Next Article in Journal
Choices in the 11–20 Game: The Role of Risk Aversion
Next Article in Special Issue
Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria
Previous Article in Journal
Voluntary Leadership and Asymmetric Endowments in the Investment Game
Previous Article in Special Issue
Risk Assessment Uncertainties in Cybersecurity Investments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures

1
Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA
2
Hang Seng Management College, Hong Kong, China
3
The Department of Mechanical and Industrial Engineering, Texas A&M University, Kingsville, TX 78363, USA
4
Department of Computer Science, Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372, Singapore
5
Department of Industrial and Systems Engineering, State University of New York at Buffalo, Buffalo, NY 14260, USA
*
Author to whom correspondence should be addressed.
Games 2018, 9(3), 52; https://doi.org/10.3390/g9030052
Submission received: 1 June 2018 / Revised: 12 July 2018 / Accepted: 20 July 2018 / Published: 23 July 2018
(This article belongs to the Special Issue Game Models for Cyber-Physical Infrastructures)

Abstract

:
In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to one component may affect others and possibly the entire infrastructure. Such correlations must be explicitly taken into account in ensuring the survival of the infrastructure. For large discrete infrastructures characterized by the number of cyber and physical components, we characterize the cyber–physical interactions at two levels: (i) the cyber–physical failure correlation function specifies the conditional survival probability of the cyber sub-infrastructure given that of the physical sub-infrastructure (both specified by their marginal probabilities), and (ii) individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions expressed in terms of their multiplier functions. We formulate an abstract problem of ensuring the survival probability of a cyber–physical infrastructure with discrete components as a game between the provider and attacker, whose utility functions are composed of infrastructure survival probability terms and cost terms, both expressed in terms of the number of components attacked and reinforced. We derive Nash equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure survival probability on cost terms, correlation functions, multiplier functions, and sub-infrastructure survival probabilities. We apply these analytical results to characterize the defense postures of simplified models of metro systems, cloud computing infrastructures, and smart power grids.

1. Introduction

The operation of critical infrastructures such as metro systems, smart power grids, high-performance computing complexes, and cloud computing infrastructures requires the continued functioning of cyber components such as signals, servers, supervisory control and data acquisition (SCADA) systems, routers, and switches, and also physical components such as tracks, power lines, fiber lines, cooling systems, and power systems. Components of both types must be operational as individual units, and must also be available (i.e., accessible to other infrastructure components). The individual components are subject to direct attacks in that cyber attacks will disable individual cyber components and physical attacks will disable individual physical components, when the components have not been reinforced. Furthermore, critical correlations or inter-dependencies exist between cyber and physical components, which may be exploited to launch strategic component attacks that propagate the disruptions to several others. To counter such attacks, infrastructure providers have to explicitly account for the underlying cyber–physical correlations and adopt strategies that ensure the continued operation of both cyber and physical sub-infrastructures.
In this paper, we consider a discrete component model of infrastructures with a large number of cyber and physical components, such as a metro system with hundreds of signals and sensors, a cloud computing infrastructure with thousands of servers, or a power grid with hundreds to thousands of sensors. The notations for various quantities are provided in Table 1. The attacker launches y C cyber or y P physical component attacks but not both, and the provider reinforces x C cyber and x P physical components. The cyber–physical interactions may render the otherwise operational components unavailable, whether they are reinforced or not. For example, a physical attack on a fiber connection to a server site of a cloud computing infrastructure shown in Figure 1 may disconnect all servers (thousands in some cases) from the network, even if they are all fortified against cyber attacks.
In addition to component-level characterizations, the cyber and physical sub-infrastructures can be separately identified in several cases. Indeed, they may be operated by different domain experts. For example, in a power grid, SCADA systems are maintained by operations staff, and the power routes are maintained by power engineering staff. We consider the cyber and physical sub-infrastructures consisting entirely of cyber and physical components, respectively. Disruptions to either could disrupt the entire infrastructure. Let P C P denote the survival probability of the infrastructure, and P C and P P denote the marginal survival probabilities of cyber and physical sub-infrastructures, respectively. The cyber–physical failure correlation function f ( P C , P P ) is the failure probability of cyber sub-infrastructure given the other’s failure, and is estimated using the structural properties of the infrastructure. Furthermore, we consider that P C and P P satisfy first-order differential conditions based on the multiplier functions [1] of cyber and physical sub-infrastructures, denoted by Λ C and Λ P , respectively, which are derived based on their component-level considerations. Together, these two characterizations [2,3] generalize the linearity and statistical independence conditions used in previous works [4,5] for this class of infrastructures with discrete cyber and physical components. The multiplier functions depend on x C , x P , y C , and y P , and also on additional infrastructure parameters (e.g., the number of power lines controlled by a SCADA system), and they provide an insightful abstraction. They appear in the estimates of survival probabilities of sub-infrastructures at Nash equilibrium (NE) and provide insights into the defense posture of the infrastructure.
We formulate a game between the provider and attacker with the following considerations:
(a)
knowledge about the infrastructure is available to the attacker which is sufficient to launch component attacks;
(b)
costs of attacks and reinforcements of components, denoted by L A ( y C , y P ) and L D ( x C , x P ) , respectively, are not available to the other player;
(c)
components chosen by the provider to reinforce, and by the attacker to attack, are not revealed; and
(d)
incidents and results of attacks on components are known to the provider and attacker.
The information in items (a) and (d) is available to both the provider and attacker, and that in item (b) is private. The provider and attacker minimize their respective utility functions, which are based on both types of information.
The composite utility function [1] to be minimized by the provider is the sum of two terms, representing the reward for keeping the infrastructure operational and the corresponding cost, respectively. It is given by
U D x C , x P , y C , y P = F D , G ( x C , x P , y C , y P ) G D ( x C , x P , y C , y P ) + F D , L ( x C , x P , y C , y P ) L D ( x C , x P ) ,
where F D , G and F D , L are the reward and cost multiplier functions, respectively, of the provider, G D represents the reward of keeping the infrastructure operational, and L D is the total cost of reinforcing cyber and physical components. The composite utility function to be minimized by the attacker is given by
U A x C , x P , y C , y P = F A , G ( x C , x P , y C , y P ) G A ( x C , x P , y C , y P ) + F A , L ( x C , x P , y C , y P ) L A ( y C , y P ) ,
where F A , G and F A , L are the reward and cost multiplier functions, respectively, G A is the reward for rendering the infrastructure non-operational, and L A is the total cost of cyber or physical attacks. These utility functions can be specialized to capture different provider and attacker considerations as shown in Table 2, in particular by expressing them in terms of the survival probability of the infrastructure P C P ( x C , x P , y C , y P ) . The sum-form utility [2] for the cyber–physical infrastructure provider is given by
U D + x C , x P , y C , y P = 1 P C P ( x C , x P , y C , y P ) g D + L D ( x C , x P ) ,
where P C P ( x C , x P , y C , y P ) g D is the expected reward in return for the reinforcement cost L D ( x C , x P ) of cyber and physical components. In certain infrastructures, players focus on the cost term only, and the reward of operating the infrastructure is not explicit. In such cases, the product-form utility [3] of the provider is given by
U D × x C , x P , y C , y P = 1 P C P ( x C , x P , y C , y P ) L D ( x C , x P ) ,
which represents the expected cost under infrastructure failure and thus represents the “wasted” effort.
The NE of this game represents the state of the infrastructure under the reinforcement and attack actions of the provider and attacker that attempt to minimize their respective utility functions based on their individual information (from which neither has a motivation to unilaterally deviate [6]). The choices of provider and attacker, given by ( x C , x P ) and ( y C , y P ) , respectively, can be obtained using various available methods [6,7], which typically involves exploiting the scenario-specific details. Indeed, because of the large-scale and complexity feature of cyber–physical infrastructures, most game models obtain Nash equilibrium using numerical methods. Our objective in this paper is to show that critical insights about the infrastructure survival can be gained by deriving estimates of survival probabilities in terms of various correlations and multiplier functions, without requiring explicit solutions for ( x C , x P ) and ( y C , y P ) . To this end, we derive NE conditions that highlight the dependence of P C P on the cost terms, correlation function, multiplier functions, and cyber and physical sub-infrastructure survival probabilities, as well as their partial derivatives. Indeed, the effects of infrastructure parameters will be reflected in estimates of P C P via the multiplier functions, while the correlation effects are “separated” from them. In particular, the impacts of the two players’ strategies are captured using the composite gain–cost terms and gain–cost gradients that depend on gain and cost terms and their derivatives with respect to x C and x P ( y C and y P ), respectively, which are specialized versions of those proposed for systems of systems [1]. The NE conditions reveal a direct dependence of P C P on the parameters of cyber and physical components and sub-infrastructures, as well as a close coupling between them through the correlation function. We also estimate the sensitivity functions of P C P using the partial derivatives of parameters L A ( · ) , L D ( · ) , P C , P P , and f ( P C , P P ) that indicate their relative importance in the defense posture of the infrastructure.
The contributions of this paper are as follows. We unify the analysis of previously separate sum-form [2] and product-form [3] formulations, and provide a deeper treatment of NE, including second-order conditions which are not considered in prior work. Although a special case of a system of systems [1], our formulation provides a more focussed treatment of cyber and physical sub-infrastructures. Our results provide insights into the defense postures of (simplified models) three infrastructures, including metro systems and smart power grids (new here), and cloud computing infrastructures from [8]. We first consider cases where both cyber and physical components are uniform (Section 3.2), namely, signals and trains of metro systems, servers and fiber connections for cloud infrastructures, and SCADA system and power lines for smart power grids. Then, we consider different types of cyber components (Section 5), namely signals and the centralized traffic controls for a metro system, servers and routers for the cloud infrastructure, and SCADA system components and smart meters for the smart power grid. We explicitly derive NE conditions and sensitivity functions for these scenarios.
The organization of this paper is as follows. We compare our formulation with other related work in Section 2. In Section 3, we present a discrete component model for cyber–physical infrastructures, and discuss the failure correlation function and the differential conditions on sub-infrastructure survival probabilities. We present the game theoretic formulation in Section 4, and derive NE conditions and sensitivity estimates. We also describe two special cases, OR systems in Section 4.2 and statistically independent sub-infrastructures in Section 4.3, wherein the cyber–physical correlation effects are somewhat simplified. We discuss NE conditions for applications of metro systems, cloud computing infrastructures, and smart power grids in Section 5. We conclude in Section 6.

