Critical infrastructure protection under imperfect attacker perception
نویسندگان
چکیده
This paper considers the problem of allocating nite resources among the elements of a critical infrastructure system in order to protect it from antagonistic attacks. Previous studies have assumed that the attacker has complete information about the utilities associated with attacks on each element. In reality, it is likely that the attacker's perception of the system is not as precise as the defender's, due to geographical separation from the system, secrecy, surveillance, complex system properties etc. As a result, the attacker's actions may not be those anticipated under the assumption of complete information. We present a modeling framework that incorporates imperfect attacker perception by introducing random observation errors in a previously studied baseline model. We analyze how the perceptive ability a ects attack probabilities and the defender's disutility and optimal resource allocation. We show e.g. that the optimal resource allocation may di er signi cantly from the baseline model, that a less perceptive attacker may cause greater disutility for the defender, and that increasing the investment in an element can increase the expected disutility even in a zero-sum situation.
منابع مشابه
Optimal power grid protection through a defender-attacker-defender model
Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the devel...
متن کاملSecurity games with surveillance cost and optimal timing of attack execution
Stackelberg games have been used in several deployed applications to allocate limited resources for critical infrastructure protection. These resource allocation strategies are randomized to prevent a strategic attacker from using surveillance to learn and exploit patterns in the allocation. Past work has typically assumed that the attacker has perfect knowledge of the defender’s randomized str...
متن کاملColonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure
Securing the physical components of a city’s interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and large number of involved sensors. Using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on ICI is studied in which the attacker first compromises the ICI’s s...
متن کاملSecurity Games with Limited Surveillance
Randomized first-mover strategies of Stackelberg games are used in several deployed applications to allocate limited resources for the protection of critical infrastructure. Stackelberg games model the fact that a strategic attacker can surveil and exploit the defender’s strategy, and randomization guards against the worst effects by making the defender less predictable. In accordance with the ...
متن کاملOn a Generic Security Game Model
To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users, both benign and malicious, and network administrators as games. Building on such works, we present a game model which is generic enough to capture various modes of such interactio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCIP
دوره 3 شماره
صفحات -
تاریخ انتشار 2010