IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v181y2019icp28-37.html
   My bibliography  Save this article

Modeling cyber-physical attacks based on stochastic game and Markov processes

Author

Listed:
  • Lalropuia, K.C.
  • Gupta, Vandana

Abstract

Security of cyber-physical systems (CPS) has been a prime concern due to the ever-increasing integration of communication networks with physical devices. In this paper, we propose a zero − sum stochastic game model to capture the system dynamics resulting from the attacker − defender interactions in an attacked CPS. In addition to predicting the attacker behavior in terms of optimal strategies, the best strategies for counteracting the malicious activities are also determined. The lifetime of the attacked CPS is characterized based on a continuous time Markov chain (CTMC) and consequently, mean time to failure of the system is derived. Further, we address dependability issues of the system by formulating a semi-Markov model and obtaining different dependability measures such as reliability, availability and confidentiality. The studies identify critical states of the system with respect to its dependability. Theoretical results are also validated via simulation. The results of the studies are expected to be helpful in developing efficient and robust defense mechanisms.

Suggested Citation

  • Lalropuia, K.C. & Gupta, Vandana, 2019. "Modeling cyber-physical attacks based on stochastic game and Markov processes," Reliability Engineering and System Safety, Elsevier, vol. 181(C), pages 28-37.
  • Handle: RePEc:eee:reensy:v:181:y:2019:i:c:p:28-37
    DOI: 10.1016/j.ress.2018.08.014
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832017314436
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2018.08.014?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Gupta, Vandana & Dharmaraja, S., 2011. "Semi-Markov modeling of dependability of VoIP network in the presence of resource degradation and security attacks," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1627-1636.
    2. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    3. Liu, Xiaoxue & Zhang, Jiexin & Zhu, Peidong, 2017. "Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 16(C), pages 13-25.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ding, Zhetong & Chen, Chunyu & Cui, Mingjian & Bi, Wenjun & Chen, Yang & Li, Fangxing, 2021. "Dynamic game-based defensive primary frequency control system considering intelligent attackers," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    2. Wu, Shimeng & Jiang, Yuchen & Luo, Hao & Zhang, Jiusi & Yin, Shen & Kaynak, Okyay, 2022. "An integrated data-driven scheme for the defense of typical cyber–physical attacks," Reliability Engineering and System Safety, Elsevier, vol. 220(C).
    3. Baogui Xin & Wei Peng & Yekyung Kwon, 2019. "A fractional-order difference Cournot duopoly game with long memory," Papers 1903.04305, arXiv.org.
    4. Zhao, Yunfei & Huang, Linan & Smidts, Carol & Zhu, Quanyan, 2020. "Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    5. Kartick Bhushan & Somnath Chattopadhyaya & Shubham Sharma & Kamal Sharma & Changhe Li & Yanbin Zhang & Elsayed Mohamed Tag Eldin, 2022. "Analyzing Reliability and Maintainability of Crawler Dozer BD155 Transmission Failure Using Markov Method and Total Productive Maintenance: A Novel Case Study for Improvement Productivity," Sustainability, MDPI, vol. 14(21), pages 1-17, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    3. Naybour, Matthew & Remenyte-Prescott, Rasa & Boyd, Matthew J., 2019. "Reliability and efficiency evaluation of a community pharmacy dispensing process using a coloured Petri-net approach," Reliability Engineering and System Safety, Elsevier, vol. 182(C), pages 258-268.
    4. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    5. Dharmaraja, S. & Vinayak, Resham & Trivedi, Kishor S., 2016. "Reliability and survivability of vehicular ad hoc networks: An analytical approach," Reliability Engineering and System Safety, Elsevier, vol. 153(C), pages 28-38.
    6. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    7. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    8. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    9. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    10. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    11. D׳Amico, Guglielmo & Petroni, Filippo & Prattico, Flavio, 2015. "Reliability measures for indexed semi-Markov chains applied to wind energy production," Reliability Engineering and System Safety, Elsevier, vol. 144(C), pages 170-177.
    12. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    13. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    14. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    15. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    16. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    17. Palleti, Venkata Reddy & Joseph, Jude Victor & Silva, Arlindo, 2018. "A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 21-32.
    18. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    19. Kondakci, Suleyman, 2015. "Analysis of information security reliability: A tutorial," Reliability Engineering and System Safety, Elsevier, vol. 133(C), pages 275-299.
    20. D’Amico, Guglielmo & Petroni, Filippo, 2023. "ROCOF of higher order for semi-Markov processes," Applied Mathematics and Computation, Elsevier, vol. 441(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:181:y:2019:i:c:p:28-37. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.