Abstract
With the integration of modern information and communication technologies (ICTs) into critical infrastructures (CIs) such as 5G networks and the Internet of Things (IoTs), the CIs are becoming vulnerable to cyber threats at the same time improving its connectivity and functionalities. Hence it is essential to understand the risk of ICTs on CIs holistically as a cyber-physical system and design efficient security hardening mechanisms to reduce the cyber risks. To this end, we establish a game-theoretic framework to capture the system behaviors of the CIs under malicious attacks and the security design objectives. We propose the factored Markov game theory to enable a computationally scalable model of large-scale infrastructure networks and provide approximate algorithms for designing optimal mechanisms. The proposed theory builds on the factored graph that exploits the dependency structure of the nodes of CIs and the approximate dynamic programming tools for stochastic Markov games. This work focuses on a localized information structure and the single-controller game solvable by linear programming. Numerical results illustrate the proper trade-off of the approximation accuracy and computation complexity in the new design paradigm and show the proactive security at the time of unanticipated attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen J, Zhu Q (2016a) Interdependent network formation games with an application to critical infrastructures. In: American Control Conference (ACC), pp 2870–2875
Chen J, Zhu Q (2016b) Optimal contract design under asymmetric information for cloud-enabled internet of controlled things. In: International Conference on Decision and Game Theory for Security, Springer, pp 329–348
Chen J, Zhu Q (2016c) Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment. In: IEEE Conference on Decision and Control (CDC), pp 5183–5188
Chen J, Zhu Q (2017) Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach. IEEE Transactions on Information Forensics and Security, 12(11): 2736–2750
De Farias DP, Van Roy B (2004) On constraint sampling in the linear programming approach to approximate dynamic programming. Mathematics of operations research 29(3):462–478
Filar J, Vrieze K (2012) Competitive Markov decision processes. Springer Science & Business Media
Guestrin C, Koller D, Parr R, Venkataraman S (2003) Efficient solution algorithms for factored mdps. Journal of Artificial Intelligence Research 19:399–468
Huang L, Chen J, Zhu Q (2017, April) A factored MDP approach to optimal mechanism design for resihent large-scale interdependent critical infrastructures. In Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), 2017 Workshop on, IEEE, pp 1–6
Korkali M, Veneman JG, Tivnan BF, Hines PD (2014) Reducing cascading failure risk by increasing infrastructure network interdependency. arXiv preprint arXiv:14106836
Lagoudakis MG, Parr R (2003) Learning in zero-sum team markov games using factored value functions. In: Advances in Neural Information Processing Systems, pp 1659–1666
Lakshminarayanan C, Bhatnagar S (2015) A generalized reduced linear program for markov decision processes. In: AAAI, pp 2722–2728
Lee II EE, Mitchell JE, Wallace WA (2007) Restoration of services in interdependent infrastructure systems: A network flows approach. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 37(6):1303–1317
Li L, Shamma J (2014) Lp formulation of asymmetric zero-sum stochastic games. In: Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on, IEEE, pp 1930–1935
Malek A, Abbasi-Yadkori Y, Bartlett P (2014) Linear programming for large-scale markov decision problems. In: International Conference on Machine Learning, pp 496–504
Manshaei MH, Zhu Q, Alpcan T, BacĹźar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Computing Surveys (CSUR) 45(3):25
Moteff J, Parfomak P (2004) Critical infrastructure and key assets: definition and identification. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE
Ouyang M (2014) Review on modeling and simulation of interdependent critical infrastructure systems. Reliability engineering & System safety 121:43–60
Pawlick J, Farhang S, Zhu Q (2015) Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats. In: 6th International Conference on Decision and Game Theory for Security, GameSec 2015, Springer Verlag
Pederson P, Dudenhoeffer D, Hartley S, Permann M (2006) Critical infrastructure interdependency modeling: a survey of us and international research. Idaho National Laboratory 25:27
Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems 21(6):11–25
Rosato V, Issacharoff L, Tiriticco F, Meloni S, Porcellinis S, Setola R (2008) Modelling interdependent infrastructures using interacting dynamical models. International Journal of Critical Infrastructures 4(1–2):63–79
Zhu Q, Başar T (2013) Game-theoretic approach to feedback-driven multi-stage moving target defense. In: International Conference on Decision and Game Theory for Security, Springer, pp 246–263
Zhu Q, Basar T (2015) Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems. IEEE control systems 35(1):46–65
Zhu Q, Li H, Han Z, Basar T (2010a) A stochastic game model for jamming in multi-channel cognitive radio systems. In: Communications (ICC), 2010 IEEE International Conference on, IEEE, pp 1–6
Zhu Q, Tembine H, Başar T (2010b) Network security configurations: A nonzero-sum stochastic game approach. In: American Control Conference (ACC), 2010, IEEE, pp 1059–1064
Zhu Q, Fung C, Boutaba R, Basar T (2012) Guidex: A game-theoretic incentive-based mechanism for intrusion detection networks. IEEE Journal on Selected Areas in Communications 30(11):2220–2230
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Huang, L., Chen, J., Zhu, Q. (2018). Factored Markov Game Theory for Secure Interdependent Infrastructure Networks. In: Rass, S., Schauer, S. (eds) Game Theory for Security and Risk Management. Static & Dynamic Game Theory: Foundations & Applications. Birkhäuser, Cham. https://doi.org/10.1007/978-3-319-75268-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-75268-6_5
Published:
Publisher Name: Birkhäuser, Cham
Print ISBN: 978-3-319-75267-9
Online ISBN: 978-3-319-75268-6
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)