2. Related Work

Critical infrastructures are vital to national security [9], and there are numerous published reports, books, and studies on identifying [10] and securing [11,12,13,14] critical infrastructures. A detailed scientific analysis of critical infrastructures is provided in [15]. The author draws insights that critical infrastructures are complex systems, and their architecture is the most crucial factor in deciding their reliability and resilience. Securing cyber–physical networks has been studied extensively from various perspectives [16,17,18,19,20]. A risk assessment approach is used in [21] to identify and address the vulnerabilities of a cyber–physical system, without explicitly using the interactions between the attacker and the provider. Consequently, the quantification of risk and correlations is somewhat limited. Although cyber–physical networks form an integral part of many critical infrastructures such as energy, information technology, and transportation systems, these works primarily cater to applications on power systems and smart power grids. To our best knowledge, there has not been any study that rigorously models the correlations between cyber and physical components in a general system. Our objective is to develop such a general formulation and illustrate its generality by using models of various applications, such as metro systems, cloud computing infrastructures, and smart power grids.
Game-theoretic methods have been extensively applied to capture the interactions between providers and attackers of critical infrastructures [22] to develop strategies to ensure their continued operation in the presence of evolving threats. Such interactions are being increasingly analyzed ever since the 9/11 attacks [23], after which there has been an increased emphasis on protecting critical infrastructures. Most of these studies use sequential models with the provider as the first mover and the attacker as the second. This is useful in enabling analysts to draft preemptive recommendations [24]. Game theory has been used widely in the field of cyber–physical network security [25,26,27]. An overview of the game-theoretic models in network security is provided in [28]. However, these works do not consider the physical components that are critical to the functioning of cyber networks.
Several infrastructures to support power distribution, transportation, and agriculture have been analyzed using game-theoretic approaches. They typically employ complex dynamic models of the underlying physical systems [11]—in particular, using partial differential equations. Both game-theoretic formulations and their solutions are quite extensive for such infrastructures, including: multiple-period games [29] that address multiple time-scales of system dynamics; incomplete information games [30,31,32] that account for partial knowledge about the system dynamics and attack models; and multiple-target games [33,34] that account for possibly competing objectives. A comprehensive review of the defense and attack models in various game-theoretic formulations has been presented in [35].
Game-theoretic methods have been developed specifically to address the system reliability and robustness for several applications [22], which are particularly applicable to critical infrastructures. Recently, there have been increasing levels of integration of cyber components, including computing and networking devices, into several critical infrastructures. This contributes to faster information transmission and processing, but also lead to unprecedented security vulnerabilities due to the underlying cyber–physical correlations [36]. While many existing formulations utilize detailed dynamic infrastructure models, the cyber–physical correlations have only recently been explicitly addressed, and in a limited way [36]. Because of the large scale and complexity of cyber–physical systems, most game models obtain Nash equilibrium using numerical methods. The current paper analytically presents players’ best responses and provides insights for defense strategy at NE.
Due to the wide spectrum of the game-theoretic methods used for critical infrastructures, we now briefly consider the ones that are directly related to our discrete cyber–physical component models. These are much simpler than others used in infrastructures such as power distribution, transportation, and agriculture [11]. For example, partial differential equations that model traffic dynamics. In terms of overall goals, they belong to formulations that integrate system reliability and robustness parameters [22], which are applied for example to smart power grids [37], cloud computing infrastructures [38], and power systems [39]. Within this class, Stackelberg games are an important subclass, wherein the provider chooses actions based on instantaneous information. They lead to more reactive and sensitive responses to dynamic disruptions compared to long-term strategies used in Markov game models [37,40].
Stackelberg formulations have been applied to discrete models of cyber–physical infrastructures in various forms [36], and an important subset is formulated using the number of cyber and physical components that are attacked or reinforced. These formulations capture infrastructures with a large number of components, and are coarser than formulations that consider the attack and defense of individual cyber and physical components [41]. The correlation function was proposed in [2] to capture the dependencies between the survival probabilities of cyber and physical sub-infrastructures; this is a generalization of simple linear forms studied earlier in [4,5]. First-order differential conditions on the sub-infrastructure survival probabilities are proposed in [2] as a generalization of the statistical independence and contest survival functions [42], and the role of multiplier functions on these conditions has been further expanded in [1].
We now place our formulation and results within the broader context above. The composite utility functions described in the introduction generalize the sum-form [2] and product-form [3] utility functions used for infrastructures with discrete components. The composite utility functions have been applied to more general systems of systems (SOS) in [1,43], and here we customize them to cyber–physical sub-infrastructures. The resultant NE conditions unify the previous results by using composite gain–cost terms (Theorem 1), and also provide second-order NE derivative conditions (Theorem 2), which together enable us to apply them to more detailed and newer (metro system) infrastructure models. SOS have been studied under a similar formulation [43,44], and also under additional conditions due to an asymmetric role played by the inter-connection network [1,45,46]. The current paper explicitly targets the cyber and physical sub-infrastructures, provides in-depth results based on cyber–physical correlations, and also addresses the second-order NE conditions that have not been addressed in earlier works on cyber–physical infrastructures [2,3]. To make the presentation self-contained, we provide or re-state definitions of various terms needed for our formulation (Section 3) from the references.

