Deception-As-Defense Framework for Cyber-Physical Systems

We introduce deceptive signaling framework as a new defense measure against advanced adversaries in cyber-physical systems. In general, adversaries look for system-related information, e.g., the underlying state of the system, in order to learn the system dynamics and to receive useful feedback regarding the success/failure of their actions so as to carry out their malicious task. To this end, we craft the information that is accessible to adversaries strategically in order to control their actions in a way that will benefit the system, indirectly and without any explicit enforcement. Under the solution concept of game-theoretic hierarchical equilibrium, we arrive at a semi-definite programming problem equivalent to the infinite-dimensional optimization problem faced by the defender while selecting the best strategy when the information of interest is Gaussian and both sides have quadratic cost functions. The equivalence result holds also for the scenarios where the defender can have partial or noisy measurements or the objective of the adversary is not known. We show the optimality of linear signaling rule within the general class of measurable policies in communication scenarios and also compute the optimal linear signaling rule in control scenarios.

[1]  D. Blackwell,et al.  Non-Existence of Everywhere Proper Conditional Distributions , 1963 .

[2]  D. Blackwell Memoryless Strategies in Finite-Stage Dynamic Programming , 1964 .

[3]  J. Sobel,et al.  STRATEGIC INFORMATION TRANSMISSION , 1982 .

[4]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[5]  R. Gibbons,et al.  Cheap Talk with Two Audiences , 1989 .

[6]  J. Morgan,et al.  A Model of Expertise , 1999 .

[7]  Henry Wolkowicz,et al.  Handbook of Semidefinite Programming , 2000 .

[8]  Marco Battaglini,et al.  Multiple Referrals and Multidimensional Cheap Talk , 2002 .

[9]  S. Morris Political Correctness , 2001, Journal of Political Economy.

[10]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[11]  J. Morgan,et al.  Cheap Talk , 2005 .

[12]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[13]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[14]  Emir Kamenica,et al.  Bayesian Persuasion , 2009, World Scientific Series in Economic Theory.

[15]  Quanyan Zhu,et al.  Deceptive Routing in Relay Networks , 2012, GameSec.

[16]  Quanyan Zhu,et al.  Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[17]  W. Tamura A Theory of Multidimensional Information Disclosure , 2014 .

[18]  Helen Nissenbaum,et al.  Trackmenot: Resisting Surveillance in Web Search , 2015 .

[19]  Emrah Akyol,et al.  Hierarchical Multi-stage Gaussian Signaling Games: Strategic Communication and Control , 2016 .

[20]  Tamer Başar,et al.  Information-Theoretic Approach to Strategic Communication as a Hierarchical Game , 2015, Proceedings of the IEEE.

[21]  Farhad Farokhi,et al.  Estimation With Strategic Sensors , 2014, IEEE Transactions on Automatic Control.

[22]  Tamer Basar,et al.  Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats , 2017, GameSec.

[23]  Sinan Gezici,et al.  Quadratic Multi-Dimensional Signaling Games and Affine Equilibria , 2015, IEEE Transactions on Automatic Control.

[24]  J. Friedman Political Correctness. , 2017, Rhode Island medical journal.

[25]  Tamer Basar,et al.  Deceptive Multi-dimensional Information Disclosure over a Gaussian Channel* , 2018, 2018 Annual American Control Conference (ACC).

[26]  Tamer Basar,et al.  Dynamic Information Disclosure for Deception* , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[27]  Tamer Başar,et al.  Hierarchical multistage Gaussian signaling games in noncooperative communication and control systems , 2016, Autom..

[28]  Tamer Basar,et al.  Robust Sensor Design Against Multiple Attackers with Misaligned Control Objectives , 2019, ArXiv.

[29]  Quanyan Zhu,et al.  A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..