Article
Computer Science, Information Systems
Wen Tian, Miao Du, Xiaopeng Ji, Guangjie Liu, Yuewei Dai, Zhu Han
Summary: This article introduces a new SDN-based dynamic bounded rational honeypot-APT game model for defense and attack in IIoT. Experimental results show that bounded rationality affects strategy selection and reduces utilities for both defenders and attackers, with our strategy outperforming existing work in defensive performance.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Shaohan Feng, Zehui Xiong, Dusit Niyato, Ping Wang
Summary: This paper proposes a novel game approach of cyber risk management for fog computing platforms, utilizing the cyber-insurance concept to transfer risks to a third party. The study involves a dynamic decision-making process among fog computing providers, attackers, and cyber-insurers to optimize resource allocation and improve security. The dynamic Stackelberg game model leads to unique and stable equilibrium, with insights provided through analytical and numerical results.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2021)
Article
Computer Science, Theory & Methods
Lefeng Zhang, Tianqing Zhu, Farookh Khadeer Hussain, Dayong Ye, Wanlei Zhou
Summary: Advanced persistent threats (APTs) pose a major cybersecurity threat. Defending against APTs requires finding the right timing to adjust defense strategies and allocate resources effectively, while avoiding leaking valuable information to attackers. This research demonstrates the importance of optimal strategy adjustment timings and proposes learning mechanisms to improve defenders' abilities.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Review
Mathematics
Mohd Nor Akmal Khalid, Amjed Ahmed Al-Kadhimi, Manmeet Mahinderjit Singh
Summary: Cybersecurity has become an important issue in the internet age due to the rise of connected devices. Game theory is an effective approach to analyze interactions between attackers and defenders in the context of advanced persistent threats (APTs). This literature review highlights the recent developments and applications of game theory frameworks in addressing APTs, including optimization for defensive performance, incentive-compatible contracts, and consideration of various industries and sectors. It also demonstrates the potential of game theory in analyzing complex security scenarios based on technological advancements and evolving cyber-crime trends.
Article
Management
Cristobal Guzman, Javiera Riffo, Claudio Telha, Mathieu Van Vyve
Summary: In this paper, we introduce an inspection game where a single inspector monitors a group of inspectees. We analyze the game using both static and dynamic Stackelberg models, and explore the mathematical structure of the equilibria in this sequential inspection game. We also discuss the relationship between the static and dynamic games, and their practical applications.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH
(2022)
Article
Automation & Control Systems
Tianqing Zhu, Dayong Ye, Zishuo Cheng, Wanlei Zhou, Philip S. Yu
Summary: A cyber system is often targeted by multiple attackers using sophisticated techniques to steal data and avoid detection. Game theory is used to study the interaction between defenders and attackers, but existing solutions focus on single-defender, single-attacker scenarios. To overcome this limitation, we propose a multiagent deep reinforcement learning method that allows defenders to create strategies on the fly and share their experience. Experimental results demonstrate that this method helps defenders learn efficient strategies against attackers.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2023)
Article
Computer Science, Hardware & Architecture
Talal Halabi, Omar Abdel Wahab, Ranwa Al Mallah, Mohammad Zulkernine
Summary: This article explores novel ways to launch intelligent attacks through connected vehicles, aiming to minimize the impact on road traffic services with optimal strategies. By modeling the processes of attack and defense, the article proposes solutions to address data corruption attacks and enhance the security of IoV.
IEEE TRANSACTIONS ON RELIABILITY
(2021)
Article
Computer Science, Artificial Intelligence
Yi-xi Xie, Li-xin Ji, Ling-shu Li, Zehua Guo, Thar Baker
Summary: The paper introduces a dynamic partially observable Markov process based on Bayesian inference to address Advanced Persistent Threats, develops the IBAAT system, and shows that the algorithm has achieved significant progress in security utility based on the evaluation results.
CONNECTION SCIENCE
(2021)
Article
Computer Science, Theory & Methods
Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng
Summary: This paper proposes a novel game-theoretical approach for APT defense, aiming to achieve real-time and optimal defense strategy-making under both periodic time-varying and general time-varying environments. By modeling the interactions between attackers and defenders as a dynamic APT repair game and employing an online optimal control-based mechanism integrated with backtracking-forward algorithms, the near-optimal solution of the APT damage minimization problem can be derived in real time. Experimental results demonstrate the efficient performance of the proposed scheme in obtaining optimal defense strategies and its superiority over existing approaches even in static networks.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Public, Environmental & Occupational Health
Chengwu Shao, Yan-Fu Li
Summary: This study proposes a multistage attack-defense graph game model to assist defenders in optimally allocating protection resources against sequential cyber attacks during multiple stages. Compared to previous studies based on static strategy spaces and static rationalities, the proposed model is more practical and effective in dealing with Ukrainian-style cyber attacks.