3. Discrete System Models

A cyber–physical infrastructure (CPI) consists of cyber and physical sub-infrastructures with N C cyber components and N P physical components. Both components must be operational and available as parts of the infrastructure, but they can be functionally disabled or operationally disconnected from the infrastructure through attacks. In particular, cyber attacks may render physical components unavailable even if they are functional. For example, cyber attacks on a power grid’s SCADA system might disable power flows on the lines it controls. Physical component attacks may also render cyber components unavailable, as in the case of fiber cuts in a cloud infrastructure described in the previous section. We capture these cyber–physical interactions using the survival probabilities of cyber and physical sub-infrastructures using: (i) the cyber–physical failure correlation function f ( P C , P P ) that captures the correlations at the sub-infrastructure level (Section 3.1), and (ii) the differential conditions on P C and P P using the multiplier functions that capture the component-level correlations (Section 3.2).

3.1. Cyber–Physical Structural Interactions

The failure probabilities of cyber and physical sub-infrastructures are P C ¯ = 1 P C and P P ¯ = 1 P P , respectively. The probability that a CPI is operational is given by
P C P = 1 P C ¯ + P P ¯ P C ¯ P ¯ = P C + P P 1 + P C ¯ P ¯ .
The joint failure probability P C ¯ P ¯ is expressed in terms of the conditional failure probability as P C ¯ P ¯ = P C ¯ | P ¯ P P ¯ , which leads to the following definition.
Condition 1.
Cyber–Physical Correlation Function:The survival probability a CPI is given by
P C P = P C + P P 1 + f P C , P P ( 1 P P ) ,
where f P C , P P = P C ¯ | P ¯ is the cyber–physical failure correlation function of cyber and physical sub-infrastructures.
The failure correlation function captures the dependence of cyber sub-infrastructure failure on that of physical sub-infrastructure. For example, in a cloud computing infrastructure with N S servers at each site, disabling the fiber would disconnect all servers at the site, which can be reflected by choosing f P C , P P = N S ( 1 P P ) . This shows that the physical failure rate is amplified by N S in rendering the servers unavailable. The following are two illustrative forms of f P C , P P .
(a)
OR Systems: A special class called the OR systems are defined in [4,5] to illustrate cases where cyber and physical parts can be independently analyzed. For these systems, the probability of failure of cyber or physical sub-infrastructure is P C ¯ P ¯ = P C ¯ + P P ¯ or equivalently P C ¯ P ¯ = 0 . That is, the failure of the physical sub-infrastructure is guaranteed not to cause the failure of the cyber sub-infrastructure. Thus, we have P C P = P C + P P 1 and f P C , P P = 0 . These systems are of mostly academic interest.
(b)
Linear Forms: The linear form
f ( P C , P P ) = a C ( 1 P C ) + b C
expresses the correlation in terms of multiplicative and additive coefficients, denoted by a C and b C , respectively, and is used in [5] (in [4] only a C is used). Here, a C represents a proportional change in P C ¯ due to the physical sub-infrastructure failure, whereas b C represents an independent factor. There are two special cases under this form:
(i)
Statistical Independence: We have f P C , P P = 1 P C . That is, a C = 1 and b C = 0 , so that P C ¯ P ¯ = P C ¯ P P ¯ or equivalently P C P = P C P P , and
(ii)
Failure Certainty: When physical failures lead to cyber failures with certainty, we have f P C , P P = 1 . That is, a C = 0 and b C = 1 , such that P C P = P C (i.e., infrastructure survival probability solely depends on cyber sub-infrastructure).
More generally, if a C > 1 and b C 0 , or a C 1 and b C > 0 , the cyber failures are positively correlated to physical failures. That is, they occur with higher probability following physical failures (i.e., P C ¯ | P ¯ > P C ¯ ). If a C < 1 and b C 0 , or a C 1 and b C < 0 , i.e., f P C , P P < 1 P C , cyber failures are negatively correlated to physical failures (i.e., P C ¯ | P ¯ < P C ¯ ).
We now consider that the effects of reinforcements and attacks can be separated at the sub-infrastructure level such that P P z C = 0 and P C z P = 0 , where z = x , y . Intuitively, these conditions indicate that only direct impacts are dominant at the level of sub-infrastructures. For example, cyber reinforcements contribute to improving the cyber sub-infrastructure but not directly to physical sub-infrastructure. We capture the sub-infrastructure correlations for the provider using the following conditions.
Condition 2.
De-Coupled Reinforcement Effects:The partial derivatives of P C P in Condition 1 satisfy the following conditions
P C P x C = 1 + ( 1 P P ) f P C P C x C a n d P C P x P = 1 f ( P C , P P ) + ( 1 P P ) f P P P P x P
for the provider.

