iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.3390/G9030052
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T22:17:44Z","timestamp":1719008264541},"reference-count":48,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T00:00:00Z","timestamp":1532304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC05-00OR22725"],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Games"],"abstract":"In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to one component may affect others and possibly the entire infrastructure. Such correlations must be explicitly taken into account in ensuring the survival of the infrastructure. For large discrete infrastructures characterized by the number of cyber and physical components, we characterize the cyber\u2013physical interactions at two levels: (i) the cyber\u2013physical failure correlation function specifies the conditional survival probability of the cyber sub-infrastructure given that of the physical sub-infrastructure (both specified by their marginal probabilities), and (ii) individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions expressed in terms of their multiplier functions. We formulate an abstract problem of ensuring the survival probability of a cyber\u2013physical infrastructure with discrete components as a game between the provider and attacker, whose utility functions are composed of infrastructure survival probability terms and cost terms, both expressed in terms of the number of components attacked and reinforced. We derive Nash equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure survival probability on cost terms, correlation functions, multiplier functions, and sub-infrastructure survival probabilities. We apply these analytical results to characterize the defense postures of simplified models of metro systems, cloud computing infrastructures, and smart power grids.<\/jats:p>","DOI":"10.3390\/g9030052","type":"journal-article","created":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T06:58:56Z","timestamp":1532415536000},"page":"52","source":"Crossref","is-referenced-by-count":6,"title":["Cyber\u2013Physical Correlation Effects in Defense Games for Large Discrete Infrastructures"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3408-5941","authenticated-orcid":false,"given":"Nageswara S. V.","family":"Rao","sequence":"first","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA"}]},{"given":"Chris Y. T.","family":"Ma","sequence":"additional","affiliation":[{"name":"Hang Seng Management College, Hong Kong, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9092-1548","authenticated-orcid":false,"given":"Fei","family":"He","sequence":"additional","affiliation":[{"name":"The Department of Mechanical and Industrial Engineering, Texas A&M University, Kingsville, TX 78363, USA"}]},{"given":"David K. Y.","family":"Yau","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4830-6570","authenticated-orcid":false,"given":"Jun","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, State University of New York at Buffalo, Buffalo, NY 14260, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,7,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Ma, C.Y.T., Hausken, K., He, F., Yau, D.K.Y., and Zhuang, J. (2018). Defense Strategies for Asymmetric Networked Systems with Discrete Components. Sensors, 18.","DOI":"10.3390\/s18051421"},{"key":"ref_2","unstructured":"Rao, N.S.V., Ma, C.Y.T., He, F., Zhuang, J., and Yau, D.K.Y. (2014, January 7\u201310). Cyber-physical correlations for infrastructure resilience: A game-theoretic approach. Proceedings of the International Conference on Information Fusion, Salamanca, Spain."},{"key":"ref_3","unstructured":"Rao, N.S.V., Ma, C.Y.T., Shah, U., Zhuang, J., He, F., and Yau, D.K.Y. (2015, January 6\u20139). On resilience of cyber-physical infrastructures using discrete product-form games. Proceedings of the International Conference on Information Fusion, Washington, DC, USA."},{"key":"ref_4","unstructured":"Rao, N.S.V., Poole, S.W., Ma, C.Y.T., He, F., Zhuang, J., and Yau, D.K.Y. (2013, January 9\u201312). Cyber and physical information fusion for infrastructure protection: A game-theoretic approach. Proceedings of the International Conference on Information Fusion, Istanbul, Turkey."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Poole, S.W., Ma, C.Y.T., He, F., Zhuang, J., and Yau, D.K.Y. (2013, January 13\u201315). Infrastructure resilience using cyber-physical game-theoretic approach. Proceedings of the International Symposium on Resilient Cyber System, San Francisco, CA, USA.","DOI":"10.1109\/ISRCS.2013.6623746"},{"key":"ref_6","unstructured":"Fudenberg, D., and Tirole, J. (2003). Game Theory, MIT Press."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Rass, S., An, B., Kiekintveld, C., Fang, F., and Schauer, S. (2017). On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. Decision and Game Theory for Security, Springer International Publishing.","DOI":"10.1007\/978-3-319-68711-7_26"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Ma, C.Y.T., and He, F. (2018, January 4\u20137). Defense strategies for multi-site cloud computing server infrastructures. Proceedings of the International Conference on Distributed Computing and Networking, Varanasi, India.","DOI":"10.1145\/3154273.3154344"},{"key":"ref_9","unstructured":"DHS (2015). Critical Infrastructure Sectors, DHS."