1,270 Hits in 3.6 sec

Game-theoretic resilience analysis of Cyber-Physical Systems

Fei He, Jun Zhuang, Nageswara S. V. Rao, Chris Y. T. Ma, David K. Y. Yau
2013 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)  
We investigate the resilience of cyber physical systems by modeling the interaction between provider and attacker as a simultaneous game that incorporates cyber and physical spaces.  ...  The system resilience function is formulated as a power-form product of the survival probabilities of cyber and physical spaces, each with a corresponding correlation coefficient.  ...  in the unit cyber defense cost, the inherent cyber defense level, the physical correlation coefficient, and the physical attack. 2) Discrete Case: Considering the defense and attack efforts as the number  ... 
doi:10.1109/cpsna.2013.6614252 dblp:conf/cpsna/He0RMY13 fatcat:dvpctdn3fnel3pnvcywzvcbkme

Preface to the Focused Issue on Dynamic Games in Cyber Security

Saurabh Amin, Karl Henrik Johansson
2019 Dynamic Games and Applications  
This issue features five papers on game-theoretic models and analysis approaches for cyber and cyber-physical security of networked systems.  ...  In their discussion of these topics, the authors include references to recent advancements and discuss key issues in the analysis of dynamic games for security problems.  ...  The fourth paper "Supervisory Control of Discrete-event Systems under Attacks," by Wakaiki, Tabuada, and Hespanha, is motivated by issues in computer security where the cyber defense system must make decisions  ... 
doi:10.1007/s13235-019-00335-x fatcat:vy3uplj7aze5pjp6oiz5snnuyy

Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks

Ming Ni, Manli Li, Jun'e Li, Yingjun Wu, Qi Wang
2021 Journal of Modern Power Systems and Clean Energy  
Index Terms--Cyber-physical power system (CPPS), cyber security, cyber-attack, situation awareness, active defense. I.  ...  finally result in system instability, uneconomic operation and other issues in physical power systems [4] .  ...  This serves as the theoretical basis of the cyber-physical coordinated defense system.  ... 
doi:10.35833/mpce.2018.000830 fatcat:2ahdvcutkvhhli6vldv22hm37m

Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures

Nageswara Rao, Chris Ma, Fei He, David Yau, Jun Zhuang
2018 Games  
For large discrete infrastructures characterized by the number of cyber and physical components, we characterize the cyberphysical interactions at two levels: (i) the cyberphysical failure correlation  ...  We formulate an abstract problem of ensuring the survival probability of a cyberphysical infrastructure with discrete components as a game between the provider and attacker, whose utility functions are  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/g9030052 fatcat:zwzojprwqvgvhc5emtwwf7pubq

Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang, David K. Y. Yau
2015 Risk Analysis  
Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical  ...  The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds.  ...  GAME-THEORETIC ANALYSIS In this section, we first consider the Boolean attack-defense model for cyber and physical subinfrastructures or parts, followed by the discrete case where each part consists of  ... 
doi:10.1111/risa.12362 pmid:25847370 fatcat:vjgwe5oeazcepmu7dfbh3z26fe

Defense Strategies for Asymmetric Networked Systems with Discrete Components

Nageswara Rao, Chris Ma, Kjell Hausken, Fei He, David Yau, Jun Zhuang
2018 Sensors  
We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.  ...  We consider infrastructures consisting of a network of systems, each composed of discrete components.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s18051421 pmid:29751588 pmcid:PMC5982420 fatcat:eq7d5juhjze23l2dyhxi3gfkj4

A review of game theory approach to cyber security risk management

D.A. Akinwumi, G.B. Iwasokun, B.K. Alese, S.A. Oluwadare
2018 Nigerian Journal of Technology  
This paper presents a review of game theoretic-based model for cyber security risk management.  ...  Specifically, issues on modeling, some related works and significance of game theoretic approach to cyber security risk management are presented.  ...  The authors in [55] , presented a game-theoretic analysis of attack and defense in cyber-physical network infrastructures.  ... 
doi:10.4314/njt.v36i4.38 fatcat:wcrm6bkcmzajbnkdibd7bwsr6q

