a game theoretic approach to network security
play

A Game-Theoretic Approach to Network Security Mohammad Pirani and - PowerPoint PPT Presentation

A Game-Theoretic Approach to Network Security Mohammad Pirani and Henrik Sandberg Department of Automatic Control KTH Royal Institute of Technology Outline Defense mechanisms in cyber physical systems security Game-theoretic


  1. A Game-Theoretic Approach to Network Security Mohammad Pirani and Henrik Sandberg Department of Automatic Control KTH Royal Institute of Technology

  2. Outline • Defense mechanisms in cyber physical systems security • Game-theoretic approach to the visibility-impact trade-off • Game-theoretic approach to maximizing the attack energy • Conclusion and future directions

  3. 1. M. Pirani, E. Nekouei , H. Sandberg, K. H. Johansson, “A game -theoretic framework for security aware sensor placement problem in networked control systems", Proceedings of ACC 2019, the 38th American Control Conference , Philadelphia, USA, 2019 (to appear). 2. M. Pirani, E. Nekouei, S. M. Dibaji, H. Sandberg, K. H. Johansson, " Design of Attack-Resilient Consensus Dynamics: A Game-Theoretic Approach", Proceedings of ECC 2019, the 17th European Control Conference , Naples, Italy, 2019 (to appear).

  4. Defense Mechanisms We classify various defense mechanisms into three major classes: prevention , resilience , and detection . Examples: Robust control methods/ event triggered control Game-theoretic methods Trust-based approaches Examples: Examples: Cryptography Observer-based methods Watermarking Randomization Learning-based anomaly detection Dibaji, Pirani, Johansson, Annaswamy, Chakrabortty “Annual Reviews in Control”, 2019, to appear.

  5. A Game-Theoretic Approach to Network Security • We adopt some game-theoretic approach in addressing these three defense mechanisms. We investigate the trade-off between Impact and visibility for the attacker. We discuss a method to increase the cost of the attack.

  6. Problem 1: Trade-off between visibility and impact Objective: • To investigate the trade-off between visibility and impact (from the attacker’s perspective).

  7. ሶ Statement of Problem 1 • There is an attacker which tries to attack some nodes: 1. To have ( large ) impact on a targeted node, 2. Remains covered ( as much as possible) to a set of detectors. • There is a detector which aims to detect the attack signals as much as possible We focus on leader-follower dynamics 𝑤 ℓ 𝑦 𝑢 = 𝐵𝑦 𝑢 + 𝐺𝑣 𝑢 + 𝐶𝑥 𝑢 𝑧 𝑢 = 𝐷𝑦(𝑢) Attacker’s decision Detector’s decision

  8. Statement of Problem 1 • The way we quantify attack impacts on targeted node and on the sensor is via system norms. Sy System no norm rm fro rom the attack sign ignal 𝑤 ℓ 𝒙 𝒖 to o the ou output of of int nterest: ∞ = 𝜏 𝑛𝑏𝑦 (𝐷 𝑈 𝐵 −1 𝐶) 𝐻 Game me obje jective: : 𝑈 𝐵 −1 𝐶) − 𝜇𝜏 𝑛𝑏𝑦 (𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶 ) , 𝜇 ≥ 0 J_attack = min 𝜏 𝑛𝑏𝑦 (𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 𝐶 𝑈 𝐵 −1 𝐶) − 𝜇𝜏 𝑛𝑏𝑦 (𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶) , 𝜇 ≥ 0 J_defender = 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢𝑝𝑠 𝜏 𝑛𝑏𝑦 (𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 max Impact visibility

  9. Applications • Formation of autonomous agents: Force Distance External attack Rel. Velocity • Voltage control in power grids: External attack Frequency Mechanical and Electrical powers • Opinion Dynamics in the presence of stubborn agents: Level of Stubbornness

  10. Detectability-Impact Tradeoff What is the effect of 𝜇 on the game value 𝐾 ∗ and game strategies? • • Parameter 𝜇 characterizes the domination of visibility with respect to the impact . Ga Game ob obje jective: : 𝑈 𝐵 −1 𝐶 − 𝜇𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶 , 𝜇 ≥ 0 J= min 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 𝐶 𝑈 𝐵 −1 𝐶 − 𝜇𝐷 𝑢𝑏𝑠𝑕𝑓𝑢 𝑈 𝐵 −1 𝐶 , 𝜇 ≥ 0 J= 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢𝑝𝑠 𝐷 𝑒𝑓𝑢𝑓𝑑𝑢 max Impact Detectability(visibility)

  11. Visibility-Impact Tradeoff: Undirected Trees Game Value 𝐾 ∗ v s 𝜇 for Undirected Trees 𝐾 ∗ ℓ 𝑘 = 1 𝑥 1 + 1 𝑥 2 + 1 NE: Detector 𝑥 3 Effective admitance ℓ 𝑘 𝑥 5 𝑥 2 𝑥 1 𝑥 4 𝑥 3 between 𝒌 and ℓ 𝑤 ℓ 𝑘 1 NE: Attacker NE: Attacker 𝑥 1 for 𝜇 < 1 for 𝜇 > 1 𝜇 1 Smaller ℓ 𝑘 → larger game value 1 ℓ 𝑘 ≥ 𝑥 1 → Best place for the critical node is the leader’s neighbor Domination of Domination detectability of impact

