Skip to main content

Entropy-Based Proactive and Reactive Cyber-Physical Security

  • Chapter
  • First Online:
Proactive and Dynamic Network Defense

Part of the book series: Advances in Information Security ((ADIS,volume 74))

Abstract

This chapter considers the problem of securely operating a cyber-physical system under different types of attacks, including actuator and sensor attacks. The proposed defense approach consists of a proactive and a reactive mechanism. The proactive part leverages the principles of moving target defense, and introduces a stochastic switching structure that dynamically and continuously alters the behavior of the system, aiming to neutralize the attacker’s reconnaissance efforts. An unpredictability metric is proposed that utilizes the entropy induced by a switching supervisor, in order to maximize efficiency. The reactive part isolates the potentially compromised system components. A novel integral Bellman-based intrusion detection system is used to detect the attacks and take appropriate measures by collecting data online and without knowledge of the physical interpretation of the system. Simulation results are presented to showcase the efficacy of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R.R. Rajkumar, I. Lee, L. Sha, J. Stankovic, Cyber-physical systems: the next computing revolution, in Proceedings of the 47th Design Automation Conference (ACM, New York, 2010), pp. 731–736

    Google Scholar 

  2. J. Kim, H. Kim, K. Lakshmanan, R.R. Rajkumar, Parallel scheduling for cyber-physical systems: analysis and case study on a self-driving car, in Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (ACM, New York, 2013), pp. 31–40

    Google Scholar 

  3. I. Lee, O. Sokolsky, Medical cyber physical systems, in Design Automation Conference (DAC), 2010 47th ACM/IEEE (IEEE, Piscataway, 2010), pp. 743–748

    Google Scholar 

  4. Y. Mo, T.H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, B. Sinopoli, Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)

    Article  Google Scholar 

  5. Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13 (2011)

    Google Scholar 

  6. J. Slay, M. Miller, Lessons learned from the Maroochy water breach, in International Conference on Critical Infrastructure Protection (Springer, Berlin, 2007), pp. 73–82

    Google Scholar 

  7. J.P. Farwell, R. Rohozinski, Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)

    Article  Google Scholar 

  8. S. Jajodia, A.K. Ghosh, V. Swarup, C. Wang, X.S. Wang, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54 (Springer, New York, 2011)

    Book  Google Scholar 

  9. B. van Lier, Can cyber-physical systems reliably collaborate within a blockchain? Metaphilosophy 48(5), 698–711 (2017)

    Article  Google Scholar 

  10. A.A. Cardenas, S. Amin, S. Sastry, Secure control: towards survivable cyber-physical systems, in 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS’08 (IEEE, Piscataway, 2008), pp. 495–500

    Google Scholar 

  11. T. Alpcan, T. BaÅŸar, Network Security: A Decision and Game-Theoretic Approach (Cambridge University Press, Cambridge, 2010)

    Book  Google Scholar 

  12. M. Pajic, J. Weimer, N. Bezzo, O. Sokolsky, G.J. Pappas, I. Lee, Design and implementation of attack-resilient cyberphysical systems: with a focus on attack-resilient state estimators. IEEE Control. Syst. 37(2), 66–81 (2017)

    Article  MathSciNet  Google Scholar 

  13. F. Pasqualetti, F. Dorfler, F. Bullo, Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Control. Syst. 35(1), 110–127 (2015)

    Article  MathSciNet  Google Scholar 

  14. B. Satchidanandan, P.R. Kumar, Dynamic watermarking: active defense of networked cyber-physical systems. Proc. IEEE 105(2), 219–240 (2017)

    Article  Google Scholar 

  15. K.G. Vamvoudakis, H. Modares, B. Kiumarsi, F.L. Lewis, Game theory-based control system algorithms with real-time reinforcement learning: how to solve multiplayer games online. IEEE Control. Syst. 37(1), 33–52 (2017)

    Article  MathSciNet  Google Scholar 

  16. K.G. Vamvoudakis, J.P. Hespanha, Cooperative Q-learning for rejection of persistent adversarial inputs in networked linear quadratic systems. IEEE Trans. Autom. Control 63, 1018–1031 (2017)

    Article  MathSciNet  Google Scholar 

  17. G. Theodorakopoulos, J.S. Baras, On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 318–328 (2006)

    Article  Google Scholar 

  18. S. Jajodia, A.K. Ghosh, V. Subrahmanian, V. Swarup, C. Wang, X.S. Wang, Moving Target Defense II: Application of Game Theory and Adversarial Modeling, vol. 100 (Springer, New York, 2012)

