Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks

02/10/2023
by   Bobak McCann, et al.
0

We consider a two-player network inspection game, in which a defender allocates sensors with potentially heterogeneous detection capabilities in order to detect multiple attacks caused by a strategic attacker. The objective of the defender (resp. attacker) is to minimize (resp. maximize) the expected number of undetected attacks by selecting a potentially randomized inspection (resp. attack) strategy. We analytically characterize Nash equilibria of this large-scale zero-sum game when every vulnerable network component can be monitored from a unique sensor location. We then leverage our equilibrium analysis to design a heuristic solution approach based on minimum set covers for computing inspection strategies in general. Our computational results on a benchmark cyber-physical distribution network illustrate the performance and computational tractability of our solution approach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/27/2023

Hide-and-Seek Game with Capacitated Locations and Imperfect Detection

We consider a variant of the hide-and-seek game in which a seeker inspec...
research
09/28/2017

Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure

Securing the physical components of a city's interdependent critical inf...
research
03/18/2019

A Network Monitoring Game with Heterogeneous Component Criticality Levels

We consider an attacker-operator game for monitoring a large-scale netwo...
research
03/22/2018

Signaling Game-based Misbehavior Inspection in V2I-enabled Highway Operations

Vehicle-to-Infrastructure (V2I) communications are increasingly supporti...
research
06/17/2019

A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network

Infrastructure networks are vulnerable to both cyber and physical attack...
research
07/21/2017

A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery

Infrastructure networks are vulnerable to both cyber and physical attack...
research
06/12/2020

Secure Route Planning Using Dynamic Games with Stopping States

We consider the classic motion planning problem defined over a roadmap i...

Please sign up or login with your details

Forgot password? Click here to reset