Kamrul Hasan, S. Shetty, John A. Sokolowski, Deepak K. Tosh
{"title":"Security game for cyber physical systems","authors":"Kamrul Hasan, S. Shetty, John A. Sokolowski, Deepak K. Tosh","doi":"10.22360/springsim.2018.cns.015","DOIUrl":null,"url":null,"abstract":"The extensive use of information and communication technologies (ICT) in cyber physical systems (CPSs) make them vulnerable to cyber-attacks. One class of cyber-attack is advanced persistent threats where highly skilled attackers can steal user authentication information and then move laterally in the network, from host to host in a hidden manner until they reach an attractive target. The security modeling process of CPSs is divided into two phases of intrusion and disruption. In each phase, a game-theoretic paradigm with different parameters predicts the interactions between the attacker and the system. By solving the model, the security of CPSs is estimated in terms of probability of attack and probability of defend. After getting those the attackers and defenders can take optimized actions to maximize their gains. Most importantly, defender/systems can tune the system parameters to mitigate the attack.","PeriodicalId":413389,"journal":{"name":"Spring Simulation Multiconference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Spring Simulation Multiconference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22360/springsim.2018.cns.015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The extensive use of information and communication technologies (ICT) in cyber physical systems (CPSs) make them vulnerable to cyber-attacks. One class of cyber-attack is advanced persistent threats where highly skilled attackers can steal user authentication information and then move laterally in the network, from host to host in a hidden manner until they reach an attractive target. The security modeling process of CPSs is divided into two phases of intrusion and disruption. In each phase, a game-theoretic paradigm with different parameters predicts the interactions between the attacker and the system. By solving the model, the security of CPSs is estimated in terms of probability of attack and probability of defend. After getting those the attackers and defenders can take optimized actions to maximize their gains. Most importantly, defender/systems can tune the system parameters to mitigate the attack.