a game theoretic approach to network security
play

A Game-Theoretic Approach to Network Security Mohammad Pirani and - PowerPoint PPT Presentation

A Game-Theoretic Approach to Network Security Mohammad Pirani and Henrik Sandberg Department of Automatic Control KTH Royal Institute of Technology Outline Defense mechanisms in cyber physical systems security Game-theoretic


  1. A Game-Theoretic Approach to Network Security Mohammad Pirani and Henrik Sandberg Department of Automatic Control KTH Royal Institute of Technology

  2. Outline • Defense mechanisms in cyber physical systems security • Game-theoretic approach to the visibility-impact trade-off • Game-theoretic approach to maximizing the attack energy • Conclusion and future directions

  3. 1. M. Pirani, E. Nekouei , H. Sandberg, K. H. Johansson, “A game -theoretic framework for security aware sensor placement problem in networked control systems", Proceedings of ACC 2019, the 38th American Control Conference , Philadelphia, USA, 2019 (to appear). 2. M. Pirani, E. Nekouei, S. M. Dibaji, H. Sandberg, K. H. Johansson, " Design of Attack-Resilient Consensus Dynamics: A Game-Theoretic Approach", Proceedings of ECC 2019, the 17th European Control Conference , Naples, Italy, 2019 (to appear).

  4. Defense Mechanisms We classify various defense mechanisms into three major classes: prevention , resilience , and detection . Examples: Robust control methods/ event triggered control Game-theoretic methods Trust-based approaches Examples: Examples: Cryptography Observer-based methods Watermarking Randomization Learning-based anomaly detection Dibaji, Pirani, Johansson, Annaswamy, Chakrabortty “Annual Reviews in Control”, 2019, to appear.

  5. A Game-Theoretic Approach to Network Security • We adopt some game-theoretic approach in addressing these three defense mechanisms. We investigate the trade-off between Impact and visibility for the attacker. We discuss a method to increase the cost of the attack.

  6. Problem 1: Trade-off between visibility and impact Objective: • To investigate the trade-off between visibility and impact (from the attacker’s perspective).

  7. ሶ Statement of Problem 1 • There is an attacker which tries to attack some nodes: 1. To have ( large ) impact on a targeted node, 2. Remains covered ( as much as possible) to a set of detectors. • There is a detector which aims to detect the attack signals as much as possible We focus on leader-follower dynamics 𝑤 ℓ 𝑦 𝑢 = 𝐵𝑦 𝑢 + 𝐺𝑣 𝑢 + 𝐶𝑥 𝑢 𝑧 𝑢 = 𝐷𝑦(𝑢) Attacker’s decision Detector’s decision

  8. Statement of Problem 1 • The way we quantify attack impacts on targeted node and on the sensor is via system norms. Sy System no norm rm fro rom the attack sign ignal 𝑤 ℓ 𝒙 𝒖 to o the ou output of of int nterest: ∞ = 𝜏 𝑛𝑏𝑦 (𝐷 𝑈 𝐵 −1 𝐶) 𝐻 Game me obje jective: : 𝑈 𝐵 −1 𝐶) − 𝜇𝜏 𝑛𝑏𝑦 (𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶 ) , 𝜇 ≥ 0 J_attack = min 𝜏 𝑛𝑏𝑦 (𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 𝐶 𝑈 𝐵 −1 𝐶) − 𝜇𝜏 𝑛𝑏𝑦 (𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶) , 𝜇 ≥ 0 J_defender = 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢𝑝𝑠 𝜏 𝑛𝑏𝑦 (𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 max Impact visibility

  9. Applications • Formation of autonomous agents: Force Distance External attack Rel. Velocity • Voltage control in power grids: External attack Frequency Mechanical and Electrical powers • Opinion Dynamics in the presence of stubborn agents: Level of Stubbornness

  10. Detectability-Impact Tradeoff What is the effect of 𝜇 on the game value 𝐾 ∗ and game strategies? • • Parameter 𝜇 characterizes the domination of visibility with respect to the impact . Ga Game ob obje jective: : 𝑈 𝐵 −1 𝐶 − 𝜇𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶 , 𝜇 ≥ 0 J= min 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 𝐶 𝑈 𝐵 −1 𝐶 − 𝜇𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶 , 𝜇 ≥ 0 J= 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢𝑝𝑠 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 max Impact Detectability(visibility)