In quest of benchmarking security risks to cyber-physical systems

S. Amin, G. A. Schwartz, A. Hussain
2013 IEEE Network  
Such cyber-physical systems (CPSs) permit synergistic interactions between physical dynamics and computational processes.  ...  These infrastructures are spatially distributed across large physical areas, and consist of heterogeneous cyber-physical components interconnected by communication networks with complex peering and hierarchies  ...  Our game-theoretic approach to estimating security risks facilitates more effective defenses, especially against correlated failures.  ... 
doi:10.1109/mnet.2013.6423187 fatcat:ecu3kwviorgitfudez5la7gcca

Dynamic Games for Secure and Resilient Control System Design [article]

Yunhan Huang, Juntao Chen, Linan Huang, Quanyan Zhu
2019 arXiv   pre-print
cyber-physical-human control systems.  ...  Modern control systems are featured by their hierarchical structure composing of cyber, physical, and human layers.  ...  Analysis of large-scale game-theoretic models is often difficult.  ... 
arXiv:1910.07510v3 fatcat:4rxeyse6dnbspop7hxalhzcedq

A survey on the security of cyber-physical systems

Guangyu Wu, Jian Sun, Jie Chen
2016 Control Theory and Technology  
Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes.  ...  Security is one of the most important issues that should be investigated in CPSs and hence has received much attention in recent years.  ...  Introduction Cyber-physical systems can be generally characterized as complex networked control systems, which combine physical elements in the real world with computing elements in the cyber space.  ... 
doi:10.1007/s11768-016-5123-9 fatcat:bcdtusqftvgslffnkp57h33oz4

Deep Reinforcement Learning for Cyber Security [article]

Thanh Thi Nguyen, Vijay Janapa Reddi
2020 arXiv   pre-print
We touch on different vital aspects, including DRL-based security methods for cyber-physical systems, autonomous intrusion detection techniques, and multi-agent DRL-based game theory simulations for defense  ...  The scale of Internet-connected systems has increased considerably, and these systems are being exposed to cyber attacks more than ever.  ...  [81] proposed the use of DRL, i.e., double Fig. 5 . The dynamics of attack and defense in a cyber-physical system.  ... 
arXiv:1906.05799v3 fatcat:h4lujrwb5bgwngbi4xf6w347b4

A Moving-Horizon Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems [article]

Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas
2017 arXiv   pre-print
In this paper, we establish a zero-sum, hybrid state stochastic game model for designing defense policies for cyber-physical systems against different types of attacks.  ...  The hybrid game model we propose in this work contains physical states that are described by the system dynamics, and a cyber state that represents the detection mode of the system composed by a set of  ...  The hybrid state of the game model contains a dynamic system state that captures the evolution of the physical processes, and discrete cyber modes that represent different security states of the CPS according  ... 
arXiv:1710.00288v1 fatcat:u42rwcal6jb3jjuj3hb3nbeghm

Methodical and Applied Aspects of Creation and Application of Cyber Ranges

Yuriy Danyk
2019 Theoretical and Applied Cybersecurity  
These cyber ranges can be used for: research issues of cyber monitoring, cyber defense and cyber influence; design of fundamental and applied bases of constructing mathematical support of software and  ...  threats in cyber space.  ...  of system analysis theory.  ... 
doi:10.20535/tacs.2664-29132019.1.169089 fatcat:3jxys65vmfdixbtisalywbwqki

Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications

Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Manoharan Premkumar, Lucian Mihet-Popa
2020 IEEE Access  
(ii) GAME-THEORETIC MODEL In recent years the cyberattacks on the physical power system are increasing the attention worldwide.  ...  The attack detection and mitigation game-theoretical model is used to model the cyber-physical interaction process and also applied for risk, vulnerability, and threat analysis.  ... 
doi:10.1109/access.2020.3016826 fatcat:caax2ubyyrclhj37g5ynvlm66q

Simulation for cybersecurity: state of the art and future directions

Hamdi Kavak, Jose J Padilla, Daniele Vernon-Bido, Saikou Y Diallo, Ross Gore, Sachin Shetty
2021 Journal of Cybersecurity  
; risk analysis and assessment; and humans in cybersecurity research.  ...  The proposed way forward section posits that the advancement of collecting and accessing sociotechnological data to inform models, the creation of new theoretical constructs, and the integration and improvement  ...  Conflict of interest statement. Authors declare no conflict of interest.  ... 
doi:10.1093/cybsec/tyab005 fatcat:nx72szjmi5bxzdiixmvxa6e6ey
« Previous Showing results 1 — 15 out of 1,270 results