Movatterモバイル変換


[0]ホーム

URL:


Next Article in Journal
Choices in the 11–20 Game: The Role of Risk Aversion
Next Article in Special Issue
Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria
Previous Article in Journal
Voluntary Leadership and Asymmetric Endowments in the Investment Game
Previous Article in Special Issue
Risk Assessment Uncertainties in Cybersecurity Investments
 
 
Search for Articles:
Title / Keyword
Author / Affiliation / Email
Journal
Article Type
 
 
Section
Special Issue
Volume
Issue
Number
Page
 
Logical OperatorOperator
Search Text
Search Type
 
add_circle_outline
remove_circle_outline
 
 
Journals
Games
Volume 9
Issue 3
10.3390/g9030052
Font Type:
ArialGeorgiaVerdana
Font Size:
AaAaAa
Line Spacing:
Column Width:
Background:
Article

Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures

1
Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA
2
Hang Seng Management College, Hong Kong, China
3
The Department of Mechanical and Industrial Engineering, Texas A&M University, Kingsville, TX 78363, USA
4
Department of Computer Science, Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372, Singapore
5
Department of Industrial and Systems Engineering, State University of New York at Buffalo, Buffalo, NY 14260, USA
*
Author to whom correspondence should be addressed.
Submission received: 1 June 2018 /Revised: 12 July 2018 /Accepted: 20 July 2018 /Published: 23 July 2018
(This article belongs to the Special IssueGame Models for Cyber-Physical Infrastructures)

Abstract

:
In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to one component may affect others and possibly the entire infrastructure. Such correlations must be explicitly taken into account in ensuring the survival of the infrastructure. For large discrete infrastructures characterized by the number of cyber and physical components, we characterize the cyber–physical interactions at two levels: (i) the cyber–physical failure correlation function specifies the conditional survival probability of the cyber sub-infrastructure given that of the physical sub-infrastructure (both specified by their marginal probabilities), and (ii) individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions expressed in terms of their multiplier functions. We formulate an abstract problem of ensuring the survival probability of a cyber–physical infrastructure with discrete components as a game between the provider and attacker, whose utility functions are composed of infrastructure survival probability terms and cost terms, both expressed in terms of the number of components attacked and reinforced. We derive Nash equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure survival probability on cost terms, correlation functions, multiplier functions, and sub-infrastructure survival probabilities. We apply these analytical results to characterize the defense postures of simplified models of metro systems, cloud computing infrastructures, and smart power grids.

    1. Introduction

    The operation of critical infrastructures such as metro systems, smart power grids, high-performance computing complexes, and cloud computing infrastructures requires the continued functioning of cyber components such as signals, servers, supervisory control and data acquisition (SCADA) systems, routers, and switches, and also physical components such as tracks, power lines, fiber lines, cooling systems, and power systems. Components of both types must beoperational as individual units, and must also beavailable (i.e., accessible to other infrastructure components). The individual components are subject to direct attacks in that cyber attacks will disable individual cyber components and physical attacks will disable individual physical components, when the components have not been reinforced. Furthermore, critical correlations or inter-dependencies exist between cyber and physical components, which may be exploited to launch strategic component attacks that propagate the disruptions to several others. To counter such attacks, infrastructure providers have to explicitly account for the underlying cyber–physical correlations and adopt strategies that ensure the continued operation of both cyber and physical sub-infrastructures.
    In this paper, we consider a discrete component model of infrastructures with a large number of cyber and physical components, such as a metro system with hundreds of signals and sensors, a cloud computing infrastructure with thousands of servers, or a power grid with hundreds to thousands of sensors. The notations for various quantities are provided inTable 1. The attacker launchesyC cyber oryP physical component attacks but not both, and the provider reinforcesxC cyber andxP physical components. Thecyber–physical interactions may render the otherwise operational components unavailable, whether they are reinforced or not. For example, a physical attack on a fiber connection to a server site of a cloud computing infrastructure shown inFigure 1 may disconnect all servers (thousands in some cases) from the network, even if they are all fortified against cyber attacks.
    In addition to component-level characterizations, the cyber and physical sub-infrastructures can be separately identified in several cases. Indeed, they may be operated by different domain experts. For example, in a power grid, SCADA systems are maintained by operations staff, and the power routes are maintained by power engineering staff. We consider thecyber andphysical sub-infrastructures consisting entirely of cyber and physical components, respectively. Disruptions to either could disrupt the entire infrastructure. LetPCP denote the survival probability of the infrastructure, andPC andPP denote the marginal survival probabilities of cyber and physical sub-infrastructures, respectively. Thecyber–physical failure correlation functionf(PC,PP) is the failure probability of cyber sub-infrastructure given the other’s failure, and is estimated using the structural properties of the infrastructure. Furthermore, we consider thatPC andPP satisfy first-order differential conditions based on themultiplier functions [1] of cyber and physical sub-infrastructures, denoted byΛC andΛP, respectively, which are derived based on their component-level considerations. Together, these two characterizations [2,3] generalize the linearity and statistical independence conditions used in previous works [4,5] for this class of infrastructures with discrete cyber and physical components. The multiplier functions depend onxC,xP,yC, andyP, and also on additional infrastructure parameters (e.g., the number of power lines controlled by a SCADA system), and they provide an insightful abstraction. They appear in the estimates of survival probabilities of sub-infrastructures at Nash equilibrium (NE) and provide insights into the defense posture of the infrastructure.
    We formulate a game between the provider and attacker with the following considerations:
    (a)
    knowledge about the infrastructure is available to the attacker which is sufficient to launch component attacks;
    (b)
    costs of attacks and reinforcements of components, denoted byLA(yC,yP) andLD(xC,xP), respectively, are not available to the other player;
    (c)
    components chosen by the provider to reinforce, and by the attacker to attack, are not revealed; and
    (d)
    incidents and results of attacks on components are known to the provider and attacker.
    The information in items (a) and (d) is available to both the provider and attacker, and that in item (b) is private. The provider and attacker minimize their respective utility functions, which are based on both types of information.
    Thecomposite utility function [1] to be minimized by the provider is the sum of two terms, representing the reward for keeping the infrastructure operational and the corresponding cost, respectively. It is given by
    UDxC,xP,yC,yP=FD,G(xC,xP,yC,yP)GD(xC,xP,yC,yP)+FD,L(xC,xP,yC,yP)LD(xC,xP),
    whereFD,G andFD,L are the reward and cost multiplier functions, respectively, of the provider,GD represents the reward of keeping the infrastructure operational, andLD is the total cost of reinforcing cyber and physical components. The composite utility function to be minimized by the attacker is given by
    UAxC,xP,yC,yP=FA,G(xC,xP,yC,yP)GA(xC,xP,yC,yP)+FA,L(xC,xP,yC,yP)LA(yC,yP),
    whereFA,G andFA,L are the reward and cost multiplier functions, respectively,GA is the reward for rendering the infrastructure non-operational, andLA is the total cost of cyber or physical attacks. These utility functions can be specialized to capture different provider and attacker considerations as shown inTable 2, in particular by expressing them in terms of the survival probability of the infrastructurePCP(xC,xP,yC,yP). Thesum-form utility [2] for the cyber–physical infrastructure provider is given by
    UD+xC,xP,yC,yP=1PCP(xC,xP,yC,yP)gD+LD(xC,xP),
    wherePCP(xC,xP,yC,yP)gD is the expected reward in return for the reinforcement costLD(xC,xP) of cyber and physical components. In certain infrastructures, players focus on the cost term only, and the reward of operating the infrastructure is not explicit. In such cases, theproduct-form utility [3] of the provider is given by
    UD×xC,xP,yC,yP=1PCP(xC,xP,yC,yP)LD(xC,xP),
    which represents the expected cost under infrastructure failure and thus represents the “wasted” effort.
    The NE of this game represents the state of the infrastructure under the reinforcement and attack actions of the provider and attacker that attempt to minimize their respective utility functions based on their individual information (from which neither has a motivation to unilaterally deviate [6]). The choices of provider and attacker, given by(xC,xP) and(yC,yP), respectively, can be obtained using various available methods [6,7], which typically involves exploiting the scenario-specific details. Indeed, because of the large-scale and complexity feature of cyber–physical infrastructures, most game models obtain Nash equilibrium using numerical methods. Our objective in this paper is to show that critical insights about the infrastructure survival can be gained by deriving estimates of survival probabilities in terms of various correlations and multiplier functions, without requiring explicit solutions for(xC,xP) and(yC,yP). To this end, we derive NE conditions that highlight the dependence ofPCP on the cost terms, correlation function, multiplier functions, and cyber and physical sub-infrastructure survival probabilities, as well as their partial derivatives. Indeed, the effects of infrastructure parameters will be reflected in estimates ofPCP via the multiplier functions, while the correlation effects are “separated” from them. In particular, the impacts of the two players’ strategies are captured using thecomposite gain–cost terms andgain–cost gradients that depend on gain and cost terms and their derivatives with respect toxC andxP (yC andyP), respectively, which are specialized versions of those proposed for systems of systems [1]. The NE conditions reveal a direct dependence ofPCP on the parameters of cyber and physical components and sub-infrastructures, as well as a close coupling between them through the correlation function. We also estimate the sensitivity functions ofPCP using the partial derivatives of parametersLA(·),LD(·),PC,PP, andf(PC,PP) that indicate their relative importance in the defense posture of the infrastructure.
    The contributions of this paper are as follows. We unify the analysis of previously separate sum-form [2] and product-form [3] formulations, and provide a deeper treatment of NE, including second-order conditions which are not considered in prior work. Although a special case of a system of systems [1], our formulation provides a more focussed treatment of cyber and physical sub-infrastructures. Our results provide insights into the defense postures of (simplified models) three infrastructures, including metro systems and smart power grids (new here), and cloud computing infrastructures from [8]. We first consider cases where both cyber and physical components are uniform (Section 3.2), namely, signals and trains of metro systems, servers and fiber connections for cloud infrastructures, and SCADA system and power lines for smart power grids. Then, we consider different types of cyber components (Section 5), namely signals and the centralized traffic controls for a metro system, servers and routers for the cloud infrastructure, and SCADA system components and smart meters for the smart power grid. We explicitly derive NE conditions and sensitivity functions for these scenarios.
    The organization of this paper is as follows. We compare our formulation with other related work inSection 2. InSection 3, we present a discrete component model for cyber–physical infrastructures, and discuss the failure correlation function and the differential conditions on sub-infrastructure survival probabilities. We present the game theoretic formulation inSection 4, and derive NE conditions and sensitivity estimates. We also describe two special cases, OR systems inSection 4.2 and statistically independent sub-infrastructures inSection 4.3, wherein the cyber–physical correlation effects are somewhat simplified. We discuss NE conditions for applications of metro systems, cloud computing infrastructures, and smart power grids inSection 5. We conclude inSection 6.

