Dynamic games for secure and resilient control system design

Abstract Modern control systems are featured by their hierarchical structure composed of cyber, physical and human layers. The intricate dependencies among multiple layers and units of modern control systems require an integrated framework to address cross-layer design issues related to security and resilience challenges. To this end, game theory provides a bottom-up modeling paradigm to capture the strategic interactions among multiple components of the complex system and enables a holistic view to understand and design cyber-physical-human control systems. In this review, we first provide a multi-layer perspective toward increasingly complex and integrated control systems and then introduce several variants of dynamic games for modeling different layers of control systems. We present game-theoretic methods for understanding the fundamental tradeoffs of robustness, security and resilience and developing a cross-layer approach to enhance the system performance in various adversarial environments. This review also includes three quintessential research problems that represent three research directions where dynamic game approaches can bridge between multiple research areas and make significant contributions to the design of modern control systems. The paper is concluded with a discussion on emerging areas of research that crosscut dynamic games and control systems.

[1]  Quanyan Zhu,et al.  Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks , 2019, Dynamic Games and Applications.

[2]  Quanyan Zhu,et al.  Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants , 2020, Reliab. Eng. Syst. Saf..

[3]  Quanyan Zhu,et al.  Feedback Nash Equilibrium for Randomly Switching Differential–Algebraic Games , 2020, IEEE Transactions on Automatic Control.

[4]  Quanyan Zhu,et al.  Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.

[5]  Quanyan Zhu,et al.  A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..

[6]  Quanyan Zhu,et al.  A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.

[7]  Quanyan Zhu,et al.  A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy Over Complex Networks , 2019, IEEE Transactions on Control of Network Systems.

[8]  Quanyan Zhu,et al.  Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.

[9]  Quanyan Zhu,et al.  A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design , 2020, SpringerBriefs in Electrical and Computer Engineering.

[10]  Tamer Basar,et al.  Dynamic Games in Cyber-Physical Security: An Overview , 2019, Dyn. Games Appl..

[11]  Wanlei Zhou,et al.  Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach , 2019, IEEE Transactions on Information Forensics and Security.

[12]  Quanyan Zhu,et al.  Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes , 2019, GameSec.

[13]  Quanyan Zhu,et al.  Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals , 2019, GameSec.

[14]  Quanyan Zhu,et al.  A games-in-games approach to mosaic command and control design of dynamic network-of-networks for secure and resilient multi-domain operations , 2019, Defense + Commercial Sensing.

[15]  Karl Henrik Johansson,et al.  Design of Attack-Resilient Consensus Dynamics: A Game-Theoretic Approach , 2019, 2019 18th European Control Conference (ECC).

[16]  Quanyan Zhu,et al.  Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.

[17]  Quanyan Zhu,et al.  Game theory for cyber deception: a tutorial , 2019, HotSoS.

[18]  Lei Guo,et al.  Controllability of Nash Equilibrium in Game-Based Control Systems , 2019, IEEE Transactions on Automatic Control.

[19]  Tamer Basar,et al.  Communication scheduling and remote estimation with adversarial intervention , 2019, IEEE/CAA Journal of Automatica Sinica.

[20]  Karl Henrik Johansson,et al.  A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems , 2018, 2019 American Control Conference (ACC).

[21]  Quanyan Zhu,et al.  Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.

[22]  Quanyan Zhu,et al.  iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.

[23]  Quanyan Zhu,et al.  Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.

[24]  Shreyas Sundaram,et al.  Byzantine-resilient distributed observers for LTI systems , 2018, Autom..

[25]  Quanyan Zhu,et al.  A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..

[26]  M. Pirani,et al.  A systems and control perspective of CPS security , 2019, Annu. Rev. Control..

[27]  Radha Poovendran,et al.  A Game Theoretical Framework for Inter-process Adversarial Intervention Detection , 2018, GameSec.

[28]  Quanyan Zhu,et al.  Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.

[29]  Quanyan Zhu,et al.  A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[30]  Quanyan Zhu,et al.  Game Theory Meets Network Security: A Tutorial , 2018, CCS.

[31]  Quanyan Zhu,et al.  Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems , 2018, 2018 IEEE Conference on Control Technology and Applications (CCTA).

[32]  Quanyan Zhu,et al.  A hybrid stochastic game for secure control of cyber-physical systems , 2018, Autom..

[33]  Jason R. Marden,et al.  Game Theory and Control , 2018, Annu. Rev. Control. Robotics Auton. Syst..

[34]  Quanyan Zhu,et al.  On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.

[35]  Quanyan Zhu,et al.  Factored markov game theory for secure interdependent infrastructure networks , 2018 .

[36]  Richard J. La Estimation of externalities in interdependent security: A case study of large systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[37]  Quanyan Zhu,et al.  A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.

[38]  Quanyan Zhu,et al.  Secure and practical output feedback control for cloud-enabled cyber-physical systems , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[39]  Walid Saad,et al.  Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure , 2017, ArXiv.

[40]  Ling Shi,et al.  A Game-theoretic Approach to Remote State Estimation in Presence of a DoS Attacker , 2017 .

[41]  Quanyan Zhu,et al.  Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.

[42]  Valery A. Ugrinovskii,et al.  Controller-jammer game models of Denial of Service in control systems operating over packet-dropping links , 2017, Autom..

[43]  Quanyan Zhu,et al.  Electric power dependent dynamic tariffs for water distribution systems , 2017, CySWATER@CPSWeek.

[44]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.

[45]  Quanyan Zhu,et al.  Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.

[46]  Quanyan Zhu,et al.  A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.

[47]  Sanjit Dhami,et al.  The Foundations of Behavioral Economic Analysis , 2017 .

[48]  Quanyan Zhu,et al.  A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids , 2016, IEEE Transactions on Smart Grid.

[49]  Quanyan Zhu,et al.  GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.

[50]  Quanyan Zhu,et al.  Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.

[51]  Ping Zhang,et al.  Detection of covert attacks and zero dynamics attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).

[52]  Quanyan Zhu,et al.  Cross-layer secure cyber-physical control system design for networked 3D printers , 2016, 2016 American Control Conference (ACC).

[53]  Yevgeniy Vorobeychik,et al.  Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments , 2016, GameSec.

[54]  Jing Liu,et al.  A Survey of Game Theoretic Methods for Cyber Security , 2016, 2016 IEEE First International Conference on Data Science in Cyberspace (DSC).

[55]  Walid Saad,et al.  On bounded rationality in cyber-physical systems security: Game-theoretic analysis with application to smart grid protection , 2016, 2016 Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids (CPSR-SG).

[56]  Jiming Chen,et al.  Optimal Denial-of-Service Attack Policy against Wireless Industrial Control Systems , 2016 .

[57]  Lei Guo,et al.  Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.

[58]  Quanyan Zhu,et al.  Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).

[59]  K. Ramachandran,et al.  Dynamic Game Theories in Cyber Security , 2016 .

[60]  Tamer Basar,et al.  A Zero-Sum Game Between the Network Designer and an Adversary in Consensus Protocols , 2016 .

[61]  Anuradha M. Annaswamy,et al.  Emerging research topics in control for smart infrastructures , 2016, Annu. Rev. Control..

[62]  Paul Strauss Human Factors In Engineering And Design , 2016 .

[63]  Paulo Tabuada,et al.  Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[64]  Quanyan Zhu,et al.  Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.

[65]  Quanyan Zhu,et al.  Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.

[66]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[67]  Mehdi Kharrazi,et al.  A composite-metric based path selection technique for the Tor anonymity network , 2015, J. Syst. Softw..

[68]  Yuval Elovici,et al.  Detection of malicious PDF files and directions for enhancements: A state-of-the art survey , 2015, Comput. Secur..

[69]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[70]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[71]  Quanyan Zhu,et al.  Hierarchical architectures of resilient control systems: Concepts, metrics and design principles , 2015 .

[72]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[73]  Quanyan Zhu,et al.  A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.

[74]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[75]  Aron Laszka,et al.  Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game , 2013, GameSec.

[76]  Quanyan Zhu,et al.  An impact-aware defense against Stuxnet , 2013, 2013 American Control Conference.

[77]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[78]  B. Obama Presidential Policy Directive 21: Critical Infrastructure Security and Resilience , 2013 .

[79]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[80]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[81]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[82]  W. Ziemba,et al.  Growth-optimal investments and numeraire portfolios under transactions costs , 2013 .

[83]  Quanyan Zhu,et al.  Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.

[84]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[85]  David A. Castañón,et al.  Dynamic network interdiction games with imperfect information and deception , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[86]  Quanyan Zhu,et al.  Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[87]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[88]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[89]  Quanyan Zhu,et al.  Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).

[90]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[91]  Samuel Greengard,et al.  The new face of war , 2010, Commun. ACM.

[92]  Kun Ji,et al.  Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[93]  Quanyan Zhu,et al.  Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.

[94]  Ana Sokolova,et al.  Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing , 2010, HotCloud.

[95]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[96]  Christopher A. Sims,et al.  RATIONAL INATTENTION AND MONETARY ECONOMICS , 2010 .

[97]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[98]  Huseyin Cavusoglu,et al.  Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment , 2008, J. Manag. Inf. Syst..

[99]  Richard M. Murray,et al.  Recent Research in Cooperative Control of Multivehicle Systems , 2007 .

[100]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[101]  Michael Chertoff Department of Homeland Security. , 2007, Disaster medicine and public health preparedness.

[102]  R. Pesenti,et al.  Mechanism Design for Optimal Consensus Problems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[103]  Ranjan K. Mallik,et al.  Analysis of an on-off jamming situation as a dynamic game , 2000, IEEE Trans. Commun..

[104]  J. Doyle,et al.  Essentials of Robust Control , 1997 .

[105]  Tuomas Aura Strategies against replay attacks , 1997, Proceedings 10th Computer Security Foundations Workshop.

[106]  T. Basar,et al.  H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..

[107]  Tamer Başar,et al.  H1-Optimal Control and Related Minimax Design Problems , 1995 .

[108]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[109]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[110]  R. Thaler Some empirical evidence on dynamic inconsistency , 1981 .

[111]  L. Shapley,et al.  Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.