Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems

Critical infrastructures, such as power grids and transportation systems, are increasingly using open networks for operation. The use of open networks poses many challenges for control systems. The classical design of control systems takes into account modeling uncertainties as well as physical disturbances, providing a multitude of control design methods such as robust control, adaptive control, and stochastic control. With the growing level of integration of control systems with new information technologies, modern control systems face uncertainties not only from the physical world but also from the cybercomponents of the system. The vulnerabilities of the software deployed in the new control system infrastructure will expose the control system to many potential risks and threats from attackers. Exploitation of these vulnerabilities can lead to severe damage as has been reported in various news outlets [1], [2]. More recently, it has been reported in [3] and [4] that a computer worm, Stuxnet, was spread to target Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes.

[1]  Mark Fabro,et al.  Control Systems Cyber Security: Defense-in-Depth Strategies , 2006 .

[2]  Craig G. Rieger Notional examples and benchmark aspects of a resilient control system , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[3]  Ahmad Haidar,et al.  Robust stability criteria for Markovian jump singular systems with time-varying delays , 2008, 2008 47th IEEE Conference on Decision and Control.

[4]  Quanyan Zhu,et al.  Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).

[5]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[6]  Quanyan Zhu,et al.  Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[7]  Quanyan Zhu,et al.  Hybrid Learning in Stochastic Games and Its Application in Network Security , 2013 .

[8]  Quanyan Zhu,et al.  A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.

[9]  David Salt,et al.  Resilience Thinking : Sustaining Ecosystems and People in a Changing World , 2017 .

[10]  Alejandro D. Domínguez-García,et al.  A Generalized Fault Coverage Model for Linear Time-Invariant Systems , 2009, IEEE Transactions on Reliability.

[11]  Quanyan Zhu,et al.  Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.

[12]  Brian Randell,et al.  Reliability Issues in Computing System Design , 1978, CSUR.

[13]  J. Doyle,et al.  Essentials of Robust Control , 1997 .

[14]  M. Price Panarchy: Understanding Transformations in Human and Natural Systems , 2003 .

[15]  John K Munro,et al.  Cybersecurity through Real-Time Distributed Control Systems , 2010 .

[16]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach (6th Edition) , 2007 .

[17]  J. Filar,et al.  Competitive Markov Decision Processes , 1996 .

[18]  T. E. S. Raghavan,et al.  Algorithms for stochastic games — A survey , 1991, ZOR Methods Model. Oper. Res..

[19]  T. Basar,et al.  H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..

[20]  J. Neumann Zur Theorie der Gesellschaftsspiele , 1928 .

[21]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[22]  Quanyan Zhu,et al.  Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.

[23]  Quanyan Zhu,et al.  Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[24]  Tansu Alpcan,et al.  Network Security , 2010 .

[25]  Kun Ji,et al.  Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[26]  T. Başar Minimax control of switching systems under sampling , 1994, Proceedings of 1994 33rd IEEE Conference on Decision and Control.

[27]  Quanyan Zhu,et al.  Deceptive Routing in Relay Networks , 2012, GameSec.

[28]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[29]  Samuel Greengard,et al.  The new face of war , 2010, Commun. ACM.

[30]  Quanyan Zhu,et al.  Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.

[31]  Ron Johnson,et al.  El comercio minorista no está en bancarrota, las tiendas sí , 2012 .

[32]  T. Başar Minimax control of switching systems under sampling , 1994, Proceedings of 1994 33rd IEEE Conference on Decision and Control.

[33]  Quanyan Zhu,et al.  A hierarchical security architecture for smart grid , 2010 .

[34]  Quanyan Zhu,et al.  Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[35]  David I. Gertman,et al.  Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.

[36]  Tamer Basar,et al.  H infintity control of large-scale jump linear systems via averaging and aggregation , 1999 .

[37]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach , 1999 .

[38]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[39]  Robert L. Wears,et al.  Resilience Engineering: Concepts and Precepts , 2006, Quality and Safety in Health Care.

[40]  Quanyan Zhu,et al.  Management of Control System Information SecurityI: Control System Patch Management , 2011 .

[41]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[42]  Onésimo Hernández-Lerma,et al.  Zero-Sum Stochastic Games in Borel Spaces: Average Payoff Criteria , 2000, SIAM J. Control. Optim..

[43]  Marija D. Ilic,et al.  From Hierarchical to Open Access Electric Power Systems , 2007, Proceedings of the IEEE.

[44]  L. Shapley,et al.  Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.

[45]  Miles A. McQueen,et al.  Ideal Based Cyber Security Technical Metrics for Control Systems , 2007, CRITIS.

[46]  Richard L. Tweedie,et al.  Markov Chains and Stochastic Stability , 1993, Communications and Control Engineering Series.

[47]  Erik Hollnagel,et al.  Resilience Engineering in Practice: A Guidebook , 2012 .

[48]  Quanyan Zhu,et al.  Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.