    2. Related Work

    Critical infrastructures are vital to national security [9], and there are numerous published reports, books, and studies on identifying [10] and securing [11,12,13,14] critical infrastructures. A detailed scientific analysis of critical infrastructures is provided in [15]. The author draws insights that critical infrastructures are complex systems, and their architecture is the most crucial factor in deciding their reliability and resilience. Securing cyber–physical networks has been studied extensively from various perspectives [16,17,18,19,20]. A risk assessment approach is used in [21] to identify and address the vulnerabilities of a cyber–physical system, without explicitly using the interactions between the attacker and the provider. Consequently, the quantification of risk and correlations is somewhat limited. Although cyber–physical networks form an integral part of many critical infrastructures such as energy, information technology, and transportation systems, these works primarily cater to applications on power systems and smart power grids. To our best knowledge, there has not been any study that rigorously models the correlations between cyber and physical components in a general system. Our objective is to develop such a general formulation and illustrate its generality by using models of various applications, such as metro systems, cloud computing infrastructures, and smart power grids.
    Game-theoretic methods have been extensively applied to capture the interactions between providers and attackers of critical infrastructures [22] to develop strategies to ensure their continued operation in the presence of evolving threats. Such interactions are being increasingly analyzed ever since the 9/11 attacks [23], after which there has been an increased emphasis on protecting critical infrastructures. Most of these studies use sequential models with the provider as the first mover and the attacker as the second. This is useful in enabling analysts to draft preemptive recommendations [24]. Game theory has been used widely in the field of cyber–physical network security [25,26,27]. An overview of the game-theoretic models in network security is provided in [28]. However, these works do not consider the physical components that are critical to the functioning of cyber networks.
    Several infrastructures to support power distribution, transportation, and agriculture have been analyzed using game-theoretic approaches. They typically employ complex dynamic models of the underlying physical systems [11]—in particular, using partial differential equations. Both game-theoretic formulations and their solutions are quite extensive for such infrastructures, including: multiple-period games [29] that address multiple time-scales of system dynamics; incomplete information games [30,31,32] that account for partial knowledge about the system dynamics and attack models; and multiple-target games [33,34] that account for possibly competing objectives. A comprehensive review of the defense and attack models in various game-theoretic formulations has been presented in [35].
    Game-theoretic methods have been developed specifically to address the system reliability and robustness for several applications [22], which are particularly applicable to critical infrastructures. Recently, there have been increasing levels of integration of cyber components, including computing and networking devices, into several critical infrastructures. This contributes to faster information transmission and processing, but also lead to unprecedented security vulnerabilities due to the underlying cyber–physical correlations [36]. While many existing formulations utilize detailed dynamic infrastructure models, the cyber–physical correlations have only recently been explicitly addressed, and in a limited way [36]. Because of the large scale and complexity of cyber–physical systems, most game models obtain Nash equilibrium using numerical methods. The current paper analytically presents players’ best responses and provides insights for defense strategy at NE.
    Due to the wide spectrum of the game-theoretic methods used for critical infrastructures, we now briefly consider the ones that are directly related to our discrete cyber–physical component models. These are much simpler than others used in infrastructures such as power distribution, transportation, and agriculture [11]. For example, partial differential equations that model traffic dynamics. In terms of overall goals, they belong to formulations that integrate system reliability and robustness parameters [22], which are applied for example to smart power grids [37], cloud computing infrastructures [38], and power systems [39]. Within this class, Stackelberg games are an important subclass, wherein the provider chooses actions based on instantaneous information. They lead to more reactive and sensitive responses to dynamic disruptions compared to long-term strategies used in Markov game models [37,40].
    Stackelberg formulations have been applied to discrete models of cyber–physical infrastructures in various forms [36], and an important subset is formulated using the number of cyber and physical components that are attacked or reinforced. These formulations capture infrastructures with a large number of components, and are coarser than formulations that consider the attack and defense of individual cyber and physical components [41]. The correlation function was proposed in [2] to capture the dependencies between the survival probabilities of cyber and physical sub-infrastructures; this is a generalization of simple linear forms studied earlier in [4,5]. First-order differential conditions on the sub-infrastructure survival probabilities are proposed in [2] as a generalization of the statistical independence and contest survival functions [42], and the role of multiplier functions on these conditions has been further expanded in [1].
    We now place our formulation and results within the broader context above. The composite utility functions described in the introduction generalize the sum-form [2] and product-form [3] utility functions used for infrastructures with discrete components. The composite utility functions have been applied to more general systems of systems (SOS) in [1,43], and here we customize them to cyber–physical sub-infrastructures. The resultant NE conditions unify the previous results by using composite gain–cost terms (Theorem 1), and also provide second-order NE derivative conditions (Theorem 2), which together enable us to apply them to more detailed and newer (metro system) infrastructure models. SOS have been studied under a similar formulation [43,44], and also under additional conditions due to an asymmetric role played by the inter-connection network [1,45,46]. The current paper explicitly targets the cyber and physical sub-infrastructures, provides in-depth results based on cyber–physical correlations, and also addresses the second-order NE conditions that have not been addressed in earlier works on cyber–physical infrastructures [2,3]. To make the presentation self-contained, we provide or re-state definitions of various terms needed for our formulation (Section 3) from the references.

    3. Discrete System Models

    Acyber–physical infrastructure (CPI) consists of cyber and physical sub-infrastructures withNC cyber components andNP physical components. Both components must beoperational and available as parts of the infrastructure, but they can be functionally disabled or operationally disconnected from the infrastructure through attacks. In particular, cyber attacks may render physical components unavailable even if they are functional. For example, cyber attacks on a power grid’s SCADA system might disable power flows on the lines it controls. Physical component attacks may also render cyber components unavailable, as in the case of fiber cuts in a cloud infrastructure described in the previous section. We capture these cyber–physical interactions using the survival probabilities of cyber and physical sub-infrastructures using: (i) the cyber–physical failure correlation functionf(PC,PP) that captures the correlations at the sub-infrastructure level (Section 3.1), and (ii) the differential conditions onPC andPP using the multiplier functions that capture the component-level correlations (Section 3.2).