3.2. Sub-Infrastructure Survival Probabilities

We consider that the sub-infrastructure survival probabilities satisfy the following differential conditions.
Condition 3.
Cyber and Physical Multiplier Functions:The derivatives of survival probabilities of cyber and physical sub-infrastructures can be expressed as
P C x C = Λ C ( x C , x P , y C , y P ) P C a n d P P x P = Λ P ( x C , x P , y C , y P ) P P
in terms of the cyber and physical multiplier functions Λ C and Λ P , respectively.
These multiplier functions capture the underlying details of cyber and physical sub-infrastructures (specialized systems of [1]) after factoring out the corresponding survival probabilities. They depend on the the parameters of cyber and physical sub-infrastructures, in addition to game variables x C , x P , y C , and y P . For example, for the cloud computing infrastructure described in Example 1, Λ C depends on the number of servers N S at each site, and for the metro system in Example 2, Λ P depends on the number of lines N L controlled by a signal. These somewhat abstract functions enable us to encapsulate some of the sub-infrastructure details so that the multiplier functions appear explicitly in various estimates at NE (including the survival probability estimates in Theorem 1), and provide valuable insights into the underlying dependencies. These multiplier functions can take simple forms in the following two important cases, which have been studied extensively in the literature.
(a)
Statistically Independent Components: Let p C | R and p C | N denote the conditional survival probability of a cyber component with and without reinforcement, respectively. Under the assumption of statistical independence of component failures, the probabilities that the cyber and physical parts survive the attacks are given by [4]
P C = p C | R x C p C | N N C x C and P P = p P | R x P p P | N N P x P ,
respectively. In this case, we have P C x C = P C ln p C | R p C | N .
(b)
Contest Survival Functions: The contest survival functions are used to characterize P C and P P in [42] such that P C = ξ + x C ξ + x C + y C , for which we have
P C x C = P C y C ( ξ + x C + y C ) ( ξ + x C ) .
We now describe three simplified illustrative cyber–physical infrastructure models for which we derive estimates for the multiplier functions Λ B ( · ) , where B = C , P under uniform selection of components to reinforce and attack. We will expand further on these examples in Section 5 by taking additional details into account.
Example 1.
Cloud Computing Infrastructure: A cloud computing infrastructure (Figure 1) consisting of multiple sites can be simply modeled with N S servers at each site. Cyber attacks may bring down the individual servers, and the communication fiber routes to the sites may be physically cut. Reinforcements to these components may be in the form of replicated stand-by servers, and redundant physically-separated fiber routes. Since a physical fiber cut disconnects all servers at the site from the network, a first-order model is f P C , P P = N S ( 1 P P ) , which indicates the multiplicative effect of physical attacks. There are [ y P x P ] + non-reinforced fiber connections that are vulnerable to physical attacks, where [ · ] + represent the non-negative part. That is, [ z ] + = z for z > 0 , and [ z ] + = 0 otherwise. Under a uniform distribution of attacks and reinforcements, the probability that a cyber-reinforced server survives y P fiber attacks is estimated by
p C | R = f C 1 + N S [ y P x P ] + ,
where 0 f C 1 is an appropriately chosen normalization factor. This estimate decreases with higher values of [ y P x P ] + . If a server is not reinforced, it will be brought down by a direct cyber attack, or disconnected through a fiber attack. Thus, the survival probability of such a non-reinforced server is
p C | N = f C 1 + y C + N S [ y P x P ] + ,
which reflects a decrease due to y C compared to a reinforced server. For example, in an infrastructure with 10,000 servers at each site with a non-reinforced fiber, a single fiber attack has an effect similar to 10,000 individual server cyber attacks. Using these formulae, we have
Λ C ( x P , y C , y P ) = ln 1 + y C 1 + N S [ y P x P ] +
for the cyber sub-infrastructure, which interestingly does not depend on cyber x C but depends on physical x P .
Example 2.
Metro System: A metro system (Figure 2) consists of many components, including trains, tracks, perway, telecommunication systems, and electrical systems. The system operates normally when trains are running smoothly, being controlled by the signals located along the lines. A simplified model of a metro system may be based on abstracting its signaling system. The model consists of N S signals along the tracks and the actuators on N T trains, which are centrally controlled. The communication between the signals and the control center may be interrupted through cyber means, while the actuators on trains may be damaged physically. Reinforcements to these components may be in the form of redundant communication routes for the signals and better physical protection of the actuators on trains. Since a cyber attack on a signal along the tracks partially disrupts the smooth running of all the trains running the line through that signal, a first-order model is given by P P ¯ | C ¯ = α N L ( 1 P C ) , which captures the multiplicative effect of cyber attacks, where 0 < α < 1 is properly chosen to represent a partial effect and N L indicates the number of trains running on a line.
Then, by using the Bayes formula P C ¯ | P ¯ = P P ¯ | C ¯ P C ¯ / P P ¯ , we have f ( P C , P P ) = α N L ( 1 P C ) 2 ( 1 P P ) . Typically, N L is on the order of tens, whereas N S in the previous example could be in the thousands.
We now consider that the attacker and provider choose components to attack and reinforce, respectively, according to uniform distribution. Then, there are [ y C x C ] + non-reinforced signals. The probability that a reinforced actuator survives the cyber attacks is estimated by
p P | R = f P 1 + α N L [ y C x C ] + ,
where 0 f P 1 is a normalization factor. This estimate reflects that cyber attacks are more likely to disrupt the actuator functioning for higher values of [ y C x C ] + , and the physical attacks have no effect on a reinforced actuator. If the actuator is not reinforced, it will be brought down by a direct physical attack, or indirectly through a cyber attack. Thus, we estimate its survival probability as
p P | N = f P 1 + y P + α N L [ y C x C ] + ,
which is inversely proportional to the number of physical attacks y P . Using these formulae, we have
Λ P ( x C , y C , y P ) = ln 1 + y P 1 + α N L [ y C x C ] +
for the physical sub-infrastructure, which interestingly does not depend on physical x P but captures the dependence on cyber x C . Note that the roles of cyber and physical components are switched in this example compared to the cloud computing infrastructure.
Example 3.
Smart Power Grid Infrastructure:A power grid infrastructure (Figure 3) is controlled by a SCADA system using information collected by a network of sensors that monitor transmission and distribution lines. The sensors are placed at strategic locations for effective flow control, and they have good connectivity to the SCADA system via communication nodes. We assume that each communication node relays information from sensors of N L lines to the SCADA system, and it may be disabled by a direct cyber attack, which will disrupt the information flow from all N L lines. Typically, N L is of the order of tens. When the monitoring information of a line is lost, the SCADA system may assume the line to be down for safety reasons, and hence disrupting a node will also disrupt the power flow on all N L lines. By using reasoning analogous to the previous two examples, we have P P ¯ | C ¯ = N L ( 1 P C ) . Then, by using the Bayes formula P C ¯ | P ¯ = P P ¯ | C ¯ P C ¯ / P P ¯ , we have f ( P C , P P ) = N L ( 1 P C ) 2 ( 1 P P ) . We then estimate the survival probability of a reinforced line, which can be disconnected by [ y C x C ] + cyber attacks, as
p P | R = f P 1 + N L [ y C x C ] + ,
where 0 f P 1 is appropriately chosen under uniform attack and reinforcement distributions. Meanwhile, a power line can be directly disrupted by physical means if it is not reinforced, and it is more likely to be unavailable if there are more physical attacks (i.e., higher y P ). Thus, an attack on a communication node will have an amplified effect on power lines compared to direct physical attacks, such that
p P | N = f P 1 + y P + N L [ y C x C ] + ,
which provides an estimate of the probability of survival of a non-reinforced power line. Using the above formulae, we have
Λ P ( x C , y C , y P ) = ln 1 + y P 1 + N L [ y C x C ] + ,
which does not depend on x P as in the case of the metro system.

