A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure

被引:7
|
作者
Ravishankar, Monica [1 ]
Rao, D. Vijay [2 ]
Kumar, C. R. S. [1 ]
机构
[1] DRDO Def Inst Adv Technol, Pune 411025, Maharashtra, India
[2] DRDO Inst Syst Studies & Anal, Delhi 110054, India
关键词
Critical infrastructure; Game theory; Belief functions; Negotiations; Cyber war-games testbed;
D O I
10.14429/dsj.68.11402
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
National critical infrastructures are vital to the functioning of modern societies and economies. The dependence on these infrastructures is so succinct that their incapacitation or destruction has a debilitating and cascading effect on national security. Critical infrastructure sectors ranging from financial services to power and transportation to communications and health care, all depend on massive information communication technology networks. Cyberspace is composed of numerous interconnected computers, servers and databases that hold critical data and allow critical infrastructures to function. Securing critical data in a cyberspace that holds against growing and evolving cyber threats is an important focus area for most countries across the world. A novel approach is proposed to assess the vulnerabilities of own networks against adversarial attackers, where the adversary's perception of strengths and vulnerabilities are modelled using game theoretic techniques. The proposed game theoretic framework models the uncertainties of information with the players (attackers and defenders) in terms of their information sets and their behaviour is modelled and assessed using a probability and belief function framework. The attack-defence scenarios are exercised on a virtual cyber warfare test-bed to assess and evaluate vulnerability of cyber systems. Optimal strategies for attack and defence are computed for the players which are validated using simulation experiments on the cyber war-games testbed, the results of which are used for security analyses.
引用
收藏
页码:54 / 63
页数:10
相关论文
共 50 条
  • [31] Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach
    Sokri, Abderrahmane
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 283 - 288
  • [32] Infrastructure Resilience Using Cyber-Physical Game-Theoretic Approach
    Rao, Nageswara S., V
    Poole, Steve W.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    [J]. 2013 6TH INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS), 2013, : 31 - 36
  • [33] Cyber-Physical Correlations for Infrastructure Resilience: A Game-Theoretic Approach
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    [J]. 2014 17TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2014,
  • [34] Analysis of resistive SFCL in a test-bed microgrid
    Khuntia, S. R.
    Samantaray, S. R.
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2015, 6 (03) : 883 - 892
  • [35] A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users
    Ryutov, Tatyana
    Orosz, Michael
    Blythe, James
    von Winterfeldt, Detlof
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 274 - 282
  • [36] Dependence Analysis based Cyber-Physical Security Assessment for Critical Infrastructure Networks
    Liu, Xiaoxue
    Zhang, Jiexin
    Zhu, Peidong
    [J]. 7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [37] Design of Hydraulic Test-bed Control System Based on Configuration Software
    Wang Qingzhu
    Zhao Jinchuan
    Lu Weina
    Liu Rongchang
    Zhang Lihong
    Ma Yuquan
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1-2, 2008, : 533 - 537
  • [38] The Monitoring Software Design of Performance Test-bed of Heat Pump Unit
    Feng Jianwen
    Wang Liping
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS II, PTS 1 AND 2, 2014, 475-476 : 192 - +
  • [39] Cyber security training for critical infrastructure protection: A literature review
    Chowdhury, Nabin
    Gkioulos, Vasileios
    [J]. COMPUTER SCIENCE REVIEW, 2021, 40