    3.1. Cyber–Physical Structural Interactions

    The failure probabilities of cyber and physical sub-infrastructures arePC¯=1PC andPP¯=1PP, respectively. The probability that a CPI is operational is given by
    PCP=1PC¯+PP¯PC¯P¯=PC+PP1+PC¯P¯.
    The joint failure probabilityPC¯P¯ is expressed in terms of the conditional failure probability asPC¯P¯=PC¯|P¯PP¯, which leads to the following definition.
    Condition 1.
    Cyber–Physical Correlation Function:The survival probability a CPI is given by
    PCP=PC+PP1+fPC,PP(1PP),
    wherefPC,PP=PC¯|P¯ is the cyber–physical failure correlation function of cyber and physical sub-infrastructures.
    The failure correlation function captures the dependence of cyber sub-infrastructure failure on that of physical sub-infrastructure. For example, in a cloud computing infrastructure withNS servers at each site, disabling the fiber would disconnect all servers at the site, which can be reflected by choosingfPC,PP=NS(1PP). This shows that the physical failure rate is amplified byNS in rendering the servers unavailable. The following are two illustrative forms offPC,PP.
    (a)
    OR Systems: A special class called the OR systems are defined in [4,5] to illustrate cases where cyber and physical parts can be independently analyzed. For these systems, the probability of failure of cyber or physical sub-infrastructure isPC¯P¯=PC¯+PP¯ or equivalentlyPC¯P¯=0. That is, the failure of the physical sub-infrastructure is guaranteed not to cause the failure of the cyber sub-infrastructure. Thus, we havePCP=PC+PP1 andfPC,PP=0. These systems are of mostly academic interest.
    (b)
    Linear Forms: The linear form
    f(PC,PP)=aC(1PC)+bC
    expresses the correlation in terms ofmultiplicative andadditive coefficients, denoted byaC andbC, respectively, and is used in [5] (in [4] onlyaC is used). Here,aC represents a proportional change inPC¯ due to the physical sub-infrastructure failure, whereasbC represents an independent factor. There are two special cases under this form:
    (i)
    Statistical Independence: We havefPC,PP=1PC. That is,aC=1 andbC=0, so thatPC¯P¯=PC¯PP¯ or equivalentlyPCP=PCPP, and
    (ii)
    Failure Certainty: When physical failures lead to cyber failures with certainty, we havefPC,PP=1. That is,aC=0 andbC=1, such thatPCP=PC (i.e., infrastructure survival probability solely depends on cyber sub-infrastructure).
    More generally, ifaC>1 andbC0, oraC1 andbC>0, the cyber failures are positively correlated to physical failures. That is, they occur with higher probability following physical failures (i.e.,PC¯|P¯>PC¯). IfaC<1 andbC0, oraC1 andbC<0, i.e.,fPC,PP<1PC, cyber failures arenegatively correlated to physical failures (i.e.,PC¯|P¯<PC¯).
    We now consider that the effects of reinforcements and attacks can be separated at the sub-infrastructure level such thatPPzC=0 andPCzP=0, wherez=x,y. Intuitively, these conditions indicate that only direct impacts are dominant at the level of sub-infrastructures. For example, cyber reinforcements contribute to improving the cyber sub-infrastructure but not directly to physical sub-infrastructure. We capture the sub-infrastructure correlations for the provider using the following conditions.
    Condition 2.
    De-Coupled Reinforcement Effects:The partial derivatives ofPCP in Condition 1 satisfy the following conditions
    PCPxC=1+(1PP)fPCPCxCandPCPxP=1f(PC,PP)+(1PP)fPPPPxP
    for the provider.

    3.2. Sub-Infrastructure Survival Probabilities

    We consider that the sub-infrastructure survival probabilities satisfy the following differential conditions.
    Condition 3.
    Cyber and Physical Multiplier Functions:The derivatives of survival probabilities of cyber and physical sub-infrastructures can be expressed as
    PCxC=ΛC(xC,xP,yC,yP)PCandPPxP=ΛP(xC,xP,yC,yP)PP
    in terms of the cyber and physical multiplier functionsΛC andΛP, respectively.
    These multiplier functions capture the underlying details of cyber and physical sub-infrastructures (specialized systems of [1]) after factoring out the corresponding survival probabilities. They depend on the the parameters of cyber and physical sub-infrastructures, in addition to game variablesxC,xP,yC, andyP. For example, for the cloud computing infrastructure described in Example 1,ΛC depends on the number of serversNS at each site, and for the metro system in Example 2,ΛP depends on the number of linesNL controlled by a signal. These somewhat abstract functions enable us to encapsulate some of the sub-infrastructure details so that the multiplier functions appear explicitly in various estimates at NE (including the survival probability estimates in Theorem 1), and provide valuable insights into the underlying dependencies. These multiplier functions can take simple forms in the following two important cases, which have been studied extensively in the literature.
    (a)
    Statistically Independent Components: LetpC|R andpC|N denote the conditional survival probability of a cyber component with and without reinforcement, respectively. Under the assumption of statistical independence of component failures, the probabilities that the cyber and physical parts survive the attacks are given by [4]
    PC=pC|RxCpC|NNCxCandPP=pP|RxPpP|NNPxP,
    respectively. In this case, we havePCxC=PClnpC|RpC|N.
    (b)
    Contest Survival Functions: The contest survival functions are used to characterizePC andPP in [42] such thatPC=ξ+xCξ+xC+yC, for which we have
    PCxC=PCyC(ξ+xC+yC)(ξ+xC).
    We now describe three simplified illustrative cyber–physical infrastructure models for which we derive estimates for the multiplier functionsΛB(·), whereB=C,P under uniform selection of components to reinforce and attack. We will expand further on these examples inSection 5 by taking additional details into account.
    Example 1.
    Cloud Computing Infrastructure:A cloud computing infrastructure (Figure 1) consisting of multiple sites can be simply modeled withNS servers at each site. Cyber attacks may bring down the individual servers, and the communication fiber routes to the sites may be physically cut. Reinforcements to these components may be in the form of replicated stand-by servers, and redundant physically-separated fiber routes. Since a physical fiber cut disconnects all servers at the site from the network, a first-order model isfPC,PP=NS(1PP), which indicates the multiplicative effect of physical attacks. There are[yPxP]+ non-reinforced fiber connections that are vulnerable to physical attacks, where[·]+ represent the non-negative part. That is,[z]+=z forz>0, and[z]+=0 otherwise. Under a uniform distribution of attacks and reinforcements, the probability that a cyber-reinforced server survivesyP fiber attacks is estimated by
    pC|R=fC1+NS[yPxP]+,
    where0fC1 is an appropriately chosen normalization factor. This estimate decreases with higher values of[yPxP]+. If a server is not reinforced, it will be brought down by a direct cyber attack, or disconnected through a fiber attack. Thus, the survival probability of such a non-reinforced server is
    pC|N=fC1+yC+NS[yPxP]+,
    which reflects a decrease due toyC compared to a reinforced server. For example, in an infrastructure with 10,000 servers at each site with a non-reinforced fiber, a single fiber attack has an effect similar to 10,000 individual server cyber attacks. Using these formulae, we have
    ΛC(xP,yC,yP)=ln1+yC1+NS[yPxP]+
    for the cyber sub-infrastructure, which interestingly does not depend on cyberxC but depends on physicalxP.
    Example 2.
    Metro System:A metro system (Figure 2) consists of many components, including trains, tracks, perway, telecommunication systems, and electrical systems. The system operates normally when trains are running smoothly, being controlled by the signals located along the lines. A simplified model of a metro system may be based on abstracting its signaling system. The model consists ofNS signals along the tracks and the actuators onNT trains, which are centrally controlled. The communication between the signals and the control center may be interrupted through cyber means, while the actuators on trains may be damaged physically. Reinforcements to these components may be in the form of redundant communication routes for the signals and better physical protection of the actuators on trains. Since a cyber attack on a signal along the tracks partially disrupts the smooth running of all the trains running the line through that signal, a first-order model is given byPP¯|C¯=αNL(1PC), which captures the multiplicative effect of cyber attacks, where0<α<1 is properly chosen to represent a partial effect andNL indicates the number of trains running on a line.
    Then, by using the Bayes formulaPC¯|P¯=PP¯|C¯PC¯/PP¯, we havef(PC,PP)=αNL(1PC)2(1PP). Typically,NL is on the order of tens, whereasNS in the previous example could be in the thousands.
    We now consider that the attacker and provider choose components to attack and reinforce, respectively, according to uniform distribution. Then, there are[yCxC]+ non-reinforced signals. The probability that a reinforced actuator survives the cyber attacks is estimated by
    pP|R=fP1+αNL[yCxC]+,
    where0fP1 is a normalization factor. This estimate reflects that cyber attacks are more likely to disrupt the actuator functioning for higher values of[yCxC]+, and the physical attacks have no effect on a reinforced actuator. If the actuator is not reinforced, it will be brought down by a direct physical attack, or indirectly through a cyber attack. Thus, we estimate its survival probability as
    pP|N=fP1+yP+αNL[yCxC]+,
    which is inversely proportional to the number of physical attacksyP. Using these formulae, we have
    ΛP(xC,yC,yP)=ln1+yP1+αNL[yCxC]+
    for the physical sub-infrastructure, which interestingly does not depend on physicalxP but captures the dependence on cyberxC. Note that the roles of cyber and physical components are switched in this example compared to the cloud computing infrastructure.
    Example 3.
    Smart Power Grid Infrastructure:A power grid infrastructure (Figure 3) is controlled by a SCADA system using information collected by a network of sensors that monitor transmission and distribution lines. The sensors are placed at strategic locations for effective flow control, and they have good connectivity to the SCADA system via communication nodes. We assume that each communication node relays information from sensors ofNL lines to the SCADA system, and it may be disabled by a direct cyber attack, which will disrupt the information flow from allNL lines. Typically,NL is of the order of tens. When the monitoring information of a line is lost, the SCADA system may assume the line to be down for safety reasons, and hence disrupting a node will also disrupt the power flow on allNL lines. By using reasoning analogous to the previous two examples, we havePP¯|C¯=NL(1PC). Then, by using the Bayes formulaPC¯|P¯=PP¯|C¯PC¯/PP¯, we havef(PC,PP)=NL(1PC)2(1PP). We then estimate the survival probability of a reinforced line, which can be disconnected by[yCxC]+ cyber attacks, as
    pP|R=fP1+NL[yCxC]+,
    where0fP1 is appropriately chosen under uniform attack and reinforcement distributions. Meanwhile, a power line can be directly disrupted by physical means if it is not reinforced, and it is more likely to be unavailable if there are more physical attacks (i.e., higheryP). Thus, an attack on a communication node will have an amplified effect on power lines compared to direct physical attacks, such that
    pP|N=fP1+yP+NL[yCxC]+,
    which provides an estimate of the probability of survival of a non-reinforced power line. Using the above formulae, we have
    ΛP(xC,yC,yP)=ln1+yP1+NL[yCxC]+,
    which does not depend onxP as in the case of the metro system.