  11. Visibility-Impact Tradeoff: Undirected Trees Game Value 𝐾 ∗ v s 𝜇 for Undirected Trees 𝐾 ∗ ℓ 𝑘 = 1 𝑥 1 + 1 𝑥 2 + 1 NE: Detector 𝑥 3 Effective admitance ℓ 𝑘 𝑥 5 𝑥 2 𝑥 1 𝑥 4 𝑥 3 between 𝒌 and ℓ 𝑤 ℓ 𝑘 1 NE: Attacker NE: Attacker 𝑥 1 for 𝜇 < 1 for 𝜇 > 1 𝜇 1 Smaller ℓ 𝑘 → larger game value 1 ℓ 𝑘 ≥ 𝑥 1 → Best place for the critical node is the leader’s neighbor Domination of Domination detectability of impact

  12. NE Strategies for Undirected and Directed Trees

  13. Applications to Secure Vehicle Platooning • Consider a network of connected vehicles. • Each vehicle tends to track a particular velocity (introduced by the leader), while remains in a specific distance from its neighbors. Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2

  14. ሷ Secure Vehicle Platooning - Dynamics • Consider a network of connected vehicles. • Each vehicle tends to track a particular velocity (introduced by the leader), while remains in a specific distance from its neighbors. Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2 𝑞 𝑗 𝑢 = ෍ 𝑙 𝑞 𝑞 𝑘 𝑢 − 𝑞 𝑗 𝑢 + Δ 𝑗𝑘 + 𝑙 𝑣 𝑣 𝑘 𝑢 − 𝑣 𝑗 𝑢 + 𝑥 𝑗 (𝑢) 𝑘∈𝑂 𝑗 Attack signal Dimension: acceleration Position of 𝑤 𝑗 Desired inter-vehicular Velocity of 𝑤 𝑗 distance

  15. Secure Vehicle Platooning - Dynamics Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2 Attack signal Sensor measurements: velocities Matrices 𝐶 and 𝐷 are similar to what was defined previously.

  16. Secure Vehicle Platooning - Dynamics Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2 𝟐 𝑀 2 gain from 𝑥 𝑢 to 𝑧(𝑢) = −𝐷𝐵 −1 𝐶 = −𝟐 𝑪 𝒍 𝒒 𝑫𝑴 𝒉

  17. Equilibrium Analysis for Symmetric Platooning Theorem : For a leader-follower vehicle platoon under 𝑔 attacks and 𝑔 detectors both directed and undrected networks , there exists an equilibrium which happens when the detector places 𝑔 sensors in the farthest nodes from the leader. Attacker should solve an optimization problem to find its best strategy. It is computationally hard, but it is the attacker’s business! Remark: The game value for directed graphs is smaller than that of undirected graphs. 𝑤 ℓ 𝑤 ℓ 4 3 2 4 3 2

  18. Problem 2: Prevention • A Prevention approach is to increase the cost ( energy ) of the attack. • Previous methods usually demand a large graph connectivity.

  19. ሶ Statement of Problem 2 • There is an attacker which targets some nodes to steer the consensus dynamics into its desired direction with minimum energy , and a defender which tries to maximize this energy. 𝑦 𝑢 = (𝐵 + 𝑪𝐿)𝑦 𝑢 + ഥ 𝑪𝑥 𝑢 Attacker 𝑥 𝑢 𝑙 Defender’s Attacker’s action action Defender This energy is characterized via the trace of the controllability 𝑙 Gramian , obtained by solving the Lyapunov equation. Ga Game ob obje jective: : 𝐶 𝑈 𝐵 + 𝐶𝐿 ത This game does not admit a NE. 𝑢𝑠𝑏𝑑𝑓 ( ത J_defender= min 𝐶) 𝐶 We adopt a Stackelberg game 𝐶 𝑈 𝐵 + 𝐶𝐿 ത 𝑢𝑠𝑏𝑑𝑓 ( ത J_attacker= max 𝐶) ത strategy (defender is the leader). 𝐶

  20. Optimal Placement of Defenders • What does the equilibrium of this game tell us about the locations of defender nodes? Definition (Graph Center): The center of a graph is a set of vertices whose maximum distance from any other node in the network is minimum. Center Definition (Graph 𝒈 − Center): The 𝑔 − center of a graph is a vertex whose maximum summation of distances to any combination of 𝑔 nodes in the network is minimum.

  21. Optimal Placement of Defenders • Theorem: a solution of the game is when the defender chooses the weighted 𝑔 − center of the graph and the attackers choose the farthest 𝑔 nodes from the 𝑔 − center. The graph 𝑔 − center can be arbitrarily different from degree based centralities. ✓ For general undirected graphs, the distance between two nodes is replaces with their effective resistance. ✓ The above theorem will hold, only replace 𝑔 − center with effective 𝑔 − center.

  22. Summary Trade-off between Impact, visibility, and robustness. Energy maximization Via controllability Gramian for the attacker

  23. Future Direction • To extend the theoretical results to capture more general dynamical systems on more general graph topologies .

  24. Thank You

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend