A Game-Theoretic Approach to Network Security Mohammad Pirani and - - PowerPoint PPT Presentation

a game theoretic approach to network security
SMART_READER_LITE
LIVE PREVIEW

A Game-Theoretic Approach to Network Security Mohammad Pirani and - - PowerPoint PPT Presentation

A Game-Theoretic Approach to Network Security Mohammad Pirani and Henrik Sandberg Department of Automatic Control KTH Royal Institute of Technology Outline Defense mechanisms in cyber physical systems security Game-theoretic


slide-1
SLIDE 1

A Game-Theoretic Approach to Network Security

Mohammad Pirani and Henrik Sandberg

Department of Automatic Control KTH Royal Institute of Technology

slide-2
SLIDE 2

Outline

  • Defense mechanisms in cyber physical systems security
  • Game-theoretic approach to the visibility-impact trade-off
  • Game-theoretic approach to maximizing the attack energy
  • Conclusion and future directions
slide-3
SLIDE 3
  • 1. M. Pirani, E. Nekouei, H. Sandberg, K. H. Johansson, “A game-theoretic framework for security aware

sensor placement problem in networked control systems", Proceedings of ACC 2019, the 38th American Control Conference, Philadelphia, USA, 2019 (to appear).

  • 2. M. Pirani, E. Nekouei, S. M. Dibaji, H. Sandberg, K. H. Johansson, " Design of Attack-Resilient Consensus

Dynamics: A Game-Theoretic Approach", Proceedings of ECC 2019, the 17th European Control Conference, Naples, Italy, 2019 (to appear).

slide-4
SLIDE 4

Defense Mechanisms

We classify various defense mechanisms into three major classes: prevention, resilience, and detection.

Examples: Cryptography Randomization

Examples: Robust control methods/ event triggered control Game-theoretic methods Trust-based approaches

Examples: Observer-based methods Watermarking Learning-based anomaly detection

Dibaji, Pirani, Johansson, Annaswamy, Chakrabortty “Annual Reviews in Control”, 2019, to appear.

slide-5
SLIDE 5

A Game-Theoretic Approach to Network Security

  • We adopt some game-theoretic approach in addressing these three

defense mechanisms.

We investigate the trade-off between Impact and visibility for the attacker.

We discuss a method to increase the cost of the attack.

slide-6
SLIDE 6

Problem 1: Trade-off between visibility and impact

Objective:

  • To investigate the trade-off between visibility and impact (from the

attacker’s perspective).

slide-7
SLIDE 7

Statement of Problem 1

  • There is an attacker which tries to attack some nodes:

1. To have (large) impact on a targeted node, 2. Remains covered (as much as possible) to a set of detectors.

Attacker’s decision Detector’s decision

  • There is a detector which aims to detect the attack signals as much as

possible ሶ 𝑦 𝑢 = 𝐵𝑦 𝑢 + 𝐺𝑣 𝑢 + 𝐶𝑥 𝑢 𝑧 𝑢 = 𝐷𝑦(𝑢)

We focus on leader-follower dynamics

𝑤ℓ

slide-8
SLIDE 8

Statement of Problem 1

Game me obje jective: :

J_attack = min

𝐶

𝜏𝑛𝑏𝑦(𝐷𝑒𝑓𝑢𝑓𝑑𝑢

𝑈

𝐵−1𝐶) − 𝜇𝜏𝑛𝑏𝑦(𝐷𝑢𝑏𝑠𝑕𝑓𝑢

𝑈

𝐵−1𝐶) , 𝜇 ≥ 0 J_defender = max

𝐷𝑒𝑓𝑢𝑓𝑑𝑢𝑝𝑠 𝜏𝑛𝑏𝑦(𝐷𝑒𝑓𝑢𝑓𝑑𝑢 𝑈

𝐵−1𝐶) − 𝜇𝜏𝑛𝑏𝑦(𝐷𝑢𝑏𝑠𝑕𝑓𝑢

𝑈

𝐵−1𝐶) , 𝜇 ≥ 0

visibility Impact

Sy System no norm rm fro rom the attack sign ignal 𝒙 𝒖 to

  • the ou
  • utput of
  • f int

nterest: 𝐻

∞ = 𝜏𝑛𝑏𝑦(𝐷𝑈𝐵−1𝐶)

  • The way we quantify attack impacts on targeted node and on the sensor is

via system norms.

