Security of Transportation Networks: Modeling Attacker-Defender Interaction

04/02/2018
by   Manxi Wu, et al.
0

Transportation networks are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operations. In this article, we aim to understand how the network operator (defender) should prioritize the investment in securing a set of facilities in order to limit the impact of a strategic adversary (attacker) who can target a facility to increase the overall network cost. We adopt a game-theoretic approach to model the defender-attacker interaction and study two models: normal-form game -- where both players move simultaneously; and sequential game -- where attacker moves after observing the defender's strategy. For each model, we provide a complete characterization of how the set of facilities that are secured by the defender in equilibrium vary with the cost of attack and per-facility defense cost. We also identify the set of vulnerable facilities; i.e., the facilities in the support set of attacker's equilibrium strategy. Importantly, our analysis provides sharp conditions relating attack and defense costs for which the defender has the first mover advantage. In particular, by securing all vulnerable facilities at an appropriate level of effort in a proactive manner, the defender is able to fully deter the attacker from targeting any facility.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/02/2018

Securing Infrastructure Facilities: When does proactive defense help?

Infrastructure systems are increasingly facing new security threats due ...
research
08/31/2022

On Poisoned Wardrop Equilibrium in Congestion Games

Recent years have witnessed a growing number of attack vectors against i...
research
09/28/2018

Game-Theoretic Model and Experimental Investigation of Cyber Wargaming

We demonstrate that game-theoretic calculations serve as a useful tool f...
research
11/03/2021

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

The Internet of Vehicles (IoV), whereby interconnected vehicles communic...
research
03/06/2019

Attack Graph Obfuscation

Before executing an attack, adversaries usually explore the victim's net...
research
03/22/2018

Signaling Game-based Misbehavior Inspection in V2I-enabled Highway Operations

Vehicle-to-Infrastructure (V2I) communications are increasingly supporti...
research
03/18/2022

HDLock: Exploiting Privileged Encoding to Protect Hyperdimensional Computing Models against IP Stealing

Hyperdimensional Computing (HDC) is facing infringement issues due to st...

Please sign up or login with your details

Forgot password? Click here to reset