Securing Infrastructure Facilities: When does proactive defense help?

04/02/2018
by   Manxi Wu, et al.
0

Infrastructure systems are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operation. In this article, we investigate how the infrastructure operator (defender) should prioritize the investment in securing a set of facilities in order to reduce the impact of a strategic adversary (attacker) who can target a facility to increase the overall usage cost of the system. We adopt a game-theoretic approach to model the defender-attacker interaction and study two models: normal-form game -- where both players move simultaneously; and sequential game -- where attacker moves after observing the defender's strategy. For each model, we provide a complete characterization of how the set of facilities that are secured by the defender in equilibrium vary with the costs of attack and defense. Importantly, our analysis provides a sharp condition relating the cost parameters for which the defender has the first mover advantage. Specifically, we show that to fully deter the attacker from targeting any facility, the defender needs to proactively secure all "vulnerable facilities" at an appropriate level of effort. We illustrate the outcome of the attacker-defender interaction on a simple transportation network. We also suggest a dynamic learning setup to understand how this outcome can affect the ability of imperfectly informed users to make their decisions about using the system in the post-attack stage.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/02/2018

Security of Transportation Networks: Modeling Attacker-Defender Interaction

Transportation networks are increasingly facing new security threats due...
research
06/17/2019

A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network

Infrastructure networks are vulnerable to both cyber and physical attack...
research
11/03/2021

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

The Internet of Vehicles (IoV), whereby interconnected vehicles communic...
research
03/06/2019

Attack Graph Obfuscation

Before executing an attack, adversaries usually explore the victim's net...
research
07/21/2017

A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery

Infrastructure networks are vulnerable to both cyber and physical attack...
research
09/13/2019

Strategic Inference with a Single Private Sample

Motivated by applications in cyber security, we develop a simple game mo...
research
11/02/2022

Partially-Observable Security Games for Automating Attack-Defense Analysis

Network systems often contain vulnerabilities that remain unfixed in a n...

Please sign up or login with your details

Forgot password? Click here to reset