BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks

被引:0
|
作者
Guirguis, Mina [1 ]
Tahsini, Alireza [1 ]
Siddique, Khan [2 ]
Novoa, Clara [2 ]
Moore, Justin [1 ]
Julien, Christine [3 ]
Dunstatter, Noah [1 ]
机构
[1] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
[2] Texas State Univ, Ingram Sch Engn, San Marcos, TX USA
[3] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
NETWORKED CONTROL-SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing Cyber-Physical Systems (CPS) against cyber-attacks is challenging due to the wide range of possible attacks - from stealthy ones that seek to manipulate/drop/delay control and measurement signals to malware that infects host machines that control the physical process. This has prompted the research community to address this problem through developing targeted methods that protect and check the run-time operation of the CPS. Since protecting signals and checking for errors result in performance penalties, they must be performed within the delay bounds dictated by the control loop. Due to the large number of potential checks that can be performed, coupled with various degrees of their effectiveness to detect a wide range of attacks, strategic assignment of these checks in the control loop is a critical endeavor. To that end, this paper presents a coherent runtime framework - which we coin BLOC - for orchestrating the CPS with check blocks to secure them against cyber attacks. BLOC capitalizes on game theoretical techniques to enable the defender to find an optimal randomized use of check blocks to secure the CPS while respecting the control-loop constraints. We develop a Stackelberg game model for stateless blocks and a Markov game model for stateful ones and derive optimal policies that minimize the worst-case damage from rational adversaries. We validate our models through extensive simulations as well as a real implementation for a HVAC system.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    Pilz, M.
    Naeini, F. Baghaei
    Grammont, K.
    Smagghe, C.
    Davis, M.
    Nebel, J. -C.
    Al-Fagih, L.
    Pfluegel, E.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 427 - 443
  • [22] Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things
    Tsemogne, Olivier
    Hayel, Yezekael
    Kamhoua, Charles
    Deugoue, Gabriel
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2678 - 2687
  • [23] A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems
    Zhang, Lefeng
    Zhu, Tianqing
    Hussain, Farookh Khadeer
    Ye, Dayong
    Zhou, Wanlei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1349 - 1364
  • [24] Overbuilding: A game-theoretic approach
    Wang, K
    Zhou, YQ
    [J]. REAL ESTATE ECONOMICS, 2000, 28 (03) : 493 - 522
  • [25] Desuetudo: A Game-Theoretic Approach
    Faroldi, Federico L. G.
    [J]. ARCHIV FUR RECHTS- UND SOZIALPHILOSOPHIE, 2021, 107 (02): : 289 - 299
  • [26] Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis
    Wright, Mason
    Venkatesan, Sridhar
    Albanese, Massimiliano
    Wellman, Michael P.
    [J]. MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, : 93 - 104
  • [27] Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    [J]. 2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 78 - 83
  • [28] A game-theoretic defensive approach for forensic investigators against rootkits
    Hasanabadi, Saeed Shafiee
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 33
  • [29] A game-theoretic approach to model and quantify the security of cyber-physical systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    [J]. COMPUTERS IN INDUSTRY, 2017, 88 : 44 - 57
  • [30] Towards ensuring Trustworthiness in Cyber-Physical Systems: A Game-theoretic Approach
    Jithish, J.
    Sankaran, Sriram
    Achuthan, Krishnashree
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,