Article
Engineering, Electrical & Electronic
Zhaoxi Liu, Lingfeng Wang
Summary: This article develops a detailed model for load redistribution attacks in power systems considering insider threats, calculating optimal strategies for both the system operator and attacker in the presence of an insider, and investigates the impacts of insider threats on grid security in LR attacks.
IEEE TRANSACTIONS ON SMART GRID
(2021)
Article
Computer Science, Hardware & Architecture
Huiling Li, Jun Wu, Hansong Xu, Gaolei Li, Mohsen Guizani
Summary: Advanced persistent threats (APT) pose severe threats to resource-limited edge devices, but defense capabilities can be improved using artificial intelligence (AI) and edge game. This article proposes an explainable intelligence-driven APT edge defense mechanism that enhances protection level by optimizing detection models and resource allocation schemes.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Artificial Intelligence
Chenquan Gan, Jiabin Lin, Da-Wen Huang, Qingyi Zhu, Liang Tian, Deepak Kumar Jain
Summary: This paper proposes a differential game method based on equipment classification for addressing the problem of Advanced Persistent Threat (APT) attack and defense in the Industrial Internet of Things (IIoT). By dividing the equipment into two categories and formulating the corresponding differential game problem, this method mathematically describes and theoretically analyzes the APT attack and defense process in IIoT.
EXPERT SYSTEMS WITH APPLICATIONS
(2024)
Article
Computer Science, Information Systems
Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh
Summary: Defensive deception techniques are a promising proactive defense mechanism that can achieve attack failure by manipulating an attacker's beliefs. This study formulates a hypergame between an attacker and a defender, considering their subjective beliefs under uncertainty, and demonstrates through simulation experiments the effective use of defensive deception techniques in dealing with multi-staged APT attacks.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2022)
Article
Automation & Control Systems
Filippos Fotiadis, Kyriakos. G. Vamvoudakis
Summary: This article examines a game-theoretic framework for cyber-physical systems, focusing on the interaction between a defender and an intelligent attacker. The defender aims to optimize a performance cost to enhance resilience against stealthy attacks, while the attacker seeks to disrupt the system's performance using its information advantage. Both players adopt receding horizon control principles to implement their policies, with the defender employing receding horizon estimation to overcome limited access to system state information. Theoretical analysis demonstrates that this concurrent policy ensures closed-loop boundedness, even in the presence of stealthy attacks and information disadvantage. Simulations provide further verification and clarification of these findings.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2023)
Article
Automation & Control Systems
Zhipeng Liu, Yao Long, Andrew Clark, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2019)
Article
Engineering, Electrical & Electronic
Zhipeng Liu, Andrew Clark, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran
IEEE TRANSACTIONS ON POWER SYSTEMS
(2019)
Article
Computer Science, Theory & Methods
Xuhang Ying, Sang Uk Sagong, Andrew Clark, Linda Bushnell, Radha Poovendran
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2019)
Article
Automation & Control Systems
Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2019)
Article
Computer Science, Hardware & Architecture
Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran, Linda Bushnell
Summary: Trucks form a platoon on freeways to save fuel, using technologies like ACC and V2V communication protocol to control their speed. However, these systems may introduce attack surfaces and be vulnerable to cyber attacks. Analyzing the attack surfaces of a truck platoon can help in developing effective defense systems and countermeasures for future security.
Article
Automation & Control Systems
Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran
Summary: This article investigates the synthesis of control policies for an agent in a partially observable environment that must satisfy a temporal logic specification while facing an adversary. By limiting the search for policies to finite-state controllers, it offers a manageable approach. Algorithms are presented to determine defender and adversary controllers of fixed sizes that satisfy the specification, as well as to maximize the satisfaction probability under fixed-sized controllers.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2021)
Article
Computer Science, Hardware & Architecture
Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran
Summary: The security of automotive Cyber-Physical Systems (CPSs) is at risk due to the widespread use of legacy in-vehicle communication systems. In this article, the authors propose TACAN, a technique that utilizes covert channels to provide secure authentication of Electronic Control Units (ECUs) on the legacy Controller Area Network (CAN) bus. TACAN consists of three different covert channels for ECU authentication.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Proceedings Paper
Computer Science, Information Systems
Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin
Summary: This paper presents a new attack method that steals energy during a V2G communication. By stealing the victim's electricity and making them pay for it, the attacker can gain economic profit while leaving the victim with a completely discharged battery. The authors also propose a modification to the protocol as a countermeasure and validate its effectiveness in a laboratory setting.
COMPUTER SECURITY - ESORICS 2022, PT I
(2022)