Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems

Recent years have seen increased interest in the design and deployment of smart grid devices and control algorithms. Each of these smart communicating devices represents a potential access point for an intruder spurring research into intruder prevention and detection. However, no security measures are complete, and intruding attackers will compromise smart grid devices leading to the attacker and the system operator interacting via the grid and its control systems. The outcome of these machine-mediated human-human interactions will depend on the design of the physical and control systems mediating the interactions. If these outcomes can be predicted via simulation, they can be used as a tool for designing attack-resilient grids and control systems. However, accurate predictions require good models of not just the physical and control systems, but also of the human decision making. In this manuscript, we present an approach to develop such tools, i.e., models of the decisions of the cyber-physical intruder who is attacking the systems and the system operator who is defending it, and demonstrate its usefulness for design.

[1]  Tansu Alpcan,et al.  Network Security , 2010 .

[2]  David H. Wolpert,et al.  Predicting Behavior in Unstructured Bargaining with a Probability Distribution , 2010, J. Artif. Intell. Res..

[3]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 2005, IEEE Transactions on Neural Networks.

[4]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[5]  Quanyan Zhu,et al.  GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.

[6]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.

[7]  D. Wolpert,et al.  Distribution-Valued Solution Concepts , 2013 .

[8]  M. E. Baran,et al.  Optimal sizing of capacitors placed on a radial distribution system , 1989 .

[9]  D. Wolpert,et al.  Decision-Theoretic Prediction and Policy Design of GDP Slot Auctions , 2013 .

[10]  Niels Provos,et al.  Proceedings of the 3rd conference on Hot topics in security , 2008 .

[11]  E. Lehrer Repeated Games with Stationary Bounded Recall Strategies , 1988 .

[12]  Andrew W. Moore,et al.  Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..

[13]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[14]  J. Eto,et al.  Understanding the cost of power interruptions to U.S. electricity consumers , 2004 .

[15]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[16]  William H. Sanders,et al.  Ieee Transactions on Parallel and Distributed Systems Rre: a Game-theoretic Intrusion Response and Recovery Engine , 2022 .

[17]  Michael I. Jordan,et al.  Reinforcement Learning Algorithm for Partially Observable Markov Decision Problems , 1994, NIPS.

[18]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[19]  Bart De Schutter,et al.  Reinforcement Learning and Dynamic Programming Using Function Approximators , 2010 .

[20]  David H. Wolpert,et al.  PGT: A Statistical Approach to Prediction and Mechanism Design , 2010, SBP.

[21]  David H. Wolpert,et al.  Game Theoretic Modeling of Pilot Behavior During Mid-Air Encounters , 2011, ArXiv.

[22]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[23]  Tansu Alpcan,et al.  Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.

[24]  Russell Bent,et al.  Counter-Factual Reinforcement Learning: How to Model Decision-Makers That Anticipate the Future , 2012, Decision Making and Imperfection.