# Defense Strategies for Asymmetric Networked Systems with Discrete Components

@article{Rao2018DefenseSF, title={Defense Strategies for Asymmetric Networked Systems with Discrete Components}, author={Nageswara S. V. Rao and Chris Y. T. Ma and Kjell Hausken and Fei He and David K. Y. Yau and Jun Zhuang}, journal={Sensors (Basel, Switzerland)}, year={2018}, volume={18} }

We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a…

## 10 Citations

On Defense Strategies for Recursive System of Systems Using Aggregated Correlations

- Computer Science2018 21st International Conference on Information Fusion (FUSION)
- 2018

This work forms the problem of ensuring the performance of RSoS as a game between an attacker and a provider, each with a utility function composed of a survival probability term and a cost term, both expressed in terms of the number of basic system components attacked and reinforced.

Defense strategies and expected capacity of high performance computing infrastructures

- Computer ScienceICDCN
- 2019

At Nash Equilibrium, expressions for the expected capacity of the infrastructure given by the number of computing nodes that are operational and connected to the network are derived.

Cyber-Physical Correlation Effects in Defense Games for Large Discrete Infrastructures

- Computer ScienceGames
- 2018

An abstract problem of ensuring the survival probability of a cyber–physical infrastructure with discrete components as a game between the provider and attacker is formulated, whose utility functions are composed of infrastructure survival probability terms and cost terms, both expressed in terms of the number of components attacked and reinforced.

Stackelberg game in critical infrastructures from a network science perspective

- Computer SciencePhysica A: Statistical Mechanics and its Applications
- 2019

Discrete game-theoretic analysis of defense in correlated cyber-physical systems

- Computer ScienceAnn. Oper. Res.
- 2020

This work characterize the effect of cyber-physical interdependency on the CPS survival probability using a product-form function with cyber and physical exponential correlation coefficients, and applies this game-theoretic analysis to a cloud computing infrastructure, showing that its residual capacity is relatively high when the attacker has no information about the distribution of servers.

Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective.

- Computer ScienceChaos
- 2019

This work achieves active defense by revealing the disguised network to the attacker rather than changing the structure of the target network, and proposes a Stackelberg game under asymmetric information named the active deception game, in which the cost constraint is considered.

A Game-Theoretic Approach for Defending Cyber-Physical Systems From Observability Attacks

- Mathematics
- 2020

Using a game-theoretic approach, a security and control engineer can select the optimal strategy to defend a cyber-physical system from observability attacks.

Operational Perspectives Into the Resilience of the U.S. Air Transportation Network Against Intelligent Attacks

- Computer ScienceIEEE Transactions on Intelligent Transportation Systems
- 2020

A defender–attacker–defender model is presented to analyze the potential impacts of intelligent attacks and worst case disruptions on the U.S. air transportation network, as well as possible protection steps that could be taken to minimize the negative outcomes of such disruptions.

Defending a series system with individual protection, overarching protection, and disinformation

- Computer ScienceReliab. Eng. Syst. Saf.
- 2020

Management Solutions for Cyber-Physical Security in Smart Built Environment

- Construction Research Congress 2022
- 2022

## References

SHOWING 1-10 OF 32 REFERENCES

Game-theoretic strategies for asymmetric networked systems

- Computer Science2017 20th International Conference on Information Fusion (Fusion)
- 2017

This work considers an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks, and derives Nash Equilibrium conditions which provide expressions for individual system survival probabilities, and also the expected capacity specified by the total number of operational components.

Defense strategies for infrastructures with multiple systems of components

- Computer Science2016 19th International Conference on Information Fusion (FUSION)
- 2016

This paper forms a problem of ensuring the resilience of an infrastructure as a game between the provider and attacker and derives Nash Equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure resilience on the cost terms, correlation functions, and individual system survival probabilities.

On defense strategies for system of systems using aggregated correlations

- Computer Science2017 Annual IEEE International Systems Conference (SysCon)
- 2017

The sensitivity functions that highlight the dependence of SoS survival probability at NE on cost terms, correlation functions, and individual system survival probabilities are derived and applied to a simplified model of distributed cloud computing infrastructure.

Game-theoretic strategies for systems of components using product-form utilities

- Computer Science2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI)
- 2016

This work forms a game for ensuring the resilience of the infrastructure, wherein the utility functions of the provider and attacker are products of an infrastructure survival probability term and a cost term, both expressed in terms of the numbers of system components attacked and reinforced.

Cyber-physical correlations for infrastructure resilience: A game-theoretic approach

- Computer Science17th International Conference on Information Fusion (FUSION)
- 2014

This work formulate a resilience problem for infrastructures composed of discrete components as a game between the provider and attacker, wherein their utility functions consist of an infrastructure survival probability term and a cost term expressed in terms of the number of components attacked and reinforced.

On resilience of cyber-physical infrastructures using discrete product-form games

- Computer Science2015 18th International Conference on Information Fusion (Fusion)
- 2015

This work forms a discrete game between the provider and attacker using a resilience measure specified by the infrastructure's survival probability, and results for product-form disutility functions complement the sum-form results from previous works, and more closely represent the provider's objectives for a certain class of infrastructures.

Defense Strategies for Multi-Site Cloud Computing Server Infrastructures

- Computer ScienceICDCN
- 2018

This work considers cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network, and derives expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network using the sum-form, product-form and composite utility functions.

Smart attacks in smart grid communication networks

- EngineeringIEEE Communications Magazine
- 2012

This article introduces several intelligent attacks and countermeasures in smart grid communication networks, which aim for maximal damage or benefits by taking advantage of the network structure as well as the protocol functionality.