4. Game-Theoretic Formulation

The provider’s objective is to make the infrastructure resilient by reinforcing x C and x P cyber and physical components, respectively, to minimize the utility function. For uniform component reinforcement costs, we have L D x C , x P = c C D x C + c P D x P , where c C D and c P D are reinforcement costs of cyber and physical components, respectively. The attacker’s objective is to disrupt the infrastructure by attacking y C or y P cyber and physical components, respectively (but not both), in order to minimize the utility function. For uniform component attack costs, we use L A y C , y P = c C A y C + c P A y P , where c C A and c P A are the attack costs of cyber and physical components, respectively, and only one of y C and y P is non-zero.

4.1. Nash Equilibrium Conditions

The Nash equilibrium conditions are derived by equating the corresponding derivatives of the utility functions (as shown in Section 1) to zero, which yields
U D x B = G D F D , G P C P + L D F D , L P C P P C P x B + F D , G G D x B + F D , L L D x B = 0 ,
where B = C , P for the provider. We define L G , L D = G D F D , G P C P + L D F D , L P C P as the composite gain–cost term, and F G , L D , B = F D , G G D x B + F D , L L D x B as the gain–cost gradient with respect to x B , B = C , P . For the attacker, we similarly obtain, for B = C , P ,
U A y B = G A F A , G P C P + L A F A , L P C P P C P y B + F A , G G A y B + F A , L L A y B = 0 .

4.2. OR Systems

The OR subsystems are a special case where the probability of simultaneous failures of cyber and physical sub-infrastructures is negligible. [4]. Here, the infrastructure will fail if either of the cyber or physical sub-infrastructures fail, such that P C ¯ P ¯ = P C ¯ + P P ¯ , or equivalently P C P = P C + P P 1 . In these (theoretical) systems, the dependence of P C P on system parameters at NE is easier to derive and interpret, since it is determined entirely by Condition 3 without involving f ( P C , P P ) . We have a much simpler form of Condition 2 given by P C P x C = P C x C and P C P x P = P P x P . At NE, we have
P C x C = F D , G G D x C + F D , L L D x C G D F D , G P C P + L D F D , L P C P = F G , L D , C x C , x P , y C , y P L G , L D x C , x P , y C , y P = Θ C x C , x P , y C , y P ,
P P x P = F D , G G D x P + F D , L L D x P G D F D , G P C P + L D F D , L P C P = F G , L D , P x C , x P , y C , y P L G , L D x C , x P , y C , y P = Θ P x C , x P , y C , y P ,
wherein Θ C · and Θ P · are called the cyber and physical scaled gain–cost gradients, respectively. Using Condition 3, we obtain the following estimates for the survival probabilities of cyber and physical sub-infrastructures:
P ˜ C ; D x C , x P , y C , y P = Θ C x C , x P , y C , y P Λ C ( x C , x P , y C , y P ) and P ˜ P ; D x C , x P , y C , y P = Θ P x C , x P , y C , y P Λ P ( x C , x P , y C , y P ) .
These estimates for cyber and physical sub-infrastructures depend mainly on the corresponding scaled gain–cost gradients, and thus represent a “separation” of the cyber and physical parts at this level. In this sense, OR systems constitute an important analytical case wherein the cyber–physical correlations between the sub-infrastructures may be ignored. In addition, these estimates provide the sensitivity information of the survival probabilities of cyber and physical sub-infrastructures, and they depend only on the derivatives of the corresponding probabilities. Although they do not involve the failure correlation function f ( P C , P P ) , the cyber–physical interactions are still captured by Λ C ( · ) and Λ P ( · ) at the component level. Both survival probability estimates P ˜ C ; D and P ˜ P ; D are proportional to the corresponding weighted cost and reward functions, and are inversely proportional to their weighted derivatives. This seemingly counter-intuitive trend applies only to the set of Nash equilibria, and not to the overall system behavior.

4.3. Statistical Independence of Cyber and Physical Sub-Infrastructures

We consider that the cyber sub-infrastructure failures are statistically independent such that P C P = P C P P and f P C , P P = 1 P C . At NE, we have
P P P C x C = Θ C x C , x P , y C , y P and P C P P x P = Θ P x C , x P , y C , y P .
We now substitute expressions for P C x C and P P x P based on Condition 3, and obtain the system of equations:
P ¯ C ; D P ¯ P ; D = Θ C x C , x P , y C , y P Λ C ( x C , x P , y C , y P ) and P ¯ C ; D P ¯ P ; D = Θ P x C , x P , y C , y P Λ P ( x C , x P , y C , y P ) .
Qualitatively, at NE, the survival probability estimates of cyber and physical sub-infrastructures P ¯ C ; D and P ¯ P ; D have an inverse relationship, but their product is determined by Λ C ( · ) and Λ P ( · ) in a manner similar to the individual probabilities P ˜ C ; D and P ˜ P ; D of OR systems. However, unlike OR systems, statistical independence is not sufficient to decouple the estimates P ¯ C ; D and P ¯ P ; D so that they depend solely on Λ C ( · ) and Λ P ( · ) , respectively.

