Hypergames and Cyber-Physical Security for Control Systems

The identification of the Stuxnet worm in 2010 provided a highly publicized example of a cyber attack that physically damaged an industrial control system. This raised public awareness about the possibility of similar attacks against other industrial targets—including critical infrastructure. In this article, we use hypergames to analyze how strategic perturbations of sensor readings and calibrated parameters can be used to manipulate a system that employs optimal control. Hypergames form an extension of game theory that enables us to model strategic interactions where the players may have significantly different perceptions of the game(s) they are playing. Past work with hypergames has focused on relatively simple interactions consisting of a small set of discrete choices for each player. Here, we apply single-stage hypergames to larger systems with continuous variables. We find that manipulating constraints can be a more effective attacker strategy than manipulating objective function parameters. Moreover, the attacker need not change the underlying system to carry out a successful attack—it may be sufficient to deceive the defender controlling the system. It is possible to scale our approach up to even larger systems, but this will depend on the characteristics of the system in question, and we identify several characteristics that will make those systems amenable to hypergame analysis.

[1]  Kyoichi Kijima,et al.  Hierarchical hypergames and Bayesian games: A generalization of the theoretical comparison of hypergames and Bayesian games considering hierarchy of perceptions , 2016, J. Syst. Sci. Complex..

[2]  Bahman Gharesifard,et al.  Exploration of misperceptions in hypergames , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Dorothy E. Denning Stuxnet: What Has Changed? , 2012, Future Internet.

[4]  A. McKinnon,et al.  Hypergame analysis of the stability of relationships between computerbased logistics systems , 1992 .

[5]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[6]  Bahman Gharesifard,et al.  Evolution of the perception about the opponent in hypergames , 2010, 49th IEEE Conference on Decision and Control (CDC).

[7]  Ralph Langner To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .

[8]  Victor R. Lesser,et al.  Coalitions Among Computationally Bounded Agents , 1997, Artif. Intell..

[9]  Mordechai Guri,et al.  HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System , 2017, ArXiv.

[10]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[11]  Thomas M. Chen,et al.  Lessons from Stuxnet , 2011, Computer.

[12]  D. Stahl,et al.  On Players' Models of Other Players: Theory and Experimental Evidence , 1995 .

[13]  Keith W. Hipel,et al.  Hypergame Analysis of the Lake Biwa Conflict , 1985 .

[14]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[15]  Jon R. Lindsay,et al.  Stuxnet and the Limits of Cyber Warfare , 2013 .

[16]  H. K. Verma,et al.  Design and Development of Wired Building Automation Systems , 2015 .

[17]  Craig Boutilier,et al.  Economic Principles of Multi-Agent Systems , 1997, Artif. Intell..

[18]  Mohammed H. Almeshekah,et al.  Modeling deception in information security as a hypergame: a primer , 2015 .

[19]  Wolfgang Kastner,et al.  Communication systems for building automation and control , 2005, Proceedings of the IEEE.

[20]  Bruce M. McMillin,et al.  A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust , 2014, 2014 Eighth International Conference on Software Security and Reliability.

[21]  Levente Buttyán,et al.  The Cousins of Stuxnet: Duqu, Flame, and Gauss , 2012, Future Internet.

[22]  Arnab Bhattacharya,et al.  Learning and Information Manipulation: Repeated Hypergames for Cyber-Physical Security , 2020, IEEE Control Systems Letters.

[23]  Yasuo Sasaki Preservation of Misperceptions – Stability Analysis of Hypergames , 2008 .

[24]  Lillykutty Jacob,et al.  Energy efficient wireless networked Building Automation System controlled by real occupancy , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[25]  Tatsushi Yamasaki,et al.  Replicator dynamics of evolutionary hypergames , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[26]  George Cybenko,et al.  Hypergame theory applied to cyber attack and defense , 2010, Defense + Commercial Sensing.

[27]  B. Hobbs,et al.  A tutorial review of complementarity models for decision-making in energy markets , 2014 .

[28]  Gary B. Lamont,et al.  Hypergame Theory: A Model for Conflict, Misperception, and Deception , 2015 .

[29]  Kyoichi Kijima,et al.  Hypergames and bayesian games: A theoretical comparison of the models of games with incomplete information , 2012, J. Syst. Sci. Complex..

[30]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[31]  A. Roth The Economist as Engineer: Game Theory, Experimentation, and Computation as Tools for Design Economics , 2002 .

[32]  Takehiro Inohara,et al.  Evolutionary approach to three-person hypergame situation , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).

[33]  Colin Camerer,et al.  A Cognitive Hierarchy Model of Games , 2004 .

[34]  Peter G. Bennett,et al.  Hypergames: Developing a model of conflict☆ , 1980 .

[35]  J. Sákovics Games of Incomplete Information Without Common Knowledge Priors , 2001 .

[36]  Stuart E. Madnick,et al.  A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet , 2018, IEEE Transactions on Dependable and Secure Computing.

[37]  Wu Qiuxuan,et al.  Study on monitor system of heating ventilation air conditioning based on LonWorks technology , 2009 .

[38]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[39]  Alexander G. Chkhartishvili,et al.  Reflexion and Control: Mathematical Models , 2014 .

[40]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.