Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Metagames and Hypergames for Deception-Robust Control

Published: 26 March 2021 Publication History

Abstract

Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable to deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy attacks such as Stuxnet can be described as Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames and APTs to develop hypergame-based defender strategies that are robust to deception and do not rely on attack detection. These strategies provide provable bounds—and provably optimal bounds—on the attacker payoff. Strategies based on Bayesian priors do not provide such bounds. We then numerically demonstrate our approach on a building control subsystem and discuss next steps in extending this approach toward an operational capability.

References

[1]
Craig Bakker, Arnab Bhattacharya, Samrat Chatterjee, and Draguna L, Vrabie. 2019. Learning and information manipulation: Repeated hypergames for cyber-physical security. IEEE Control Systems Letters 4, 2 (2019), 295--300.
[2]
Craig Bakker, Arnab Bhattacharya, Samrat Chatterjee, and Draguna L. Vrabie. 2020. Hypergames and cyber-physical security for control systems. ACM Transactions on Cyber-Physical Systems 4, 4 (2020), 1--41.
[3]
P. G. Bennett, M. R. Dando, and R. G. Sharp. 2015. Using hypergames to model difficult social issues: An approach to the case of soccer hooliganism. In Operational Research Applied to Sports. Springer, 32--53.
[4]
Peter G. Bennett. 1980. Hypergames: Developing a model of conflict. Futures 12, 6 (1980), 489--507.
[5]
Colin F. Camerer, Teck-Hua Ho, and Juin-Kuan Chong. 2004. A cognitive hierarchy model of games. The Quarterly Journal of Economics 119, 3 (2004), 861--898.
[6]
A. Cardenas, S. Amin, and S. Sastry. 2008. Secure control: Towards survivable cyber-physical systems. In 28th International Conference on Distributed Computing Systems Workshops. 495--500.
[7]
Nicolas Falliere, Liam O. Murchu, and Eric Chien. 2011. W32. Stuxnet Dossier. White Paper, Symantec Corp., Security Response 5, 6 (2011), 29.
[8]
L. Grüne. 2002. Input-to-state dynamical stability and its Lyapunov function characterization. IEEE Transactions on Automatic Control 47, 9 (2002), 1499--1504.
[9]
Christopher N. Gutierrez, Saurabh Bagchi, H. Mohammed, and Jeff Avery. 2015. Modeling deception in information security as a hypergame–A primer. In Proceedings of the 16th Annual Information Security Symposium. CERIAS-Purdue University, 41.
[10]
S. Han, M. Xie, H. Chen, and Y. Ling. 2014. Intrusion detection in cyber-physical systems: Techniques and challenges. IEEE Systems Journal 8, 4 (2014), 1052--1062.
[11]
James Thomas House and George Cybenko. 2010. Hypergame theory applied to cyber attack and defense. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX, Vol. 7666. International Society for Optics and Photonics, 766604.
[12]
Gerry Howser and Bruce McMillin. 2014. A modal model of Stuxnet attacks on cyber-physical systems: A matter of trust. In Proceedings of the 2014 8th International Conference on Software Security and Reliability (SERE’14). IEEE, 225--234.
[13]
Stamatis Karnouskos. 2011. Stuxnet worm impact on industrial cyber-physical system security. In Proceedings of the IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society. IEEE, 4490--4494.
[14]
Nicholas S. Kovach, Alan S. Gibson, and Gary B. Lamont. 2015. Hypergame theory: A model for conflict, misperception, and deception. Game Theory 2015 (2015).
[15]
W. Lin, Y. Huang, and Q. Wu. 2010. Study on monitor system of heating ventilation air conditioning based on LonWorks technology. In Proceedings of the International Technology and Innovation Conference. 1--5.
[16]
Y. Mirsky, M. Guri, and Y. Elovici. 2017. HVACKer: Bridging the air-gap by attacking the air conditioning system. eprint arXiv: 1703.10454.
[17]
Arash Nourian and Stuart Madnick. 2018. A systems theoretic approach to the security threats in cyber physical systems applied to Stuxnet. IEEE Transactions on Dependable and Secure Computing 15, 1 (2018), 2--13.
[18]
Dmitry A. Novikov and Alexander G. Chkhartishvili. 2014. Reflexion and Control: Mathematical Models. CRC Press.
[19]
M. Rungger and P. Tabuada. 2016. A notion of robustness for cyber-physical systems. IEEE Transactions on Automatic Control 61, 8 (2016), 2108--2123.
[20]
József Sákovics. 2001. Games of incomplete information without common knowledge priors. Theory and Decision 50, 4 (2001), 347--366.
[21]
Yasuo Sasaki and Kyoichi Kijima. 2012. Hypergames and Bayesian games: A theoretical comparison of the models of games with incomplete information. Journal of Systems Science and Complexity 25, 4 (2012), 720--735.
[22]
Yasuo Sasaki and Kyoichi Kijima. 2016. Hierarchical hypergames and Bayesian games: A generalization of the theoretical comparison of hypergames and Bayesian games considering hierarchy of perceptions. Journal of Systems Science and Complexity 29, 1 (2016), 187--201.
[23]
E. D. Sontag. 2008. Input to state stability: Basics concepts and results. In Nonlinear and Optimal Control Theory. Springer-Verlag, Berlin.
[24]
Dale O. Stahl and Paul W. Wilson. 1995. On players’ models of other players: Theory and experimental evidence. Games and Economic Behavior 10, 1 (1995), 218--254.
[25]
P. Tabuada, S. Y. Caliskan, M. Rungger, and R. Majumdar. 2014. Towards robustness for cyber-physical systems. IEEE Transactions on Automatic Control 59, 12 (2014), 3151–3163.