    4. Game-Theoretic Formulation

    The provider’s objective is to make the infrastructure resilient by reinforcingxC andxP cyber and physical components, respectively, to minimize the utility function. Foruniform component reinforcement costs, we haveLDxC,xP=cCDxC+cPDxP, wherecCD andcPD are reinforcement costs of cyber and physical components, respectively. The attacker’s objective is to disrupt the infrastructure by attackingyC oryP cyber and physical components, respectively (but not both), in order to minimize the utility function. Foruniform component attack costs, we useLAyC,yP=cCAyC+cPAyP, wherecCA andcPA are the attack costs of cyber and physical components, respectively, and only one ofyC andyP is non-zero.

    4.1. Nash Equilibrium Conditions

    The Nash equilibrium conditions are derived by equating the corresponding derivatives of the utility functions (as shown inSection 1) to zero, which yields
    UDxB=GDFD,GPCP+LDFD,LPCPPCPxB+FD,GGDxB+FD,LLDxB=0,
    whereB=C,P for the provider. We defineLG,LD=GDFD,GPCP+LDFD,LPCP as thecomposite gain–cost term, andFG,LD,B=FD,GGDxB+FD,LLDxB as thegain–cost gradient with respect toxB,B=C,P. For the attacker, we similarly obtain, forB=C,P,
    UAyB=GAFA,GPCP+LAFA,LPCPPCPyB+FA,GGAyB+FA,LLAyB=0.

    4.2. OR Systems

    The OR subsystems are a special case where the probability of simultaneous failures of cyber and physical sub-infrastructures is negligible. [4]. Here, the infrastructure will fail if either of the cyber or physical sub-infrastructures fail, such thatPC¯P¯=PC¯+PP¯, or equivalentlyPCP=PC+PP1. In these (theoretical) systems, the dependence ofPCP on system parameters at NE is easier to derive and interpret, since it is determined entirely by Condition 3 without involvingf(PC,PP). We have a much simpler form of Condition 2 given byPCPxC=PCxC andPCPxP=PPxP. At NE, we have
    PCxC=FD,GGDxC+FD,LLDxCGDFD,GPCP+LDFD,LPCP=FG,LD,CxC,xP,yC,yPLG,LDxC,xP,yC,yP=ΘCxC,xP,yC,yP,
    PPxP=FD,GGDxP+FD,LLDxPGDFD,GPCP+LDFD,LPCP=FG,LD,PxC,xP,yC,yPLG,LDxC,xP,yC,yP=ΘPxC,xP,yC,yP,
    whereinΘC· andΘP· are called the cyber and physicalscaled gain–cost gradients, respectively. Using Condition 3, we obtain the following estimates for the survival probabilities of cyber and physical sub-infrastructures:
    P˜C;DxC,xP,yC,yP=ΘCxC,xP,yC,yPΛC(xC,xP,yC,yP)andP˜P;DxC,xP,yC,yP=ΘPxC,xP,yC,yPΛP(xC,xP,yC,yP).
    These estimates for cyber and physical sub-infrastructures depend mainly on the corresponding scaled gain–cost gradients, and thus represent a “separation” of the cyber and physical parts at this level. In this sense, OR systems constitute an important analytical case wherein the cyber–physical correlations between the sub-infrastructures may be ignored. In addition, these estimates provide the sensitivity information of the survival probabilities of cyber and physical sub-infrastructures, and they depend only on the derivatives of the corresponding probabilities. Although they do not involve the failure correlation functionf(PC,PP), the cyber–physical interactions are still captured byΛC(·) andΛP(·) at the component level. Both survival probability estimatesP˜C;D andP˜P;D are proportional to the corresponding weighted cost and reward functions, and are inversely proportional to their weighted derivatives. This seemingly counter-intuitive trend applies only to the set of Nash equilibria, and not to the overall system behavior.

    4.3. Statistical Independence of Cyber and Physical Sub-Infrastructures

    We consider that the cyber sub-infrastructure failures are statistically independent such thatPCP=PCPP andfPC,PP=1PC. At NE, we have
    PPPCxC=ΘCxC,xP,yC,yPandPCPPxP=ΘPxC,xP,yC,yP.
    We now substitute expressions forPCxC andPPxP based on Condition 3, and obtain the system of equations:
    P¯C;DP¯P;D=ΘCxC,xP,yC,yPΛC(xC,xP,yC,yP)andP¯C;DP¯P;D=ΘPxC,xP,yC,yPΛP(xC,xP,yC,yP).
    Qualitatively, at NE, the survival probability estimates of cyber and physical sub-infrastructuresP¯C;D andP¯P;D have an inverse relationship, but their product is determined byΛC(·) andΛP(·) in a manner similar to the individual probabilitiesP˜C;D andP˜P;D of OR systems. However, unlike OR systems, statistical independence is not sufficient to decouple the estimatesP¯C;D andP¯P;D so that they depend solely onΛC(·) andΛP(·), respectively.

    4.4. NE Sensitivity Functions

    We now derive estimates forPC andPP at NE using the scaled gain–cost gradients and failure correlation function to obtain qualitative information about their sensitivities to different parameters from the provider’s perspective.
    Theorem 1.
    Under Conditions 1, 2, and 3, an estimate of the survival probability of physical sub-infrastructure at the Nash equilibrium forfPP0 is
    P^P;DxC,xP,yC,yP=1fPC,PP+fPP2fPP±1fPC,PP+fPP2fPP2ΘP(xC,xP,yC,yP)ΛP(xC,xP,yC,yP)fPP,
    and, forfPP=0, is
    P^P;DxC,xP,yC,yP=ΘP(xC,xP,yC,yP)ΛP(xC,xP,yC,yP)1fPC,PP.
    An estimate of the survival probability of cyber sub-infrastructure is
    P^C;DxC,xP,yC,yP=ΘC(xC,xP,yC,yP)ΛC(xC,xP,yC,yP)1+(1P^P;D)fPC.
    Proof: 
    At NE, we havePCPxC=ΘC(xC,xP,yC,yP) andPCPxP=ΘP(xC,xP,yC,yP). By using the formulae in Condition 2, we have
    1+(1PP)fPCPCxC=ΘC(xC,xP,yC,yP),
    1f(PC,PP)+(1PP)fPPPPxP=ΘP(xC,xP,yC,yP).
    We now substitute expressions forPCxC andPPxP based on Condition 3, and obtain the system of equations:
    1+(1PP)fPCPC=ΘC(xC,xP,yC,yP)ΛC(xC,xP,yC,yP),
    1f(PC,PP)+(1PP)fPPPP=ΘP(xC,xP,yC,yP)ΛP(xC,xP,yC,yP).
    The expression forP^P;D is obtained by solving forPP using the above quadratic equation, and the expression forP^C;D follows from the equation above it. □
    Compared to OR Systems, there are significant cyber–physical interactions at the sub-infrastructure level in bothP^P;DxC,xP,yC,yP andP^C;DxC,xP,yC,yP. In particular,P^P;DxC,xP,yC,yP depends on bothf(·) and its partial derivatives with respect toPP, and the partial derivatives ofGD andLD with respect toxP andΛP, as expected. Its dependence onPC is implicit through the failure correlation functionf(PC,PP). The qualitative behavior ofP^C;DxC,xP,yC,yP is quite similar with respect toLD, but its dependence onPP is also throughf. They are both affected byΛC(·) andΛP(·), and each of them in turn depends on the number of both cyber and physical component attacks and reinforcements. Thus, the estimatesP^P;D andP^C;D reflect the correlations between the sub-infrastructures explicitly throughf, as well as those captured by the survival probabilities of individual sub-infrastructures.
    Theorem 1 utilizesPC¯|P¯=f(PC,PP), which captures the failure effects of physical sub-infrastructure on the cyber sub-infrastructure. Alternatively, we can utilizePP¯|C¯=g(PC,PP), which captures the failure effects of cyber sub-infrastructure on the physical sub-infrastructure. In this case, we obtain a quadratic expression inPC. Then, we can estimateP^C;DxC,xP,yC,yP in terms ofg(PC,PP) by solving the quadratic equation as in Theorem 1. Additionally, results expressed in terms off(PC,PP) andg(PC,PP) can be converted between each other using the following expression:
    f(PC,PP)=PC¯P¯(1PP)=PP¯|C¯(1PC)(1PP)=g(PC,PP)(1PC)(1PP).
    The qualitative effects off(·) andg(·) on the sensitivity function estimates is quite similar, and their choice is determined by their functional forms and the accuracy with which they can be estimated.
    The estimates in Theorem 1 are based on the first-order derivatives of utility functions, and their minimization leads to second-order derivative conditions, which in turn provides an upper bound onPP as follows:
    Theorem 2.
    Under Conditions 1, 2, and 3, an upper bound on the survival probability of physical sub-infrastructure at the Nash equilibrium forfPP0 is
    PP1+1f(PC,PP)fPP+1fxPLG,LD2PCPxP2+FG,LD,PxPLG,LDxP.
    Proof: 
    At NE, the first derivative of the utility function is given by
    UDxB=GDFD,GPCP+LDFD,LPCPPCPxB+FD,GGDxB+FD,LLDxB=LG,LDPCPxB+FG,LD,B,
    whereB=C,P. The second derivative condition is given by
    2UDxB2=LG,LD2PCPxB2+LG,LDxBPCPxB+FG,LD,BxB>0,
    which in turn provides a bound onPCPxB as follows,
    PCPxB>LG,LD2PCPxB2+FG,LD,BxBLG,LDxB.
    The upper bound onPP then follows from Condition 2 by usingxB=xP andfPPPPxP=fxP . □
    This theorem indicates that the ratio of the correlation function and its derivativesfPP andfxP could limit the achievablePP. The cost termLG,LD andFG,LD,PxP can counter this effect somewhat, butLG,LDxP can add to this effect.