4.4. NE Sensitivity Functions

We now derive estimates for P C and P P at NE using the scaled gain–cost gradients and failure correlation function to obtain qualitative information about their sensitivities to different parameters from the provider’s perspective.
Theorem 1.
Under Conditions 1, 2, and 3, an estimate of the survival probability of physical sub-infrastructure at the Nash equilibrium for f P P 0 is
P ^ P ; D x C , x P , y C , y P = 1 f P C , P P + f P P 2 f P P ± 1 f P C , P P + f P P 2 f P P 2 Θ P ( x C , x P , y C , y P ) Λ P ( x C , x P , y C , y P ) f P P ,
and, for f P P = 0 , is
P ^ P ; D x C , x P , y C , y P = Θ P ( x C , x P , y C , y P ) Λ P ( x C , x P , y C , y P ) 1 f P C , P P .
An estimate of the survival probability of cyber sub-infrastructure is
P ^ C ; D x C , x P , y C , y P = Θ C ( x C , x P , y C , y P ) Λ C ( x C , x P , y C , y P ) 1 + ( 1 P ^ P ; D ) f P C .
Proof: 
At NE, we have P C P x C = Θ C ( x C , x P , y C , y P ) and P C P x P = Θ P ( x C , x P , y C , y P ) . By using the formulae in Condition 2, we have
1 + ( 1 P P ) f P C P C x C = Θ C ( x C , x P , y C , y P ) ,
1 f ( P C , P P ) + ( 1 P P ) f P P P P x P = Θ P ( x C , x P , y C , y P ) .
We now substitute expressions for P C x C and P P x P based on Condition 3, and obtain the system of equations:
1 + ( 1 P P ) f P C P C = Θ C ( x C , x P , y C , y P ) Λ C ( x C , x P , y C , y P ) ,
1 f ( P C , P P ) + ( 1 P P ) f P P P P = Θ P ( x C , x P , y C , y P ) Λ P ( x C , x P , y C , y P ) .
The expression for P ^ P ; D is obtained by solving for P P using the above quadratic equation, and the expression for P ^ C ; D follows from the equation above it. □
Compared to OR Systems, there are significant cyber–physical interactions at the sub-infrastructure level in both P ^ P ; D x C , x P , y C , y P and P ^ C ; D x C , x P , y C , y P . In particular, P ^ P ; D x C , x P , y C , y P depends on both f ( · ) and its partial derivatives with respect to P P , and the partial derivatives of G D and L D with respect to x P and Λ P , as expected. Its dependence on P C is implicit through the failure correlation function f ( P C , P P ) . The qualitative behavior of P ^ C ; D x C , x P , y C , y P is quite similar with respect to L D , but its dependence on P P is also through f. They are both affected by Λ C ( · ) and Λ P ( · ) , and each of them in turn depends on the number of both cyber and physical component attacks and reinforcements. Thus, the estimates P ^ P ; D and P ^ C ; D reflect the correlations between the sub-infrastructures explicitly through f, as well as those captured by the survival probabilities of individual sub-infrastructures.
Theorem 1 utilizes P C ¯ | P ¯ = f ( P C , P P ) , which captures the failure effects of physical sub-infrastructure on the cyber sub-infrastructure. Alternatively, we can utilize P P ¯ | C ¯ = g ( P C , P P ) , which captures the failure effects of cyber sub-infrastructure on the physical sub-infrastructure. In this case, we obtain a quadratic expression in P C . Then, we can estimate P ^ C ; D x C , x P , y C , y P in terms of g ( P C , P P ) by solving the quadratic equation as in Theorem 1. Additionally, results expressed in terms of f ( P C , P P ) and g ( P C , P P ) can be converted between each other using the following expression:
f ( P C , P P ) = P C ¯ P ¯ ( 1 P P ) = P P ¯ | C ¯ ( 1 P C ) ( 1 P P ) = g ( P C , P P ) ( 1 P C ) ( 1 P P ) .
The qualitative effects of f ( · ) and g ( · ) on the sensitivity function estimates is quite similar, and their choice is determined by their functional forms and the accuracy with which they can be estimated.
The estimates in Theorem 1 are based on the first-order derivatives of utility functions, and their minimization leads to second-order derivative conditions, which in turn provides an upper bound on P P as follows:
Theorem 2.
Under Conditions 1, 2, and 3, an upper bound on the survival probability of physical sub-infrastructure at the Nash equilibrium for f P P 0 is
P P 1 + 1 f ( P C , P P ) f P P + 1 f x P L G , L D 2 P C P x P 2 + F G , L D , P x P L G , L D x P .
Proof: 
At NE, the first derivative of the utility function is given by
U D x B = G D F D , G P C P + L D F D , L P C P P C P x B + F D , G G D x B + F D , L L D x B = L G , L D P C P x B + F G , L D , B ,
where B = C , P . The second derivative condition is given by
2 U D x B 2 = L G , L D 2 P C P x B 2 + L G , L D x B P C P x B + F G , L D , B x B > 0 ,
which in turn provides a bound on P C P x B as follows,
P C P x B > L G , L D 2 P C P x B 2 + F G , L D , B x B L G , L D x B .
The upper bound on P P then follows from Condition 2 by using x B = x P and f P P P P x P = f x P . □
This theorem indicates that the ratio of the correlation function and its derivatives f P P and f x P could limit the achievable P P . The cost term L G , L D and F G , L D , P x P can counter this effect somewhat, but L G , L D x P can add to this effect.

4.5. Sum-Form and Product-Form Utility Functions

The utility functions can be specialized to reflect different aspects of the infrastructure, in particular explicitly expressing the terms using P C P ( x C , x P , y C , y P ) . Corresponding to the sum-form in Section 1, the utility of the attacker is given by
U A + x C , x P , y C , y P = P C P ( x C , x P , y C , y P ) g A + L A ( y C , y P ) ,
where [ 1 P C P ( x C , x P , y C , y P ) ] g A is the expected reward for the cost L A ( y C , y P ) of cyber or physical attacks. Similarly, the product-form utility of the attacker is given by
U A × x C , x P , y C , y P = P C P ( x C , x P , y C , y P ) L A ( y C , y P ) ,
which represents the expected cost when the infrastructure survives the attacks and thus represents “wasted” effort. The individual terms of the utility functions for sum- and product-forms are simplified as shown in Table 3 for the provider.
Special cases of Theorem 1 for sum- and product-forms are presented in [2,4], and the second-order condition in Theorem 2 provides us with additional conditions on achievable P P . In particular, for the sum-form utility of the provider, the second derivative condition is
2 U D x B 2 = 2 P C P x B 2 g D + 2 L D x B 2 > 0 ,
which provides an upper bound on 2 P C P x B 2 . And for the product-form utility of the provider, the second derivative condition is
2 U D x B 2 = 2 P C P x B L D x B L D 2 P C P x B 2 + ( 1 P C P ) 2 L D x B 2 > 0 ,
which provides an upper bound on P C P .

