BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks

被引:0
|
作者
Guirguis, Mina [1 ]
Tahsini, Alireza [1 ]
Siddique, Khan [2 ]
Novoa, Clara [2 ]
Moore, Justin [1 ]
Julien, Christine [3 ]
Dunstatter, Noah [1 ]
机构
[1] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
[2] Texas State Univ, Ingram Sch Engn, San Marcos, TX USA
[3] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
NETWORKED CONTROL-SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing Cyber-Physical Systems (CPS) against cyber-attacks is challenging due to the wide range of possible attacks - from stealthy ones that seek to manipulate/drop/delay control and measurement signals to malware that infects host machines that control the physical process. This has prompted the research community to address this problem through developing targeted methods that protect and check the run-time operation of the CPS. Since protecting signals and checking for errors result in performance penalties, they must be performed within the delay bounds dictated by the control loop. Due to the large number of potential checks that can be performed, coupled with various degrees of their effectiveness to detect a wide range of attacks, strategic assignment of these checks in the control loop is a critical endeavor. To that end, this paper presents a coherent runtime framework - which we coin BLOC - for orchestrating the CPS with check blocks to secure them against cyber attacks. BLOC capitalizes on game theoretical techniques to enable the defender to find an optimal randomized use of check blocks to secure the CPS while respecting the control-loop constraints. We develop a Stackelberg game model for stateless blocks and a Markov game model for stateful ones and derive optimal policies that minimize the worst-case damage from rational adversaries. We validate our models through extensive simulations as well as a real implementation for a HVAC system.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] A GAME-THEORETIC APPROACH TO NETWORK EQUILIBRIUM
    HAURIE, A
    MARCOTTE, P
    [J]. MATHEMATICAL PROGRAMMING STUDY, 1986, 26 : 252 - 255
  • [42] A game-theoretic approach to decision in FDI
    Darkhovski, B
    Staroswiecki, M
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2003, 48 (05) : 853 - 858
  • [43] A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks
    Mneimneh, Saad
    Bhunia, Suman
    Vazquez-Abad, Felisa
    Sengupta, Shamik
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 40 : 577 - 592
  • [44] A Game-Theoretic Approach to Graph Clustering
    Mandala, Supreet
    Kumara, Soundar
    Chatterjee, Kalyan
    [J]. INFORMS JOURNAL ON COMPUTING, 2014, 26 (03) : 629 - 643
  • [45] ALOHA networks: a game-theoretic approach
    Marban, Sebastian
    van de Ven, Peter
    Borm, Peter
    Hamers, Herbert
    [J]. MATHEMATICAL METHODS OF OPERATIONS RESEARCH, 2013, 78 (02) : 221 - 242
  • [46] Petty corruption: A game-theoretic approach
    Lambert-Mogiliansky, Ariane
    Majumdar, Mukul
    Radner, Roy
    [J]. INTERNATIONAL JOURNAL OF ECONOMIC THEORY, 2008, 4 (02) : 273 - 297
  • [47] Trading the Cloud: A Game-Theoretic Approach
    Zheng, Xianrong
    [J]. AMCIS 2020 PROCEEDINGS, 2020,
  • [48] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [49] The evolution of anisogamy: a game-theoretic approach
    Bulmer, MG
    Parker, GA
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2002, 269 (1507) : 2381 - 2388
  • [50] A Game-Theoretic Approach to Network Slicing
    Yang, Xu
    Liu, Yue
    Chou, Ka Seng
    Cuthbert, Laurie
    [J]. 2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 359 - 362