    4.5. Sum-Form and Product-Form Utility Functions

    The utility functions can be specialized to reflect different aspects of the infrastructure, in particular explicitly expressing the terms usingPCP(xC,xP,yC,yP). Corresponding to thesum-form inSection 1, the utility of the attacker is given by
    UA+xC,xP,yC,yP=PCP(xC,xP,yC,yP)gA+LA(yC,yP),
    where[1PCP(xC,xP,yC,yP)]gA is the expected reward for the costLA(yC,yP) of cyber or physical attacks. Similarly, theproduct-form utility of the attacker is given by
    UA×xC,xP,yC,yP=PCP(xC,xP,yC,yP)LA(yC,yP),
    which represents the expected cost when the infrastructure survives the attacks and thus represents “wasted” effort. The individual terms of the utility functions for sum- and product-forms are simplified as shown inTable 3 for the provider.
    Special cases of Theorem 1 for sum- and product-forms are presented in [2,4], and the second-order condition in Theorem 2 provides us with additional conditions on achievablePP. In particular, for the sum-form utility of the provider, the second derivative condition is
    2UDxB2=2PCPxB2gD+2LDxB2>0,
    which provides an upper bound on2PCPxB2. And for the product-form utility of the provider, the second derivative condition is
    2UDxB2=2PCPxBLDxBLD2PCPxB2+(1PCP)2LDxB2>0,
    which provides an upper bound onPCP.

    4.6. Survival Probabilities of Sub-Infrastructures

    It is instructive to compare the individual survival probabilities of cyber and physical sub-infrastructuresPC andPP, respectively, since the minimum of the two determines the survival probability of the infrastructure. Using the equations from the proof of Theorem 1, we have
    1+(1PP)fPCPC=ΘCxC,xP,yC,yPΛCxC,xP,yC,yP1f(PC,PP)+(1PP)fPPPP=ΘPxC,xP,yC,yPΛPxC,xP,yC,yP.
    In this section, for simplicity we denoteΛCxC,xP,yC,yP,ΛPxC,xP,yC,yP,ΘCxC,xP,yC,yP, andΘPxC,xP,yC,yP byΛC,ΛP,ΘC, andΘP, respectively. By dividing the above two equations byfPC andfPP, respectively, and eliminating the term(1PP) by subtraction, we obtain the following condition:
    ΘPPPΛPfPPfPCΘCPCΛC=1fPC,PPfPPfPC.
    Then, by usingPCPP=fPPfPC, we obtain the following relationship betweenPP andPC:
    PP=PCΛCΘPΛPPCΛC1f(PC,PP)+PCPPPCPPΘC.
    By comparing the right hand side toPC, the conditionPPPC is equivalent to
    PCΛCΛPΘP+PCPPΘCΛC1f(PC,PP)+PCPP,
    where ≐ is either ≤ or ≥ based on the sign of the denominator above. If ≐ is ≤, then the above condition is not satisfied if the right hand side is negative, which in turn corresponds to the signs of the two termsΛCΛPΘP+PCPPΘC and1f(PC,PP)+PCPP being the opposite. On the other hand, if ≐ is ≥, then this condition is not true if the right hand side is greater than 1. These two boundary conditions determine that one of the two conditionsPPPC andPPPC is true. In the other cases, this relationship is not that simply determined, and can take a more complicated form.
    For the special casefPC,PP=aC(1PC)+bC, we have
    PP=ΘPΛP1aC+aCPCbC.
    Then, the conditionPPPC leads to a quadratic equation with the following solution:
    PC=(1aCbC)2a±12a(1aCbC)24aCΘPΛP.
    The boundary conditions in this case can be derived as in the general case. However, a different line of analysis done in this case in [5] provides a much simpler characterization of the relationship betweenPC andPP. It yields the following simpler condition:
    PC=1bC1aCPP+dCDdPD(1aC),
    wheredCD=LDxCgDlnpP|RpP|N anddPD=LDxPgDlnpC|RpC|N. Then, the relationship betweenPC andPP is described by 12 different regions determined solely byaC,bC,dCD, anddPD such that in each region exactly one of the two conditionsPPPC andPPPC is true.

    5. Application Examples

    In this section, we expand the three examples fromSection 3.2 by taking more component details into account. First, we consider different types of cyber and physical components such thatxCi,iAC is the number of cyber components of typei, andxPj,jAP is the number of physical components of typej. Thus, in terms of the original indices, we havexC=iACxCi andxP=jAPxPj. We define sub-infrastructures consisting of only cyber components of typei and physical components of typej, with their survival probabilities denoted byPCi andPPj, respectively. Now we generalize Condition 3 as follows.
    Condition 4.
    The survival probabilities of cyber and physical sub-infrastructures are given by
    PCixCi=hCiPCi,xC,xP,yC,yP=ΛCi(xC,xP,yC,yP)PCi
    forxCi,iAC, corresponding to cyber components of type i, and
    PPjxPj=hPjPPj,xC,xP,yC,yP=ΛPj(xC,xP,yC,yP)PPj
    forxPj,jAP, corresponding to physical components of type j.
    The component failures are considered statistically independent for different types in [5] such that
    PC=iACPCi=iACpC|RixCipC|NiNCixCi,
    PP=jAPPPj=jAPpP|RjxPjpP|NjNPjxPj,
    wherepC|Ri andpP|Rj denote the probabilities of reinforced cyber component of typei and reinforced physical component of typej, respectively;pC|Ni andpP|Nj denote the probabilities of cyber component of typei and physical component of typej without reinforcement, respectively; andNCi andNPj denote the number of typei cyber components and typej physical components, respectively. These conditions in turn lead to the special case of Condition 4: foriAC,jAP,
    PCxCi=PClnpC|RipC|NiandPPxPj=PPlnpP|RjpP|Nj.
    We consider that these conditions are satisfied in both of the following examples.