4.6. Survival Probabilities of Sub-Infrastructures

It is instructive to compare the individual survival probabilities of cyber and physical sub-infrastructures P C and P P , respectively, since the minimum of the two determines the survival probability of the infrastructure. Using the equations from the proof of Theorem 1, we have
1 + ( 1 P P ) f P C P C = Θ C x C , x P , y C , y P Λ C x C , x P , y C , y P 1 f ( P C , P P ) + ( 1 P P ) f P P P P = Θ P x C , x P , y C , y P Λ P x C , x P , y C , y P .
In this section, for simplicity we denote Λ C x C , x P , y C , y P , Λ P x C , x P , y C , y P , Θ C x C , x P , y C , y P , and Θ P x C , x P , y C , y P by Λ C , Λ P , Θ C , and Θ P , respectively. By dividing the above two equations by f P C and f P P , respectively, and eliminating the term ( 1 P P ) by subtraction, we obtain the following condition:
Θ P P P Λ P f P P f P C Θ C P C Λ C = 1 f P C , P P f P P f P C .
Then, by using P C P P = f P P f P C , we obtain the following relationship between P P and P C :
P P = P C Λ C Θ P Λ P P C Λ C 1 f ( P C , P P ) + P C P P P C P P Θ C .
By comparing the right hand side to P C , the condition P P P C is equivalent to
P C Λ C Λ P Θ P + P C P P Θ C Λ C 1 f ( P C , P P ) + P C P P ,
where ≐ is either ≤ or ≥ based on the sign of the denominator above. If ≐ is ≤, then the above condition is not satisfied if the right hand side is negative, which in turn corresponds to the signs of the two terms Λ C Λ P Θ P + P C P P Θ C and 1 f ( P C , P P ) + P C P P being the opposite. On the other hand, if ≐ is ≥, then this condition is not true if the right hand side is greater than 1. These two boundary conditions determine that one of the two conditions P P P C and P P P C is true. In the other cases, this relationship is not that simply determined, and can take a more complicated form.
For the special case f P C , P P = a C ( 1 P C ) + b C , we have
P P = Θ P Λ P 1 a C + a C P C b C .
Then, the condition P P P C leads to a quadratic equation with the following solution:
P C = ( 1 a C b C ) 2 a ± 1 2 a ( 1 a C b C ) 2 4 a C Θ P Λ P .
The boundary conditions in this case can be derived as in the general case. However, a different line of analysis done in this case in [5] provides a much simpler characterization of the relationship between P C and P P . It yields the following simpler condition:
P C = 1 b C 1 a C P P + d C D d P D ( 1 a C ) ,
where d C D = L D x C g D ln p P | R p P | N and d P D = L D x P g D ln p C | R p C | N . Then, the relationship between P C and P P is described by 12 different regions determined solely by a C , b C , d C D , and d P D such that in each region exactly one of the two conditions P P P C and P P P C is true.

5. Application Examples

In this section, we expand the three examples from Section 3.2 by taking more component details into account. First, we consider different types of cyber and physical components such that x C i , i A C is the number of cyber components of type i, and x P j , j A P is the number of physical components of type j. Thus, in terms of the original indices, we have x C = i A C x C i and x P = j A P x P j . We define sub-infrastructures consisting of only cyber components of type i and physical components of type j, with their survival probabilities denoted by P C i and P P j , respectively. Now we generalize Condition 3 as follows.
Condition 4.
The survival probabilities of cyber and physical sub-infrastructures are given by
P C i x C i = h C i P C i , x C , x P , y C , y P = Λ C i ( x C , x P , y C , y P ) P C i
for x C i , i A C , corresponding to cyber components of type i, and
P P j x P j = h P j P P j , x C , x P , y C , y P = Λ P j ( x C , x P , y C , y P ) P P j
for x P j , j A P , corresponding to physical components of type j.
The component failures are considered statistically independent for different types in [5] such that
P C = i A C P C i = i A C p C | R i x C i p C | N i N C i x C i ,
P P = j A P P P j = j A P p P | R j x P j p P | N j N P j x P j ,
where p C | R i and p P | R j denote the probabilities of reinforced cyber component of type i and reinforced physical component of type j, respectively; p C | N i and p P | N j denote the probabilities of cyber component of type i and physical component of type j without reinforcement, respectively; and N C i and N P j denote the number of type i cyber components and type j physical components, respectively. These conditions in turn lead to the special case of Condition 4: for i A C , j A P ,
P C x C i = P C ln p C | R i p C | N i and P P x P j = P P ln p P | R j p P | N j .
We consider that these conditions are satisfied in both of the following examples.

5.1. Cloud Computing Infrastructure

The simple cloud computing infrastructure model of Example 1 in Section 3.2 is expanded to include a gateway router at each site, which connects to all servers at the site. A cyber attack on a gateway router will also have essentially the same effect as a physical fiber attack—namely, disconnecting all servers at the site. A fiber attack requires physical proximity, whereas a router cyber attack may be remotely launched, thereby representing different types of costs. Cyber components now belong to two classes, namely, servers and routers, such that x C = x C S + x C R where x C S and x C R denote the number of reinforced servers and routers, respectively. Similarly, we have y C = y C S + y C R , where y C S and y C R denote the number of servers and routers attacked, respectively. Then, for the two cyber sub-infrastructures, we have the failure correlation functions f S P C S , P P = N S ( 1 P P ) and f R P C R , P P = ( 1 P P ) , wherein the physical failures are amplified by N S for the servers but are the same for routers. Thus, the composite failure correlation function f ( P C , P P ) is given as follows:
f P C , P P = B { S , R } P C ¯ | P ¯ B = f S P C S , P P + f R P C R , P P = ( N S + 1 ) ( 1 P P ) .
Then, the survival probabilities of cyber-reinforced components are computed separately for the servers and routers, which are denoted by p C | R S and p C | R R , respectively. The probability that a cyber-reinforced server survives fiber or router attacks is given by
p C | R S = f C S 1 + N S [ y P x P ] + + N S [ y C R x C R ] + ,
which now depends on both physical attacks on fiber and cyber attack on routers. An estimate of the probability that a cyber-reinforced router survives a physical fiber attack is given by p C | R R = f C R 1 + [ y P x P ] + , since a cyber attack on a reinforced router has no impact and a fiber attack will disconnect only one router. If the router is not cyber-reinforced, then we have p C | N R = f C R 1 + [ y P x P ] + + y C R , which additionally depends on y C R . By using these estimates for the router, we have
Λ C R x P , y C R , y P = ln 1 + y C R 1 + [ y P x P ] + ,
which increases in the number of cyber router attacks but decreases in the number of attacks on non-reinforced routers. If the cyber component, server or router, is not reinforced, it will be brought down by a direct cyber attack or indirectly by fiber attack, but the latter will have a greater impact. However, cyber attacks on servers and routers will have different impacts on the availability of the infrastructure. That is, a server attack will only bring it down, but a router attack will make all N S servers unavailable. In some current infrastructures, N S could be on the order of thousands. Thus, for a server that is not cyber-reinforced, we use the estimate
p C | N S = f C S 1 + N S [ y P x P ] + + N S [ y C R x C R ] + + y C S ,
which reflects the additional lowering of survival probability inversely proportional to the level of cyber attack y C S , and to y C R but amplified by a factor N S . Thus, for servers, we have
Λ C S x C R , x P , y C S , y C R , y P = ln 1 + y C S 1 + N S [ y P x P ] + + N S [ y C R x C R ] + ,
which increases in the number of server attacks but decreases in the attacks on non-reinforced routers and fibers.
The survival probabilities of physical fiber components depend on y P such that p P | R = f P and p P | N = f P 1 + y P . By combining the two formulae for fiber, we have Λ P ( y P ) = ln 1 + y P , which increases in the number of physical attacks. Similar to the case of the metro system, in addition to Λ P ( · ) and Λ C B ( · ) , where B = S , R , the survival probabilities of cyber and physical sub-infrastructures are determined by the correlation function f ( P C , P P ) , as described in Section 4.6.

