Skip to main content

Factored Markov Game Theory for Secure Interdependent Infrastructure Networks

  • Chapter
  • First Online:
Game Theory for Security and Risk Management

Abstract

With the integration of modern information and communication technologies (ICTs) into critical infrastructures (CIs) such as 5G networks and the Internet of Things (IoTs), the CIs are becoming vulnerable to cyber threats at the same time improving its connectivity and functionalities. Hence it is essential to understand the risk of ICTs on CIs holistically as a cyber-physical system and design efficient security hardening mechanisms to reduce the cyber risks. To this end, we establish a game-theoretic framework to capture the system behaviors of the CIs under malicious attacks and the security design objectives. We propose the factored Markov game theory to enable a computationally scalable model of large-scale infrastructure networks and provide approximate algorithms for designing optimal mechanisms. The proposed theory builds on the factored graph that exploits the dependency structure of the nodes of CIs and the approximate dynamic programming tools for stochastic Markov games. This work focuses on a localized information structure and the single-controller game solvable by linear programming. Numerical results illustrate the proper trade-off of the approximation accuracy and computation complexity in the new design paradigm and show the proactive security at the time of unanticipated attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen J, Zhu Q (2016a) Interdependent network formation games with an application to critical infrastructures. In: American Control Conference (ACC), pp 2870–2875

    Google Scholar 

  2. Chen J, Zhu Q (2016b) Optimal contract design under asymmetric information for cloud-enabled internet of controlled things. In: International Conference on Decision and Game Theory for Security, Springer, pp 329–348

    Google Scholar 

  3. Chen J, Zhu Q (2016c) Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment. In: IEEE Conference on Decision and Control (CDC), pp 5183–5188

    Google Scholar 

  4. Chen J, Zhu Q (2017) Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach. IEEE Transactions on Information Forensics and Security, 12(11): 2736–2750

    Article  Google Scholar 

  5. De Farias DP, Van Roy B (2004) On constraint sampling in the linear programming approach to approximate dynamic programming. Mathematics of operations research 29(3):462–478

    Article  MathSciNet  Google Scholar 

  6. Filar J, Vrieze K (2012) Competitive Markov decision processes. Springer Science & Business Media

    Google Scholar 

  7. Guestrin C, Koller D, Parr R, Venkataraman S (2003) Efficient solution algorithms for factored mdps. Journal of Artificial Intelligence Research 19:399–468

    Article  MathSciNet  Google Scholar 

  8. Huang L, Chen J, Zhu Q (2017, April) A factored MDP approach to optimal mechanism design for resihent large-scale interdependent critical infrastructures. In Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), 2017 Workshop on, IEEE, pp 1–6

    Google Scholar 

  9. Korkali M, Veneman JG, Tivnan BF, Hines PD (2014) Reducing cascading failure risk by increasing infrastructure network interdependency. arXiv preprint arXiv:14106836

    Google Scholar 

  10. Lagoudakis MG, Parr R (2003) Learning in zero-sum team markov games using factored value functions. In: Advances in Neural Information Processing Systems, pp 1659–1666

    Google Scholar 

  11. Lakshminarayanan C, Bhatnagar S (2015) A generalized reduced linear program for markov decision processes. In: AAAI, pp 2722–2728

    Google Scholar 

  12. Lee II EE, Mitchell JE, Wallace WA (2007) Restoration of services in interdependent infrastructure systems: A network flows approach. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 37(6):1303–1317

    Article  Google Scholar 

  13. Li L, Shamma J (2014) Lp formulation of asymmetric zero-sum stochastic games. In: Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on, IEEE, pp 1930–1935

    Google Scholar 

  14. Malek A, Abbasi-Yadkori Y, Bartlett P (2014) Linear programming for large-scale markov decision problems. In: International Conference on Machine Learning, pp 496–504

    Google Scholar 

  15. Manshaei MH, Zhu Q, Alpcan T, BacĹźar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Computing Surveys (CSUR) 45(3):25

    Article  Google Scholar 

  16. Moteff J, Parfomak P (2004) Critical infrastructure and key assets: definition and identification. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE

    Google Scholar 

  17. Ouyang M (2014) Review on modeling and simulation of interdependent critical infrastructure systems. Reliability engineering & System safety 121:43–60

    Article  Google Scholar 

  18. Pawlick J, Farhang S, Zhu Q (2015) Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats. In: 6th International Conference on Decision and Game Theory for Security, GameSec 2015, Springer Verlag

    MATH  Google Scholar 

  19. Pederson P, Dudenhoeffer D, Hartley S, Permann M (2006) Critical infrastructure interdependency modeling: a survey of us and international research. Idaho National Laboratory 25:27

    Google Scholar 

  20. Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems 21(6):11–25

    Article  Google Scholar 

  21. Rosato V, Issacharoff L, Tiriticco F, Meloni S, Porcellinis S, Setola R (2008) Modelling interdependent infrastructures using interacting dynamical models. International Journal of Critical Infrastructures 4(1–2):63–79

    Article  Google Scholar 

  22. Zhu Q, Başar T (2013) Game-theoretic approach to feedback-driven multi-stage moving target defense. In: International Conference on Decision and Game Theory for Security, Springer, pp 246–263

    Google Scholar 

  23. Zhu Q, Basar T (2015) Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems. IEEE control systems 35(1):46–65

    Article  MathSciNet  Google Scholar 

  24. Zhu Q, Li H, Han Z, Basar T (2010a) A stochastic game model for jamming in multi-channel cognitive radio systems. In: Communications (ICC), 2010 IEEE International Conference on, IEEE, pp 1–6

    Google Scholar 

  25. Zhu Q, Tembine H, Başar T (2010b) Network security configurations: A nonzero-sum stochastic game approach. In: American Control Conference (ACC), 2010, IEEE, pp 1059–1064

    Google Scholar 

  26. Zhu Q, Fung C, Boutaba R, Basar T (2012) Guidex: A game-theoretic incentive-based mechanism for intrusion detection networks. IEEE Journal on Selected Areas in Communications 30(11):2220–2230

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Linan Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Huang, L., Chen, J., Zhu, Q. (2018). Factored Markov Game Theory for Secure Interdependent Infrastructure Networks. In: Rass, S., Schauer, S. (eds) Game Theory for Security and Risk Management. Static & Dynamic Game Theory: Foundations & Applications. Birkhäuser, Cham. https://doi.org/10.1007/978-3-319-75268-6_5

Download citation

Publish with us

Policies and ethics