Cited By

View all
  • (2023)Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic ReviewMathematics10.3390/math1106135311:6(1353)Online publication date: 10-Mar-2023
  • (2023)Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive DeceptionIEEE Transactions on Network and Service Management10.1109/TNSM.2023.324036620:3(3816-3830)Online publication date: Sep-2023
  • (2023)Sensor and Actuator Attacks on Hierarchical Control Systems with Domain-Aware Operator Theory*2023 Resilience Week (RWS)10.1109/RWS58133.2023.10284668(1-8)Online publication date: 27-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Cyber-Physical Systems
ACM Transactions on Cyber-Physical Systems  Volume 5, Issue 3
July 2021
296 pages
ISSN:2378-962X
EISSN:2378-9638
DOI:10.1145/3458848
  • Editor:
  • Chenyang Lu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 26 March 2021
Accepted: 01 November 2020
Revised: 01 September 2020
Received: 01 September 2019
Published in TCPS Volume 5, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cyber-physical security
  2. advanced persistent threats
  3. game theory
  4. optimal control

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)32
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic ReviewMathematics10.3390/math1106135311:6(1353)Online publication date: 10-Mar-2023
  • (2023)Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive DeceptionIEEE Transactions on Network and Service Management10.1109/TNSM.2023.324036620:3(3816-3830)Online publication date: Sep-2023
  • (2023)Sensor and Actuator Attacks on Hierarchical Control Systems with Domain-Aware Operator Theory*2023 Resilience Week (RWS)10.1109/RWS58133.2023.10284668(1-8)Online publication date: 27-Nov-2023
  • (2023)Multi-level optimization with the koopman operator for data-driven, domain-aware, and dynamic system securityReliability Engineering & System Safety10.1016/j.ress.2023.109323237(109323)Online publication date: Sep-2023
  • (2022)Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual FrameworkSensors10.3390/s2213466222:13(4662)Online publication date: 21-Jun-2022
  • (2022)Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame TheoryIEEE Transactions on Network and Service Management10.1109/TNSM.2021.311769819:1(112-129)Online publication date: Mar-2022
  • (2022) Deception-Based Cyber Attacks on Hierarchical Control Systems using Domain-Aware Koopman Learning * 2022 Resilience Week (RWS)10.1109/RWS55399.2022.9984030(1-8)Online publication date: 26-Sep-2022
  • (2021)A Survey of Defensive Deception: Approaches Using Game Theory and Machine LearningIEEE Communications Surveys & Tutorials10.1109/COMST.2021.310287423:4(2460-2493)Online publication date: Dec-2022
  • (2021)A Study of Misinformation GamesPRICAI 2021: Trends in Artificial Intelligence10.1007/978-3-030-89188-6_6(76-87)Online publication date: 8-Nov-2021

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media