    5.1. Cloud Computing Infrastructure

    The simple cloud computing infrastructure model of Example 1 inSection 3.2 is expanded to include a gateway router at each site, which connects to all servers at the site. A cyber attack on a gateway router will also have essentially the same effect as a physical fiber attack—namely, disconnecting all servers at the site. A fiber attack requires physical proximity, whereas a router cyber attack may be remotely launched, thereby representing different types of costs. Cyber components now belong to two classes, namely, servers and routers, such thatxC=xCS+xCR wherexCS andxCR denote the number of reinforced servers and routers, respectively. Similarly, we haveyC=yCS+yCR, whereyCS andyCR denote the number of servers and routers attacked, respectively. Then, for the two cyber sub-infrastructures, we have the failure correlation functionsfSPCS,PP=NS(1PP) andfRPCR,PP=(1PP), wherein the physical failures are amplified byNS for the servers but are the same for routers. Thus, the composite failure correlation functionf(PC,PP) is given as follows:
    fPC,PP=B{S,R}PC¯|P¯B=fSPCS,PP+fRPCR,PP=(NS+1)(1PP).
    Then, the survival probabilities of cyber-reinforced components are computed separately for the servers and routers, which are denoted bypC|RS andpC|RR, respectively. The probability that a cyber-reinforced server survives fiber or router attacks is given by
    pC|RS=fCS1+NS[yPxP]++NS[yCRxCR]+,
    which now depends on both physical attacks on fiber and cyber attack on routers. An estimate of the probability that a cyber-reinforced router survives a physical fiber attack is given bypC|RR=fCR1+[yPxP]+, since a cyber attack on a reinforced router has no impact and a fiber attack will disconnect only one router. If the router is not cyber-reinforced, then we havepC|NR=fCR1+[yPxP]++yCR, which additionally depends onyCR. By using these estimates for the router, we have
    ΛCRxP,yCR,yP=ln1+yCR1+[yPxP]+,
    which increases in the number of cyber router attacks but decreases in the number of attacks on non-reinforced routers. If the cyber component, server or router, is not reinforced, it will be brought down by a direct cyber attack or indirectly by fiber attack, but the latter will have a greater impact. However, cyber attacks on servers and routers will have different impacts on the availability of the infrastructure. That is, a server attack will only bring it down, but a router attack will make allNS servers unavailable. In some current infrastructures,NS could be on the order of thousands. Thus, for a server that is not cyber-reinforced, we use the estimate
    pC|NS=fCS1+NS[yPxP]++NS[yCRxCR]++yCS,
    which reflects the additional lowering of survival probability inversely proportional to the level of cyber attackyCS, and toyCR but amplified by a factorNS. Thus, for servers, we have
    ΛCSxCR,xP,yCS,yCR,yP=ln1+yCS1+NS[yPxP]++NS[yCRxCR]+,
    which increases in the number of server attacks but decreases in the attacks on non-reinforced routers and fibers.
    The survival probabilities of physical fiber components depend onyP such thatpP|R=fP andpP|N=fP1+yP. By combining the two formulae for fiber, we haveΛP(yP)=ln1+yP, which increases in the number of physical attacks. Similar to the case of the metro system, in addition toΛP(·) andΛCB(·), whereB=S,R, the survival probabilities of cyber and physical sub-infrastructures are determined by the correlation functionf(PC,PP), as described inSection 4.6.

    5.2. Metro System

    We refine the metro system model of Example 2 inSection 3.2 to include multiple traffic control centers, each connecting to all signals of a single line. A cyber attack on a control center will disconnect all signals of its line and disrupt all trains running on that line. Now, we separate the cyber components into two classes, namely, control centers and signals, andxC=xCT+xCS such thatxCT andxCS denote the number of reinforced control centers and signals, respectively. Similarly,yC=yCT+yCS, such thatyCT andyCS denote the number of control centers and signals attacked, respectively. Since we focus on the smooth running of the trains, it is more instructive to carry out the analysis in terms of the failure correlation functiong(PC,PP)=PP¯|C¯. Then, for the sub-infrastructures, we have the failure correlation functionsgTPCT,PP=NL1PCT andgSPCS,PP=αNL1PCS, wherein the physical failures are amplified byNL for control centers and byαNL for the signals. We now estimate the composite failure correlation functiong(PC,PP) as follows:
    gPC,PP=gTPCT,PPPATPAT+PAS+gSPCS,PPPASPAT+PAS=NL1PCTPATPAT+PAS+αNL1PCSPASPAT+PAS,
    wherePAT andPAS are the probabilities of a cyber attack on a control center and a signal of the metro system, respectively, andPATPAT+PAS andPASPAT+PAS are conditional failure probabilities of the control center and signal, respectively, given that the cyber sub-infrastructure of the metro system failed.
    The probability that a physically-reinforced actuator on a train survives cyber attacks on a control center or signal is given by
    pP|R=fP1+NLyCTxCT++αNL[yCSxCS]+,
    which now depends on both cyber attacks on control centers and signals. If the actuator is not physically-reinforced, then we have
    pP|N=fP1+yP+NL[yCTxCT]++αNL[yCSxCS]+,
    which additionally decreases with respect toyP. By using these estimates for an actuator, we have
    ΛPxCT,xCS,yCT,yCS,yP=ln1+yP1+NL[yCTxCT]++αNL[yCSxCS]+,
    which increases in the number of physical attacks on actuators, but decreases in the number of cyber attacks on control centers and signals. Since the termΛP appears in the denominator,P^P;D in Theorem 1 decreases with the number of physical attacksyP, and increases with[yCTxCT]+ and[yCSxCS]+, which are the number of cyber attacks on the control centers and signals exceeding the reinforcements, respectively. The latter condition may appear counter-intuitive at the surface, but note that it only characterizes the states that satisfy NE conditions. An analogous dependence ofP^P;D on the parametersxC,xP,yC, andyP (shown in Theorem 1) is less direct, sinceΛP appears inside the square root but is qualitatively somewhat similar since they appear in the denominator.
    The cyber component survival probabilities are computed separately for the reinforced control centers and signals, denoted bypC|RT andpC|RS, respectively. The survival probabilities of cyber components are given bypC|RB=fCB andpC|NB=fCB1+yCB, whereB=T,S. Then we haveΛCByCB=ln1+yCB, whereB=T,S, which increases in the total number of cyber attacks on the specific type of component. Since the termΛCB appears in the denominator,P^C;D in Theorem 1 decreases with the number of cyber attacksyCB, whereB=T,S.
    Note that the net effect of the number of attacks and reinforcements on the survival probabilities of cyber and physical sub-infrastructures is also determined by the correlation function as described inSection 4.6, in addition toΛP andΛCB, whereB=T,S.

    5.3. Smart Power Grid Infrastructure

    The power grid model described in Example 3 inSection 3.2 is expanded to include smart meters on the lines that provide the demand information to generation and distribution control systems. The smart meters can be attacked by cyber means to manipulate the demand information (e.g., to make it zero). We group the cyber components into two classes, namely, communication nodes and smart meters, such thatxC=xCS+xCM, wherexCS andxCM are the number of reinforced communication nodes and smart meters, respectively. Similarly, we haveyC=yCS+yCM, whereyCS andyCM are the number of communication nodes and smart meters attacked, respectively. Since the electricity transmission in the grid takes place on the physical sub-infrastructure, it is more instructive to carry out the analysis in terms of the failure correlation functiong(PC,PP)=PP¯|C¯. As in the metro system example, for the sub-infrastructures, we have the failure correlation functionsgSPCS,PP=NL1PCS andgMPCM,PP=1PCM, wherein the attacks on communication nodes are amplified by the number of linesNL controlled by each of them, but are the same for smart meter attacks. Then, we utilize the estimate
    g(PC,PP)=NL1PCSPASPAS+PAM+1PCMPAMPAS+PAM,
    wherePAS andPAM are the probabilities of an attack on a communication node and smart meter, respectively, andPASPAS+PAM andPAMPAS+PAM are conditional failure probabilities of a communication node and smart meter, respectively, given that the cyber sub-infrastructure failed.
    Then, the survival probabilities of cyber components are estimated separately for the communication nodes and smart meters. The survival probabilities of the power supply lines with and without reinforcement are denoted bypP|R andpP|N, respectively. A communication node or a smart meter may be disabled by cyber means, which will disrupt the power flow on the lines so that
    pP|R=fP1+NL[yCSxCS]++[yCMxCM]+,
    for physically-reinforced power lines. Note that cyber attacks on communication nodes are amplified byNL times compared to attacks on smart meters. Each power line can be directly disrupted by physical means such that it can be brought down if not reinforced, and thus we have
    pP|N=fP1+yP+NL[yCSxCS]++[yCMxCM]+,
    which reflects the amplified effect of cyber attacks on communication nodes compared to physical line attacks. Combining the two formulae, we have
    ΛPxCS,xCM,yCS,yCM,yP=ln1+yP1+NL[yCSxCS]++[yCMxCM]+,
    which increases in the number of attacks on non-reinforced power lines and decreases in the number of attacks on non-reinforced communication nodes and non-reinforced smart meters, but the former effect is amplifiedNL times. The survival probabilities of cyber components are given bypC|RB=fCB andpC|NB=fCB1+yCB, whereB=S,M. Then, we haveΛCByCB=ln1+yCB, whereB=S,M, which increases in the total number of cyber attacks. As in the previous examples, the net effect of the number of attacks and reinforcements on the survival probabilities of cyber and physical sub-infrastructures is also determined by the correlation function (in addition toΛP andΛCB, whereB=S,M) as described inSection 4.6.

    6. Conclusions

    We studied a class of infrastructures characterized by the number of discrete components that can be disrupted by either cyber or physical attacks, and are protected by cyber and physical reinforcements. We characterized the cyber–physical interactions in these infrastructures at two levels: (i) the failure correlation function specifies the conditional survival probability of a cyber sub-infrastructure given that of the physical sub-infrastructure as a function of their marginal probabilities, and (ii) the individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions. We derived Nash equilibrium conditions in terms of partial derivatives of cost terms, failure correlation function, multiplier functions, and survival probabilities of sub-infrastructures and their partial derivatives. We then estimated the sensitivity functions that indicate the dependence of infrastructure survival probability on these parameters. We applied this approach to models of metro systems, cloud computing infrastructures, and smart power grids at different levels of abstraction when all have a large number of components. These results generalize previous results using simpler utility functions in [2,3,4,5], and specialize the results on systems of systems in [8,43,44,45,46,47,48]. Together, our results enable us to unify the previous results and consider more detailed models of the correlations between the sub-infrastructures in the metro systems, cloud computing infrastructures, and smart power grids, with sharpened focus on cyber and physical sub-infrastructures.
    Several extensions of this formulation could be pursued in future studies, including the cases where the effects of attacks and reinforcements of specific components are explicitly accounted for. In such formulations,xC andxP may be replaced by vectors whose components are Boolean representing the reinforcement of a component or a fraction representing the probability of reinforcement. It would also be of future interest to explicitly model various redundancies incorporated by infrastructures to avoid single-point failures (e.g., abstracted by fiber cuts). Such extensions may also require a more refined characterizations of attacks (e.g., single- or multiple-fiber attacks) and defenses, which may lead to their partial successes. Indeed, the attack and defense models can be extended to include their success probabilities to capture cases wherein the attacks and reinforcements are not always guaranteed to fully fail or succeed. It would be interesting to study sequential game formulations of this problem, and cases where different levels of knowledge are available to the attacker and provider. Other future formulations could include multiple attackers and hybrid infrastructure models. For example, physical sub-infrastructure represented by partial differential equations and cyber sub-infrastructures represented by graphs. Applications of our approach to more detailed models of metro systems, cloud computing infrastructures, smart power grids, and high-performance computing complexes would be of future interest.