    Google Scholar 

  19. V. Casola, A. De Benedictis, M. Albanese, A multi-layer moving target defense approach for protecting resource-constrained distributed devices, in Integration of Reusable Systems (Springer, Cham, 2014), pp. 299–324

    Google Scholar 

  20. J.H. Jafarian, E. Al-Shaer, Q. Duan, Openflow random host mutation: transparent moving target defense using software defined networking, in Proceedings of the First Workshop on Hot Topics in Software Defined Networks (ACM, New York, 2012), pp. 127–132

    Google Scholar 

  21. M. Dunlop, S. Groat, W. Urbanski, R. Marchany, J. Tront, Mt6d: a moving target ipv6 defense, in Military Communications Conference, 2011-Milcom 2011 (IEEE, Piscataway, 2011), pp. 1321–1326

    Book  Google Scholar 

  22. R. Zhuang, S.A. DeLoach, X. Ou, Towards a theory of moving target defense, in Proceedings of the First ACM Workshop on Moving Target Defense (ACM, New York, 2014), pp. 31–40

    Google Scholar 

  23. Q. Zhu, T. Başar, Game-theoretic approach to feedback-driven multi-stage moving target defense, in International Conference on Decision and Game Theory for Security (Springer, Berlin, 2013), pp. 246–263

    MATH  Google Scholar 

  24. S. Weerakkody, B. Sinopoli, Detecting integrity attacks on control systems using a moving target approach, in IEEE 54th Annual Conference on Decision and Control (CDC), 2015 (IEEE, Piscataway, 2015), pp. 5820–5826

    Google Scholar 

  25. H. Fawzi, P. Tabuada, S. Diggavi, Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)

    Article  MathSciNet  Google Scholar 

  26. Y. Yan, P. Antsaklis, V. Gupta, A resilient design for cyber physical systems under attack, in American Control Conference (ACC), 2017 (IEEE, Piscataway, 2017), pp. 4418–4423

    Book  Google Scholar 

  27. L. An, G.-H. Yang, Secure state estimation against sparse sensor attacks with adaptive switching mechanism. IEEE Trans. Autom. Control 63, 2596–2603 (2017)

    Article  MathSciNet  Google Scholar 

  28. H. Okhravi, T. Hobson, D. Bigelow, W. Streilein, Finding focus in the blur of moving-target techniques. IEEE Secur. Priv. 12(2), 16–26 (2014)

    Article  Google Scholar 

  29. T.M. Cover, J.A. Thomas, Elements of Information Theory (Wiley, Hoboken, 2012)

    MATH  Google Scholar 

  30. J.P. Hespanha, A.S. Morse, Stability of switched systems with average dwell-time, in Proceedings of the 38th IEEE Conference on Decision and Control, 1999, vol. 3 (IEEE, Piscataway, 1999), pp. 2655–2660

    Google Scholar 

  31. A. Kanellopoulos, K.G. Vamvoudakis, Switching for unpredictability: a proactive defense control approach, to appear in, American Control Conference, Philadelphia, PA (2019)

    Google Scholar 

  32. D. Vrabie, K.G. Vamvoudakis, F.L. Lewis, Optimal Adaptive Control and Differential Games by Reinforcement Learning Principles, vol. 2. IET (2013)

    Google Scholar 

  33. R.J. Martin, L. Valavani, M. Athans, Multivariable control of a submersible using the lqg/ltr design methodology, in American Control Conference, 1986 (IEEE, Piscataway, 1986), pp. 1313–1324

    Google Scholar 

  34. X. Yu, J. Jiang, Hybrid fault-tolerant flight control system design against partial actuator failures. IEEE Trans. Control Syst. Technol. 20(4), 871–886 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by NATO under grant No. SPS G5176, by ONR Minerva under grant No. N00014-18-1-2160, and by an NSF CAREER under grant CPS-1851588.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyriakos G. Vamvoudakis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kanellopoulos, A., Vamvoudakis, K.G. (2019). Entropy-Based Proactive and Reactive Cyber-Physical Security. In: Wang, C., Lu, Z. (eds) Proactive and Dynamic Network Defense. Advances in Information Security, vol 74. Springer, Cham. https://doi.org/10.1007/978-3-030-10597-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-10597-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-10596-9

  • Online ISBN: 978-3-030-10597-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics