A games-in-games approach to mosaic command and control design of dynamic network-of-networks for secure and resilient multi-domain operations

This paper presents a games-in-games approach to provide design guidelines for mosaic command and control that enables the secure and resilient multi-domain operations. Under the mosaic design, pieces or agents in the network are equipped with flexible interoperability and the capability of self-adaptability, self-healing, and resiliency so that they can reconfigure their responses to achieve the global mission in spite of failures of nodes and links in the adversarial environment. The proposed games-in-games approach provides a system-of-systems science for mosaic distributed design of large-scale systems. Specifically, the framework integrates three layers of design for each agent including strategic layer, tactical layer, and mission layer. Each layer in the established model corresponds to a game of a different scale that enables the integration of threat models and achieve self-mitigation and resilience capabilities. The solution concept of the developed multi-layer multi-scale mosaic design is characterized by Gestalt Nash equilibrium (GNE) which considers the interactions between agents across different layers. The developed approach is applicable to modern battlefield networks which are composed of heterogeneous assets that access highly diverse and dynamic information sources over multiple domains. By leveraging mosaic design principles, we can achieve the desired operational goals of deployed networks in a case study and ensure connectivity among entities for the exchange of information to accomplish the mission.

[1]  Quanyan Zhu,et al.  Optimal Quarantining Strategy for Interdependent Epidemics Spreading over Complex Networks , 2020, ArXiv.

[2]  Quanyan Zhu,et al.  Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.

[3]  Quanyan Zhu,et al.  A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.

[4]  Quanyan Zhu,et al.  Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.

[5]  Quanyan Zhu,et al.  A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design , 2020, SpringerBriefs in Electrical and Computer Engineering.

[6]  Quanyan Zhu,et al.  Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.

[7]  Quanyan Zhu,et al.  Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.

[8]  Quanyan Zhu,et al.  iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Quanyan Zhu,et al.  Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Quanyan Zhu,et al.  A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..

[11]  Ehab Al-Shaer,et al.  Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2019 .

[12]  Kevin W. Hamlen,et al.  Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings , 2019, Springer International Publishing.

[13]  Quanyan Zhu,et al.  A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[14]  Quanyan Zhu,et al.  DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).

[15]  Stefan Rass,et al.  Game Theory for Security and Risk Management: From Theory to Practice , 2018 .

[16]  Quanyan Zhu,et al.  A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things , 2018, IEEE Transactions on Cognitive Communications and Networking.

[17]  Quanyan Zhu,et al.  Security investment under cognitive constraints: A Gestalt Nash equilibrium approach , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).

[18]  Quanyan Zhu,et al.  On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT) , 2018, IEEE Transactions on Wireless Communications.

[19]  Quanyan Zhu,et al.  A network framework for dynamic models of urban food, energy and water systems (FEWS) , 2018 .

[20]  Quanyan Zhu,et al.  Factored markov game theory for secure interdependent infrastructure networks , 2018 .

[21]  Quanyan Zhu,et al.  Conceptual Modeling Framework to Integrate Resilient and Interdependent Infrastructure in Extreme Weather , 2017 .

[22]  D. Perkins Multi-Domain Battle the Advent of Twenty-First Century War , 2017 .

[23]  Quanyan Zhu,et al.  A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.

[24]  Quanyan Zhu,et al.  Secure and practical output feedback control for cloud-enabled cyber-physical systems , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[25]  David G. Perkins Preparing for the Fight Tonight: Multi-Domain Battle and Field Manual 3-0 , 2017 .

[26]  Quanyan Zhu,et al.  Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games , 2017, IEEE Transactions on Information Forensics and Security.

[27]  Quanyan Zhu,et al.  A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125 , 2017, PERV.

[28]  Quanyan Zhu,et al.  Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control , 2017, IEEE Transactions on Information Forensics and Security.

[29]  David G. Perkins,et al.  Multi-Domain Battle: Driving Change to Win in the Future , 2017 .

[30]  Quanyan Zhu,et al.  Interdependent strategic cyber defense and robust switching control design for wind energy systems , 2017, 2017 IEEE Power & Energy Society General Meeting.

[31]  Quanyan Zhu,et al.  Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[32]  Quanyan Zhu,et al.  Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.

[33]  Quanyan Zhu,et al.  Electric power dependent dynamic tariffs for water distribution systems , 2017, CySWATER@CPSWeek.

[34]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.

[35]  Quanyan Zhu,et al.  A factored MDP approach to optimal mechanism design for resihent large-scale interdependent critical infrastructures , 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).

[36]  Quanyan Zhu,et al.  A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.

[37]  Quanyan Zhu,et al.  A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids , 2016, IEEE Transactions on Smart Grid.

[38]  Bernd Finkbeiner,et al.  Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles , 2017, SCAV@CPSWeek.

[39]  Quanyan Zhu,et al.  FACID: A trust-based collaborative decision framework for intrusion detection networks , 2016, Ad Hoc Networks.

[40]  Quanyan Zhu,et al.  Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.

[41]  Peng Liu,et al.  Proceedings of the 2016 ACM Workshop on Moving Target Defense , 2016, MTD@CCS.

[42]  Azer Bestavros,et al.  Markov Modeling of Moving Target Defense Games , 2016, MTD@CCS.

[43]  Quanyan Zhu,et al.  Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).

[44]  Quanyan Zhu,et al.  Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).

[45]  Kristian Weium Lange,et al.  Cybersecurity in the Internet of Things , 2016 .

[46]  Sushil Jajodia,et al.  Cyber Deception , 2016, Springer International Publishing.

[47]  Quanyan Zhu,et al.  Resilient control design for wind turbines using Markov jump linear system model with lévy noise , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[48]  Stefan Katzenbeisser,et al.  Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015 , 2015, CPS-SPC@CCS.

[49]  Quanyan Zhu,et al.  Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.

[50]  Quanyan Zhu,et al.  A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[51]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[52]  Quanyan Zhu,et al.  Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.

[53]  Quanyan Zhu,et al.  GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.

[54]  Ehab Al-Shaer,et al.  Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.

[55]  Proceedings of the first workshop on Hot topics in software defined networks, HotSDN@SIGCOMM 2012, Helsinki, Finland, August 13, 2012 , 2012, HotSDN@SIGCOMM.

[56]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.