Xiaoguang Chen;Wenyuan Cao;Lili Chen;Jinpeng Han;Manzhi Yang;Zhen Wang;Fei-Yue Wang
{"title":"iCyberGuard:工业物联网中增强网络安全的FlipIt游戏","authors":"Xiaoguang Chen;Wenyuan Cao;Lili Chen;Jinpeng Han;Manzhi Yang;Zhen Wang;Fei-Yue Wang","doi":"10.1109/TCSS.2024.3443174","DOIUrl":null,"url":null,"abstract":"Social manufacturing has significantly advanced the industrial Internet of Things (IIoT), integrating information technology and operation technology to enhance production efficiency and quality, and to foster new business models. This integration, however, introduces novel risks, including advanced persistent threats, which demand robust security measures to safeguard IIoT systems. This article proposes an iCyberGuard game model, tailored for IIoT environments, designed to imitate the cyber and physical attacks for information and operation technologies. Then, we used a reinforcement learning algorithm to compute the optimal strategy. We conducted comprehensive simulation experiments, which demonstrate that our model the strategic interactions between attackers and defenders. Participants are enabled to learn adaptively, discerning optimal strategies based on the intelligence of their adversaries. Finally, we explain the practical significance of the best strategy of defenders or attackers, and how users can rely on these best strategies to strengthen the security performance of the network.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 6","pages":"8005-8014"},"PeriodicalIF":4.5000,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"iCyberGuard: A FlipIt Game for Enhanced Cybersecurity in IIoT\",\"authors\":\"Xiaoguang Chen;Wenyuan Cao;Lili Chen;Jinpeng Han;Manzhi Yang;Zhen Wang;Fei-Yue Wang\",\"doi\":\"10.1109/TCSS.2024.3443174\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social manufacturing has significantly advanced the industrial Internet of Things (IIoT), integrating information technology and operation technology to enhance production efficiency and quality, and to foster new business models. This integration, however, introduces novel risks, including advanced persistent threats, which demand robust security measures to safeguard IIoT systems. This article proposes an iCyberGuard game model, tailored for IIoT environments, designed to imitate the cyber and physical attacks for information and operation technologies. Then, we used a reinforcement learning algorithm to compute the optimal strategy. We conducted comprehensive simulation experiments, which demonstrate that our model the strategic interactions between attackers and defenders. Participants are enabled to learn adaptively, discerning optimal strategies based on the intelligence of their adversaries. Finally, we explain the practical significance of the best strategy of defenders or attackers, and how users can rely on these best strategies to strengthen the security performance of the network.\",\"PeriodicalId\":13044,\"journal\":{\"name\":\"IEEE Transactions on Computational Social Systems\",\"volume\":\"11 6\",\"pages\":\"8005-8014\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2024-09-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Computational Social Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10680471/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, CYBERNETICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Computational Social Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10680471/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, CYBERNETICS","Score":null,"Total":0}
iCyberGuard: A FlipIt Game for Enhanced Cybersecurity in IIoT
Social manufacturing has significantly advanced the industrial Internet of Things (IIoT), integrating information technology and operation technology to enhance production efficiency and quality, and to foster new business models. This integration, however, introduces novel risks, including advanced persistent threats, which demand robust security measures to safeguard IIoT systems. This article proposes an iCyberGuard game model, tailored for IIoT environments, designed to imitate the cyber and physical attacks for information and operation technologies. Then, we used a reinforcement learning algorithm to compute the optimal strategy. We conducted comprehensive simulation experiments, which demonstrate that our model the strategic interactions between attackers and defenders. Participants are enabled to learn adaptively, discerning optimal strategies based on the intelligence of their adversaries. Finally, we explain the practical significance of the best strategy of defenders or attackers, and how users can rely on these best strategies to strengthen the security performance of the network.
期刊介绍:
IEEE Transactions on Computational Social Systems focuses on such topics as modeling, simulation, analysis and understanding of social systems from the quantitative and/or computational perspective. "Systems" include man-man, man-machine and machine-machine organizations and adversarial situations as well as social media structures and their dynamics. More specifically, the proposed transactions publishes articles on modeling the dynamics of social systems, methodologies for incorporating and representing socio-cultural and behavioral aspects in computational modeling, analysis of social system behavior and structure, and paradigms for social systems modeling and simulation. The journal also features articles on social network dynamics, social intelligence and cognition, social systems design and architectures, socio-cultural modeling and representation, and computational behavior modeling, and their applications.