𝑤ℓ

slide-9
SLIDE 9

Applications

  • Formation of autonomous

agents:

Force

Distance

  • Rel. Velocity

External attack

  • Voltage control in power grids:

Frequency External attack

Mechanical and Electrical powers

  • Opinion Dynamics in the presence of stubborn

agents:

Level of Stubbornness

slide-10
SLIDE 10

Detectability-Impact Tradeoff

  • What is the effect of 𝜇 on the game value 𝐾∗ and game strategies?
  • Parameter 𝜇 characterizes the domination of visibility with respect to the

impact.

Ga Game ob

  • bje

jective: : J= min

𝐶

𝐷𝑒𝑓𝑢𝑓𝑑𝑢

𝑈

𝐵−1𝐶 − 𝜇𝐷𝑢𝑏𝑠𝑕𝑓𝑢

𝑈

𝐵−1𝐶 , 𝜇 ≥ 0 J= max

𝐷𝑒𝑓𝑢𝑓𝑑𝑢𝑝𝑠 𝐷𝑒𝑓𝑢𝑓𝑑𝑢 𝑈

𝐵−1𝐶 − 𝜇𝐷𝑢𝑏𝑠𝑕𝑓𝑢

𝑈

𝐵−1𝐶 , 𝜇 ≥ 0

Detectability(visibility) Impact

slide-11
SLIDE 11

1 𝑥1 ℓ𝑘 𝐾∗ 𝜇

1 NE: Detector

𝑥1 𝑥2

𝑤ℓ 𝑘

𝑥3 𝑥4 𝑥5

NE: Attacker

for 𝜇 < 1 NE: Attacker for 𝜇 > 1

Game Value 𝐾∗ vs 𝜇 for Undirected Trees

Smaller ℓ𝑘 → larger game value ℓ𝑘 ≥

1 𝑥1 → Best place for the critical node is the

leader’s neighbor

Visibility-Impact Tradeoff: Undirected Trees

ℓ𝑘 = 1

𝑥1+ 1 𝑥2+ 1 𝑥3

Domination of detectability Domination

  • f impact

Effective admitance between 𝒌 and ℓ

slide-12
SLIDE 12

NE Strategies for Undirected and Directed Trees

slide-13
SLIDE 13

Applications to Secure Vehicle Platooning

  • Consider a network of connected vehicles.
  • Each vehicle tends to track a particular velocity (introduced by the leader), while

remains in a specific distance from its neighbors.

2 3

𝑤ℓ

4

Δ43 Δ32 Δ21 Δ1ℓ 𝑤1 = 𝑤ℓ 𝑤2 = 𝑤ℓ 𝑤3 = 𝑤ℓ 𝑤4 = 𝑤ℓ

slide-14
SLIDE 14
  • Consider a network of connected vehicles.
  • Each vehicle tends to track a particular velocity (introduced by the leader), while

remains in a specific distance from its neighbors.

2 3

𝑤ℓ

4

Δ43 Δ32 Δ21 Δ1ℓ 𝑤1 = 𝑤ℓ 𝑤2 = 𝑤ℓ 𝑤3 = 𝑤ℓ 𝑤4 = 𝑤ℓ

ሷ 𝑞𝑗 𝑢 = ෍

𝑘∈𝑂𝑗

𝑙𝑞 𝑞𝑘 𝑢 − 𝑞𝑗 𝑢 + Δ𝑗𝑘 + 𝑙𝑣 𝑣𝑘 𝑢 − 𝑣𝑗 𝑢 + 𝑥𝑗(𝑢)

Position of 𝑤𝑗 Desired inter-vehicular distance Velocity of 𝑤𝑗

Attack signal Dimension: acceleration

Secure Vehicle Platooning - Dynamics

slide-15
SLIDE 15

Secure Vehicle Platooning - Dynamics

2 3

𝑤ℓ

4

Δ43 Δ32 Δ21 Δ1ℓ 𝑤1 = 𝑤ℓ 𝑤2 = 𝑤ℓ 𝑤3 = 𝑤ℓ 𝑤4 = 𝑤ℓ

Attack signal

Sensor measurements: velocities Matrices 𝐶 and 𝐷 are similar to what was defined previously.

slide-16
SLIDE 16

Secure Vehicle Platooning - Dynamics

2 3

𝑤ℓ

4

Δ43 Δ32 Δ21 Δ1ℓ 𝑤1 = 𝑤ℓ 𝑤2 = 𝑤ℓ 𝑤3 = 𝑤ℓ 𝑤4 = 𝑤ℓ 𝑀2 gain from 𝑥 𝑢 to 𝑧(𝑢)= −𝐷𝐵−1𝐶 =

𝟐 𝒍𝒒 𝑫𝑴𝒉 −𝟐𝑪

slide-17
SLIDE 17

Equilibrium Analysis for Symmetric Platooning

2 3

𝑤ℓ

4

Theorem: For a leader-follower vehicle platoon under 𝑔 attacks and 𝑔 detectors both directed and undrected networks, there exists an equilibrium which happens when the detector places 𝑔 sensors in the farthest nodes from the leader.

Attacker should solve an optimization problem to find its best strategy. It is computationally hard, but it is the attacker’s business!

2 3

𝑤ℓ

4

Remark: The game value for directed graphs is smaller than that of undirected graphs.

slide-18
SLIDE 18
  • A Prevention approach is to increase the cost (energy) of the attack.
  • Previous methods usually demand a large graph connectivity.

Problem 2: Prevention

slide-19
SLIDE 19

Statement of Problem 2

  • There is an attacker which targets some nodes to steer the consensus dynamics

into its desired direction with minimum energy, and a defender which tries to maximize this energy.

ሶ 𝑦 𝑢 = (𝐵 + 𝑪𝐿)𝑦 𝑢 + ഥ 𝑪𝑥 𝑢

Ga Game ob

  • bje

jective: : J_defender= min

𝐶

𝑢𝑠𝑏𝑑𝑓 ( ത 𝐶𝑈 𝐵 + 𝐶𝐿 ത 𝐶) J_attacker= max

ത 𝐶

𝑢𝑠𝑏𝑑𝑓 ( ത 𝐶𝑈 𝐵 + 𝐶𝐿 ത 𝐶)

Attacker Defender

Defender’s action Attacker’s action

𝑥 𝑢 𝑙 𝑙

This energy is characterized via the trace of the controllability Gramian, obtained by solving the Lyapunov equation. This game does not admit a NE. We adopt a Stackelberg game strategy (defender is the leader).

slide-20
SLIDE 20

Optimal Placement of Defenders

  • What does the equilibrium of this game tell us about the

locations of defender nodes?

Definition (Graph Center): The center of a graph is a set of vertices whose maximum distance from any other node in the network is minimum. Definition (Graph 𝒈 −Center): The 𝑔 −center of a graph is a vertex whose maximum summation of distances to any combination of 𝑔 nodes in the network is minimum.

Center

slide-21
SLIDE 21

Optimal Placement of Defenders

  • Theorem: a solution of the game is when the defender chooses the weighted 𝑔 −center of

the graph and the attackers choose the farthest 𝑔 nodes from the 𝑔 −center.

The graph 𝑔 −center can be arbitrarily different from degree based centralities.

✓ For general undirected graphs, the distance between two nodes is replaces with their effective resistance. ✓ The above theorem will hold, only replace 𝑔 −center with effective 𝑔 −center.

slide-22
SLIDE 22

Summary

Energy maximization Via controllability Gramian for the attacker

Trade-off between Impact, visibility, and robustness.

slide-23
SLIDE 23

Future Direction

  • To extend the theoretical results to capture more general

dynamical systems on more general graph topologies.

slide-24
SLIDE 24

Thank You