • [5] A Game-Theoretic Approach to EDCA Remapping Attacks
    Szott, Szymon
    Konorski, Jerzy
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [6] A Game-Theoretic Approach for Defending Cyber-Physical Systems From Observability Attacks
    Maccarone, Lee T.
    Cole, Daniel G.
    [J]. ASCE-ASME JOURNAL OF RISK AND UNCERTAINTY IN ENGINEERING SYSTEMS PART B-MECHANICAL ENGINEERING, 2020, 6 (02):
  • [7] A Game-Theoretic Control Approach to Mitigate Cyber Switching Attacks in Smart Grid Systems
    Farraj, Abdallah K.
    Hammad, Eman M.
    Al Daoud, Ashraf
    Kundur, Deepa
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 958 - 963
  • [8] Smart Meter Data Aggregation Against Wireless Attacks: A Game-Theoretic Approach
    Cao, Yang
    Duan, Dongliang
    Yang, Liuqing
    Sun, Zhi
    Zhang, Haochuan
    Yu, Rong
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 80 - 85
  • [9] Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 44 - 58
  • [10] Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
    Li, Yuzhe
    Shi, Ling
    Cheng, Peng
    Chen, Jiming
    Quevedo, Daniel E.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) : 2831 - 2836