    Author Contributions

    Authors made equal overall contributions to the formulation, analytical solutions and applications parts of this paper. N.S.V.R., J.Z. and D.K.Y.Y. are leads for the formulation; N.S.V.R., C.Y.T.M. and F.H. are leads for analytical solutions; and C.Y.T.M. and N.S.V.R. are leads for the development of applications.

    Funding

    This work is funded by the Mathematics of Complex, Distributed, Interconnected Systems Program, Office of Advanced Computing Research, U.S. Department of Energy, and by Extreme Scale Systems Center, sponsored by U. S. Department of Defense, and performed at Oak Ridge National Laboratory managed by UT-Battelle, LLC for U.S. Department of Energy under Contract No. DE-AC05-00OR22725.

    Conflicts of Interest

    The authors declare no conflict of interest.

    References

    1. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Yau, D.K.Y.; Zhuang, J. Defense Strategies for Asymmetric Networked Systems with Discrete Components.Sensors2018,18, 1421. [Google Scholar] [CrossRef] [PubMed]
    2. Rao, N.S.V.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Cyber-physical correlations for infrastructure resilience: A game-theoretic approach. In Proceedings of the International Conference on Information Fusion, Salamanca, Spain, 7–10 July 2014. [Google Scholar]
    3. Rao, N.S.V.; Ma, C.Y.T.; Shah, U.; Zhuang, J.; He, F.; Yau, D.K.Y. On resilience of cyber-physical infrastructures using discrete product-form games. In Proceedings of the International Conference on Information Fusion, Washington, DC, USA, 6–9 July 2015. [Google Scholar]
    4. Rao, N.S.V.; Poole, S.W.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Cyber and physical information fusion for infrastructure protection: A game-theoretic approach. In Proceedings of the International Conference on Information Fusion, Istanbul, Turkey, 9–12 July 2013. [Google Scholar]
    5. Rao, N.S.V.; Poole, S.W.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Infrastructure resilience using cyber-physical game-theoretic approach. In Proceedings of the International Symposium on Resilient Cyber System, San Francisco, CA, USA, 13–15 August 2013. [Google Scholar]
    6. Fudenberg, D.; Tirole, J.Game Theory; MIT Press: Cambridge, MA, USA, 2003. [Google Scholar]
    7. Rass, S.; König, S.; Schauer, S. On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. InDecision and Game Theory for Security; Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S., Eds.; Springer International Publishing: Cham, The Netherland, 2017; pp. 494–505. [Google Scholar]
    8. Rao, N.S.V.; Ma, C.Y.T.; He, F. Defense strategies for multi-site cloud computing server infrastructures. In Proceedings of the International Conference on Distributed Computing and Networking, Varanasi, India, 4–7 January 2018. [Google Scholar]
    9. DHS.Critical Infrastructure Sectors; DHS: Anacostia, Southeast Washington, DC, USA, 2015. [Google Scholar]
    10. Rinaldi, S.M.; Peerenboom, J.P.; Kelly, T.K. Identifying, understanding, and analyzing critical infrastructure interdependencies.IEEE Control Syst.2001,21, 11–25. [Google Scholar] [CrossRef]
    11. Brown, G.; Carlyle, M.; Salmerón, J.; Wood, K. Defending Critical Infrastructure.Interfaces2006,36, 532–544. [Google Scholar] [CrossRef] [Green Version]
    12. Brown, G.; Carlyle, M.; Salmeron, J.; Wood, K. Analyzing the vulnerability of critical infrastructure to attack and planning defenses. InTutorials in Operations Research: Emerging Theory, Methods, and Applications; INFORMS: Catonsville, MD, USA, 2005; pp. 102–123. [Google Scholar]
    13. Moteff, J.; Parfomak, P.Critical Infrastructure and Key Assets: Definition and Identification; DTIC Document; DTIC: Los Angeles, CA, USA, 2004. [Google Scholar]
    14. Scaparra, M.P.; Church, R.L. A bilevel mixed-integer program for critical infrastructure protection planning.Comput. Oper. Res.2008,35, 1905–1923. [Google Scholar] [CrossRef]
    15. Lewis, T.G.Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation; John Wiley & Sons: New York, NY, USA, 2014. [Google Scholar]
    16. Bu, S.; Yu, F.R. A game-theoretical scheme in the smart grid with demand-side management: Towards a smart cyber-physical power infrastructure.IEEE Trans. Emerg. Top. Comput.2013,1, 22–32. [Google Scholar] [CrossRef]
    17. Hahn, A.; Ashok, A.; Sridhar, S.; Govindarasu, M. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.IEEE Trans. Smart Grid2013,4, 847–855. [Google Scholar] [CrossRef]
    18. Karnouskos, S. Cyber-physical systems in the smartgrid. In Proceedings of the 2011 9th IEEE International Conference on Industrial Informatics (INDIN), Lisbon, Portugal, 26–29 July 2011; pp. 20–23. [Google Scholar]
    19. Mo, Y.; Kim, T.H.J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–physical security of a smart grid infrastructure.Proc. IEEE2012,100, 195–209. [Google Scholar]
    20. Pasqualetti, F.; Dörfler, F.; Bullo, F. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of the 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), Orlando, FL, USA, 12–15 December 2011; pp. 2195–2201. [Google Scholar]
    21. Kure, H.I.; Islam, S.; Razzaque, M.A. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System.Appl. Sci.2018,8, 898. [Google Scholar] [CrossRef]
    22. Bier, V.M.; Azaiez, M.N.(Eds.) Game Theoretic Risk Analysis of Security Threats; Springer: Berlin, Germany, 2009. [Google Scholar]
    23. Sandler, T. Terrorism & game theory.Simul. Gaming2003,34, 319–337. [Google Scholar]
    24. Hausken, K. Strategic defense and attack of series systems when agents move sequentially.IIE Trans.2011,43, 483–504. [Google Scholar] [CrossRef]
    25. Cardenas, A.A.; Amin, S.; Sastry, S. Secure control: Towards survivable cyber-physical systems. In Proceedings of the The 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 495–500. [Google Scholar]
    26. Chen, P.Y.; Cheng, S.M.; Chen, K.C. Smart attacks in smart grid communication networks.IEEE Commun. Mag.2012,50, 24–29. [Google Scholar] [CrossRef]
    27. Shiva, S.; Roy, S.; Dasgupta, D. Game theory for cyber security. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA, 21–23 April 2010; p. 34. [Google Scholar]
    28. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.P. Game theory meets network security and privacy.ACM Comput. Surv. (CSUR)2013,45, 25. [Google Scholar] [CrossRef]
    29. Jose, V.R.R.; Zhuang, J. Technology Adoption, Accumulation, and Competition in Multi-period Attacker-Defender Games.Mil. Oper. Res.2013,18, 33–47. [Google Scholar] [CrossRef]
    30. He, F.; Zhuang, J. Modelling `contracts’ between a terrorist group and a government in a sequential game.J. Oper. Res. Soc.2012,63, 790–809. [Google Scholar] [CrossRef]
    31. Jenelius, E.; Westin, J.; Holmgren, J. Critical infrastructure protection under imperfect attacker perception.Int. J. Crit. Infrastruct. Prot.2010,3, 16–26. [Google Scholar] [CrossRef]
    32. Nikoofal, M.; Zhuang, J. Robust Allocation of a Defensive Budget Considering an Attackers Private Information.Risk Anal.2012,32, 930–943. [Google Scholar] [CrossRef] [PubMed]
    33. Shan, X.; Zhuang, J. Cost of Equity in Homeland Security Resource Allocation In the Face of A Strategic Attacker.Risk Anal.2013,33, 1083–1099. [Google Scholar] [CrossRef] [PubMed]
    34. Shan, X.; Zhuang, J. Hybrid Defensive Resource Allocations in the Face of Partially Strategic Attackers in a Sequential Defender-attacker Game.Eur. J. Oper. Res.2013,228, 262–272. [Google Scholar] [CrossRef]
    35. Hausken, K.; Levitin, G. Review of Systems Defense and Attack Models.Int. J. Perform. Eng.2012,8, 355–366. [Google Scholar]
    36. Das, S.K.; Kant, K.; Zhang, N.An Analytical Framework for Cyber-Physical Networks; Morgan Kaufman: Los Altos, CA, USA, 2012. [Google Scholar]
    37. Ma, C.Y.T.; Yau, D.K.Y.; Rao, N.S.V. Scalable solutions of Markov games for smart-grid infrastructure protection.IEEE Trans. Smart Grid2013,4, 47–55. [Google Scholar] [CrossRef]
    38. Rao, N.S.V.; Ma, C.Y.T.; Yau, D.K.Y. On robustness of a class of cyber-physical network infrastructures. InWorkshop on Design, Modeling and Evaluation of Cyber Physical Systems; IEEE: New York, NY, USA, 2011. [Google Scholar]