  12. NE Strategies for Undirected and Directed Trees

  13. Applications to Secure Vehicle Platooning • Consider a network of connected vehicles. • Each vehicle tends to track a particular velocity (introduced by the leader), while remains in a specific distance from its neighbors. Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2

  14. ሷ Secure Vehicle Platooning - Dynamics • Consider a network of connected vehicles. • Each vehicle tends to track a particular velocity (introduced by the leader), while remains in a specific distance from its neighbors. Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2 𝑞 𝑗 𝑢 = ෍ 𝑙 𝑞 𝑞 𝑘 𝑢 − 𝑞 𝑗 𝑢 + Δ 𝑗𝑘 + 𝑙 𝑣 𝑣 𝑘 𝑢 − 𝑣 𝑗 𝑢 + 𝑥 𝑗 (𝑢) 𝑘∈𝑂 𝑗 Attack signal Dimension: acceleration Position of 𝑤 𝑗 Desired inter-vehicular Velocity of 𝑤 𝑗 distance

  15. Secure Vehicle Platooning - Dynamics Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2 Attack signal Sensor measurements: velocities Matrices 𝐶 and 𝐷 are similar to what was defined previously.

  16. Secure Vehicle Platooning - Dynamics Δ 43 Δ 32 Δ 21 Δ 1ℓ 𝑤 1 = 𝑤 ℓ 𝑤 ℓ 𝑤 4 = 𝑤 ℓ 𝑤 3 = 𝑤 ℓ 𝑤 2 = 𝑤 ℓ 4 3 2 𝟐 𝑀 2 gain from 𝑥 𝑢 to 𝑧(𝑢) = −𝐷𝐵 −1 𝐶 = −𝟐 𝑪 𝒍 𝒒 𝑫𝑴 𝒉

  17. Equilibrium Analysis for Symmetric Platooning Theorem : For a leader-follower vehicle platoon under 𝑔 attacks and 𝑔 detectors both directed and undrected networks , there exists an equilibrium which happens when the detector places 𝑔 sensors in the farthest nodes from the leader. Attacker should solve an optimization problem to find its best strategy. It is computationally hard, but it is the attacker’s business! Remark: The game value for directed graphs is smaller than that of undirected graphs. 𝑤 ℓ 𝑤 ℓ 4 3 2 4 3 2

  18. Problem 2: Prevention • A Prevention approach is to increase the cost ( energy ) of the attack. • Previous methods usually demand a large graph connectivity.

  19. ሶ Statement of Problem 2 • There is an attacker which targets some nodes to steer the consensus dynamics into its desired direction with minimum energy , and a defender which tries to maximize this energy. 𝑦 𝑢 = (𝐵 + 𝑪𝐿)𝑦 𝑢 + ഥ 𝑪𝑥 𝑢 Attacker 𝑥 𝑢 𝑙 Defender’s Attacker’s action action Defender This energy is characterized via the trace of the controllability 𝑙 Gramian , obtained by solving the Lyapunov equation. Ga Game ob obje jective: : 𝐶 𝑈 𝐵 + 𝐶𝐿 ത This game does not admit a NE. 𝑢𝑠𝑏𝑑𝑓 ( ത J_defender= min 𝐶) 𝐶 We adopt a Stackelberg game 𝐶 𝑈 𝐵 + 𝐶𝐿 ത 𝑢𝑠𝑏𝑑𝑓 ( ത J_attacker= max 𝐶) ത strategy (defender is the leader). 𝐶

  20. Optimal Placement of Defenders • What does the equilibrium of this game tell us about the locations of defender nodes? Definition (Graph Center): The center of a graph is a set of vertices whose maximum distance from any other node in the network is minimum. Center Definition (Graph 𝒈 − Center): The 𝑔 − center of a graph is a vertex whose maximum summation of distances to any combination of 𝑔 nodes in the network is minimum.

  21. Optimal Placement of Defenders • Theorem: a solution of the game is when the defender chooses the weighted 𝑔 − center of the graph and the attackers choose the farthest 𝑔 nodes from the 𝑔 − center. The graph 𝑔 − center can be arbitrarily different from degree based centralities. ✓ For general undirected graphs, the distance between two nodes is replaces with their effective resistance. ✓ The above theorem will hold, only replace 𝑔 − center with effective 𝑔 − center.

  22. Summary Trade-off between Impact, visibility, and robustness. Energy maximization Via controllability Gramian for the attacker

  23. Future Direction • To extend the theoretical results to capture more general dynamical systems on more general graph topologies .

  24. Thank You

Recommend


More recommend