Loading…
Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis
Stealthy attacks have become a major threat to cybersecurity. Previous works in this direction fail to capture the practical resource constraints and mainly focus on one-node settings. In this article, we propose a two-player game-theoretic model, including a system of multiple independent nodes, a...
Saved in:
Published in: | IEEE transactions on control of network systems 2020-12, Vol.7 (4), p.1665-1677 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Stealthy attacks have become a major threat to cybersecurity. Previous works in this direction fail to capture the practical resource constraints and mainly focus on one-node settings. In this article, we propose a two-player game-theoretic model, including a system of multiple independent nodes, a stealthy attacker, and an observable defender. In our model, the attacker can fully observe the defender's behavior and the system state, whereas the defender has zero feedback information. Furthermore, a strict resource constraint is introduced to limit the frequency of the attacks/defenses for both players. We characterize the best responses for both attacker and defender under both nonadaptive and adaptive strategies. We then study the sequential game where the defender first announces its strategy and the attacker then responds accordingly. We have designed an algorithm that finds a nearly optimal strategy for the defender and provides a full analysis of its complexity and performance guarantee. |
---|---|
ISSN: | 2325-5870 2372-2533 |
DOI: | 10.1109/TCNS.2020.2993281 |