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/37.969131","article-title":"Identifying, understanding, and analyzing critical infrastructure interdependencies","volume":"21","author":"Rinaldi","year":"2001","journal-title":"IEEE Control Syst."},{"key":"ref_11","first-page":"532","article-title":"Defending Critical Infrastructure","volume":"36","author":"Brown","year":"2006","journal-title":"Interfaces"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Brown, G., Carlyle, M., Salmeron, J., and Wood, K. (2005). Analyzing the vulnerability of critical infrastructure to attack and planning defenses. Tutorials in Operations Research: Emerging Theory, Methods, and Applications, INFORMS.","DOI":"10.1287\/educ.1053.0018"},{"key":"ref_13","unstructured":"Moteff, J., and Parfomak, P. (2004). Critical Infrastructure and Key Assets: Definition and Identification, DTIC. DTIC Document."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1016\/j.cor.2006.09.019","article-title":"A bilevel mixed-integer program for critical infrastructure protection planning","volume":"35","author":"Scaparra","year":"2008","journal-title":"Comput. Oper. Res."},{"key":"ref_15","unstructured":"Lewis, T.G. (2014). Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, John Wiley & Sons."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/TETC.2013.2273457","article-title":"A game-theoretical scheme in the smart grid with demand-side management: Towards a smart cyber-physical power infrastructure","volume":"1","author":"Bu","year":"2013","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TSG.2012.2226919","article-title":"Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid","volume":"4","author":"Hahn","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Karnouskos, S. (2011, January 26\u201329). Cyber-physical systems in the smartgrid. Proceedings of the 2011 9th IEEE International Conference on Industrial Informatics (INDIN), Lisbon, Portugal.","DOI":"10.1109\/INDIN.2011.6034829"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber\u2013physical security of a smart grid infrastructure","volume":"100","author":"Mo","year":"2012","journal-title":"Proc. IEEE"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Pasqualetti, F., D\u00f6rfler, F., and Bullo, F. (2011, January 12\u201315). Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. Proceedings of the 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), Orlando, FL, USA.","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kure, H.I., Islam, S., and Razzaque, M.A. (2018). An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Appl. Sci., 8.","DOI":"10.3390\/app8060898"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bier, V.M., and Azaiez, M.N. (2009). (Eds.) Game Theoretic Risk Analysis of Security Threats, Springer.","DOI":"10.1007\/978-0-387-87767-9"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1177\/1046878103255492","article-title":"Terrorism & game theory","volume":"34","author":"Sandler","year":"2003","journal-title":"Simul. Gaming"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1080\/0740817X.2010.541178","article-title":"Strategic defense and attack of series systems when agents move sequentially","volume":"43","author":"Hausken","year":"2011","journal-title":"IIE Trans."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Cardenas, A.A., Amin, S., and Sastry, S. (2008, January 17\u201320). Secure control: Towards survivable cyber-physical systems. Proceedings of the The 28th International Conference on Distributed Computing Systems Workshops, Beijing, China.","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCOM.2012.6257523","article-title":"Smart attacks in smart grid communication networks","volume":"50","author":"Chen","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Shiva, S., Roy, S., and Dasgupta, D. (2010, January 21\u201323). Game theory for cyber security. Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA.","DOI":"10.1145\/1852666.1852704"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2480741.2480742","article-title":"Game theory meets network security and privacy","volume":"45","author":"Manshaei","year":"2013","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"33","DOI":"10.5711\/1082598318233","article-title":"Technology Adoption, Accumulation, and Competition in Multi-period Attacker-Defender Games","volume":"18","author":"Jose","year":"2013","journal-title":"Mil. Oper. Res."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1057\/jors.2011.49","article-title":"Modelling `contracts\u2019 between a terrorist group and a government in a sequential game","volume":"63","author":"He","year":"2012","journal-title":"J. Oper. Res. Soc."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ijcip.2009.10.002","article-title":"Critical infrastructure protection under imperfect attacker perception","volume":"3","author":"Jenelius","year":"2010","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"930","DOI":"10.1111\/j.1539-6924.2011.01702.x","article-title":"Robust Allocation of a Defensive Budget Considering an Attackers Private Information","volume":"32","author":"Nikoofal","year":"2012","journal-title":"Risk Anal."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1111\/j.1539-6924.2012.01919.x","article-title":"Cost of Equity in Homeland Security Resource Allocation In the Face of A Strategic Attacker","volume":"33","author":"Shan","year":"2013","journal-title":"Risk Anal."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.ejor.2013.01.029","article-title":"Hybrid Defensive Resource Allocations in the Face of Partially Strategic Attackers in a Sequential Defender-attacker Game","volume":"228","author":"Shan","year":"2013","journal-title":"Eur. J. Oper. Res."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"355","DOI":"10.23940\/ijpe.12.4.p355.mag","article-title":"Review of Systems Defense and Attack Models","volume":"8","author":"Hausken","year":"2012","journal-title":"Int. J. Perform. Eng."},{"key":"ref_36","unstructured":"Das, S.K., Kant, K., and Zhang, N. (2012). An Analytical Framework for Cyber-Physical Networks, Morgan Kaufman."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/TSG.2012.2223243","article-title":"Scalable solutions of Markov games for smart-grid infrastructure protection","volume":"4","author":"Ma","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Ma, C.Y.T., and Yau, D.K.Y. (2011). On robustness of a class of cyber-physical network infrastructures. Workshop on Design, Modeling and Evaluation of Cyber Physical Systems, IEEE.","DOI":"10.1109\/IWCMC.2011.5982650"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/TPWRS.2012.2226480","article-title":"Markov game analysis for attack-defense of power networks under possible misinformation","volume":"28","author":"Ma","year":"2013","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Alpcan, T., and Basar, T. (2011). Network Security: A Decision and Game Theoretic Approach, Cambridge University Press.","DOI":"10.1017\/CBO9780511760778"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1111\/risa.12362","article-title":"Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models","volume":"36","author":"Rao","year":"2016","journal-title":"Risk Anal."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"He, F., Zhuang, J., Rao, N.S.V., Ma, C.Y.T., and Yau, D.K.Y. (2013, January 8\u201311). Game-Theoretic resilience analysis of cyber-physical systems. Proceedings of the IEEE Conference on Cyber Physical Systems, Networks and Applications, Philadelphia, PA, USA.","DOI":"10.1109\/CPSNA.2013.6614252"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Imam, N., Ma, C.Y.T., Hausken, K., He, F., and Zhuang, J. (2017, January 24\u201327). On defense strategies for system of systems using aggregated correlations. Proceedings of the 11th Annual IEEE International Systems Conference, Montreal, QC, Canada.","DOI":"10.1109\/SYSCON.2017.7934817"},{"key":"ref_44","unstructured":"Rao, N.S.V., Ma, C.Y.T., Hausken, K., He, F., and Zhuang, J. (2016, January 5\u20138). Defense strategies for infrastructures with multiple systems of components. Proceedings of the International Conference on Information Fusion, Heidelberg, Germany."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Ma, C.Y.T., Hausken, K., He, F., Yau, D.K.Y., and Zhuang, J. (2017, January 10\u201313). Game-Theoretic strategies for asymmetric networked systems. Proceedings of the International Conference on Information Fusion, Xi\u2019an, China.","DOI":"10.23919\/ICIF.2017.8009874"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Ma, C.Y.T., Hausken, K., He, F., Yau, D.K.Y., and Zhuang, J. (2017, January 16\u201318). Defense strategies for asymmetric networked systems under composite utilities. Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Daegu, Korea.","DOI":"10.1109\/MFI.2017.8170351"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Ma, C.Y.T., Hausken, K., He, F., and Zhuang, J. (2016, January 19\u201321). Game-Theoretic strategies for systems of components using product-form utilities. Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Baden, Germany.","DOI":"10.1109\/MFI.2016.7849511"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Rao, N.S.V., Ma, C.Y.T., and He, F. (2018, January 10\u201313). On defense strategies for recursive system of systems using aggregated correlations. Proceedings of the International Conference on Information Fusion, Cambridge, UK.","DOI":"10.23919\/ICIF.2018.8455421"}],"container-title":["Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-4336\/9\/3\/52\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T21:13:00Z","timestamp":1718140380000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-4336\/9\/3\/52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,23]]},"references-count":48,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["g9030052"],"URL":"http:\/\/dx.doi.org\/10.3390\/g9030052","relation":{},"ISSN":["2073-4336"],"issn-type":[{"value":"2073-4336","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,23]]}}}