    39. Ma, C.Y.T.; Yau, D.K.Y.; Rao, N.S.V. Markov game analysis for attack-defense of power networks under possible misinformation.IEEE Trans. Power Syst.2013,28, 1676–1886. [Google Scholar] [CrossRef]
    40. Alpcan, T.; Basar, T.Network Security: A Decision and Game Theoretic Approach; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
    41. Rao, N.S.V.; Poole, S.W.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models.Risk Anal.2016,36, 694–710. [Google Scholar] [CrossRef] [PubMed]
    42. He, F.; Zhuang, J.; Rao, N.S.V.; Ma, C.Y.T.; Yau, D.K.Y. Game-Theoretic resilience analysis of cyber-physical systems. In Proceedings of the IEEE Conference on Cyber Physical Systems, Networks and Applications, Philadelphia, PA, USA, 8–11 April 2013. [Google Scholar]
    43. Rao, N.S.V.; Imam, N.; Ma, C.Y.T.; Hausken, K.; He, F.; Zhuang, J. On defense strategies for system of systems using aggregated correlations. In Proceedings of the 11th Annual IEEE International Systems Conference, Montreal, QC, Canada, 24–27 April 2017. [Google Scholar]
    44. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Zhuang, J. Defense strategies for infrastructures with multiple systems of components. In Proceedings of the International Conference on Information Fusion, Heidelberg, Germany, 5–8 July 2016. [Google Scholar]
    45. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Yau, D.K.Y.; Zhuang, J. Game-Theoretic strategies for asymmetric networked systems. In Proceedings of the International Conference on Information Fusion, Xi’an, China, 10–13 July 2017. [Google Scholar]
    46. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Yau, D.K.Y.; Zhuang, J. Defense strategies for asymmetric networked systems under composite utilities. In Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Daegu, Korea, 16–18 November 2017. [Google Scholar]
    47. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Zhuang, J. Game-Theoretic strategies for systems of components using product-form utilities. In Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Baden, Germany, 19–21 September 2016. [Google Scholar]
    48. Rao, N.S.V.; Ma, C.Y.T.; He, F. On defense strategies for recursive system of systems using aggregated correlations. In Proceedings of the International Conference on Information Fusion, Cambridge, UK, 10–13 July 2018. [Google Scholar]
    Games 09 00052 g001 550
    Figure 1. Cloud computing infrastructure.
    Figure 1. Cloud computing infrastructure.
    Games 09 00052 g001
    Games 09 00052 g002 550
    Figure 2. Metro system.
    Figure 2. Metro system.
    Games 09 00052 g002
    Games 09 00052 g003 550
    Figure 3. Smart power grid infrastructure. SCADA: supervisory control and data acquisition.
    Figure 3. Smart power grid infrastructure. SCADA: supervisory control and data acquisition.
    Games 09 00052 g003
    Table
    Table 1. Notation.
    Table 1. Notation.
    SymbolExplanation
    xC,xPnumber of cyber and physical components reinforced, respectively
    yC,yPnumber of cyber and physical components attacked, respectively
    PCPxC,xP,yC,yPsurvival probability of the infrastructure
    PC,PPmarginal survival probabilities of cyber and physical sub-infrastructures, respectively
    f(PC,PP)failure correlation function (i.e., the failure probability of cyber sub-infrastructure given the other’s failure)
    ΛC(xC,xP,yC,yP),ΛP(xC,xP,yC,yP)multiplier functions of cyber and physical sub-infrastructures
    UDxC,xP,yC,yP,UAxC,xP,yC,yPprovider’s and attacker’s composite utility function, respectively
    FD,G(xC,xP,yC,yP),FD,L(xC,xP,yC,yP)provider’s reward and cost multiplier functions, respectively
    FA,G(xC,xP,yC,yP),FA,L(xC,xP,yC,yP)attacker’s reward and cost multiplier functions, respectively
    gDxC,xP,yC,yPreward for rendering the infrastructure operational in the provider’s sum-form utility function
    LD(xC,xP),LA(yC,yP)provider’s and attacker’s total cost of cyber and physical attacks, respectively
    GD(xC,xP,yC,yP),GA(xC,xP,yC,yP)provider’s and attacker’s reward, respectively
    aC,bCcoefficients in the linear correlation function
    pC|R,pC|Nconditional survival probability of a cyber component with and without reinforcement, respectively
    pP|R,pP|Nconditional survival probability of a physical component with and without reinforcement, respectively
    pC|Ri,pP|Rjsurvival probabilities of reinforced cyber component of typei and reinforced physical component of typej, respectively
    pC|Ni,pP|Njsurvival probabilities of cyber component of typei and physical component of typej without reinforcement, respectively
    NCi,NPjnumber of typei cyber components and typej physical components, respectively
    ξcoefficient of inherent robustness of cyber component
    αcoefficient representing a partial effect of cyber–physical correlation
    NLnumber of trains running on a line, or the number of sensors connected using a communication node
    NSnumber of servers connected through a fiber
    fPnormalization factor in the survival probability of metro system and smart power grid infrastructure
    fCnormalization factor in the survival probability of cloud computing infrastructure
    LG,LD(xC,xP,yC,yP)composite gain–cost term
    FG,LD,B(xC,xP,yC,yP)provider’s gain–cost gradient with respect toxB, whereB=C,P, for cyber and physical components, respectively
    ΘC·,ΘP·cyber and physical scaled gain–cost gradients, respectively
    xCT,xCSnumber of reinforced control centers and signals in metro system, respectively
    xCS,xCRnumber of reinforced servers and routers in cloud computing infrastructure, respectively
    xCS,xCMnumber of reinforced communication nodes and smart meters in smart power grid infrastructure, respectively
    PAS,PAMprobabilities of an attack on a communication node and smart meter in smart power grid infrastructure, respectively
    Table
    Table 2. Gain and cost terms for sum-form and product-form utilities of the provider.
    Table 2. Gain and cost terms for sum-form and product-form utilities of the provider.
    FD,GGDFD,L
    sum-form:UD+1PCPgD1
    product-form:UD×001PCP
    Table
    Table 3. Gain and cost terms and their multipliers for sum-form and product-form utilities of the provider.
    Table 3. Gain and cost terms and their multipliers for sum-form and product-form utilities of the provider.
    FD,GGDFD,LLDFD,GPCPGDxBFD,LPCP
    sum-form:UD+1PCPgD1LD−100
    product-form:UD×001PCPLD00−1

    © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

    Share and Cite

    MDPI and ACS Style

    Rao, N.S.V.; Ma, C.Y.T.; He, F.; Yau, D.K.Y.; Zhuang, J. Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures.Games2018,9, 52. https://doi.org/10.3390/g9030052

    AMA Style

    Rao NSV, Ma CYT, He F, Yau DKY, Zhuang J. Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures.Games. 2018; 9(3):52. https://doi.org/10.3390/g9030052

    Chicago/Turabian Style

    Rao, Nageswara S. V., Chris Y. T. Ma, Fei He, David K. Y. Yau, and Jun Zhuang. 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures"Games 9, no. 3: 52. https://doi.org/10.3390/g9030052

    APA Style

    Rao, N. S. V., Ma, C. Y. T., He, F., Yau, D. K. Y., & Zhuang, J. (2018). Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures.Games,9(3), 52. https://doi.org/10.3390/g9030052

    Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further detailshere.

    Article Metrics

    No
    No

    Article Access Statistics

    For more information on the journal statistics, clickhere.
    Multiple requests from the same IP address are counted as one view.
    Games, EISSN 2073-4336, Published by MDPI
    RSSContent Alert

    Further Information

    Article Processing Charges Pay an Invoice Open Access Policy Contact MDPI Jobs at MDPI

    Guidelines

    For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers

    MDPI Initiatives

    Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series

    Follow MDPI

    LinkedIn Facebook X
    MDPI

    Subscribe to receive issue release notifications and newsletters from MDPI journals

    © 1996-2025 MDPI (Basel, Switzerland) unless otherwise stated
    Terms and Conditions Privacy Policy
    We use cookies on our website to ensure you get the best experience.
    Read more about our cookieshere.
    Accept
    Back to TopTop
    [8]ページ先頭

    ©2009-2025 Movatter.jp