5.2. Metro System

We refine the metro system model of Example 2 in Section 3.2 to include multiple traffic control centers, each connecting to all signals of a single line. A cyber attack on a control center will disconnect all signals of its line and disrupt all trains running on that line. Now, we separate the cyber components into two classes, namely, control centers and signals, and x C = x C T + x C S such that x C T and x C S denote the number of reinforced control centers and signals, respectively. Similarly, y C = y C T + y C S , such that y C T and y C S denote the number of control centers and signals attacked, respectively. Since we focus on the smooth running of the trains, it is more instructive to carry out the analysis in terms of the failure correlation function g ( P C , P P ) = P P ¯ | C ¯ . Then, for the sub-infrastructures, we have the failure correlation functions g T P C T , P P = N L 1 P C T and g S P C S , P P = α N L 1 P C S , wherein the physical failures are amplified by N L for control centers and by α N L for the signals. We now estimate the composite failure correlation function g ( P C , P P ) as follows:
g P C , P P = g T P C T , P P P A T P A T + P A S + g S P C S , P P P A S P A T + P A S = N L 1 P C T P A T P A T + P A S + α N L 1 P C S P A S P A T + P A S ,
where P A T and P A S are the probabilities of a cyber attack on a control center and a signal of the metro system, respectively, and P A T P A T + P A S and P A S P A T + P A S are conditional failure probabilities of the control center and signal, respectively, given that the cyber sub-infrastructure of the metro system failed.
The probability that a physically-reinforced actuator on a train survives cyber attacks on a control center or signal is given by
p P | R = f P 1 + N L y C T x C T + + α N L [ y C S x C S ] + ,
which now depends on both cyber attacks on control centers and signals. If the actuator is not physically-reinforced, then we have
p P | N = f P 1 + y P + N L [ y C T x C T ] + + α N L [ y C S x C S ] + ,
which additionally decreases with respect to y P . By using these estimates for an actuator, we have
Λ P x C T , x C S , y C T , y C S , y P = ln 1 + y P 1 + N L [ y C T x C T ] + + α N L [ y C S x C S ] + ,
which increases in the number of physical attacks on actuators, but decreases in the number of cyber attacks on control centers and signals. Since the term Λ P appears in the denominator, P ^ P ; D in Theorem 1 decreases with the number of physical attacks y P , and increases with [ y C T x C T ] + and [ y C S x C S ] + , which are the number of cyber attacks on the control centers and signals exceeding the reinforcements, respectively. The latter condition may appear counter-intuitive at the surface, but note that it only characterizes the states that satisfy NE conditions. An analogous dependence of P ^ P ; D on the parameters x C , x P , y C , and y P (shown in Theorem 1) is less direct, since Λ P appears inside the square root but is qualitatively somewhat similar since they appear in the denominator.
The cyber component survival probabilities are computed separately for the reinforced control centers and signals, denoted by p C | R T and p C | R S , respectively. The survival probabilities of cyber components are given by p C | R B = f C B and p C | N B = f C B 1 + y C B , where B = T , S . Then we have Λ C B y C B = ln 1 + y C B , where B = T , S , which increases in the total number of cyber attacks on the specific type of component. Since the term Λ C B appears in the denominator, P ^ C ; D in Theorem 1 decreases with the number of cyber attacks y C B , where B = T , S .
Note that the net effect of the number of attacks and reinforcements on the survival probabilities of cyber and physical sub-infrastructures is also determined by the correlation function as described in Section 4.6, in addition to Λ P and Λ C B , where B = T , S .

5.3. Smart Power Grid Infrastructure

The power grid model described in Example 3 in Section 3.2 is expanded to include smart meters on the lines that provide the demand information to generation and distribution control systems. The smart meters can be attacked by cyber means to manipulate the demand information (e.g., to make it zero). We group the cyber components into two classes, namely, communication nodes and smart meters, such that x C = x C S + x C M , where x C S and x C M are the number of reinforced communication nodes and smart meters, respectively. Similarly, we have y C = y C S + y C M , where y C S and y C M are the number of communication nodes and smart meters attacked, respectively. Since the electricity transmission in the grid takes place on the physical sub-infrastructure, it is more instructive to carry out the analysis in terms of the failure correlation function g ( P C , P P ) = P P ¯ | C ¯ . As in the metro system example, for the sub-infrastructures, we have the failure correlation functions g S P C S , P P = N L 1 P C S and g M P C M , P P = 1 P C M , wherein the attacks on communication nodes are amplified by the number of lines N L controlled by each of them, but are the same for smart meter attacks. Then, we utilize the estimate
g ( P C , P P ) = N L 1 P C S P A S P A S + P A M + 1 P C M P A M P A S + P A M ,
where P A S and P A M are the probabilities of an attack on a communication node and smart meter, respectively, and P A S P A S + P A M and P A M P A S + P A M are conditional failure probabilities of a communication node and smart meter, respectively, given that the cyber sub-infrastructure failed.
Then, the survival probabilities of cyber components are estimated separately for the communication nodes and smart meters. The survival probabilities of the power supply lines with and without reinforcement are denoted by p P | R and p P | N , respectively. A communication node or a smart meter may be disabled by cyber means, which will disrupt the power flow on the lines so that
p P | R = f P 1 + N L [ y C S x C S ] + + [ y C M x C M ] + ,
for physically-reinforced power lines. Note that cyber attacks on communication nodes are amplified by N L times compared to attacks on smart meters. Each power line can be directly disrupted by physical means such that it can be brought down if not reinforced, and thus we have
p P | N = f P 1 + y P + N L [ y C S x C S ] + + [ y C M x C M ] + ,
which reflects the amplified effect of cyber attacks on communication nodes compared to physical line attacks. Combining the two formulae, we have
Λ P x C S , x C M , y C S , y C M , y P = ln 1 + y P 1 + N L [ y C S x C S ] + + [ y C M x C M ] + ,
which increases in the number of attacks on non-reinforced power lines and decreases in the number of attacks on non-reinforced communication nodes and non-reinforced smart meters, but the former effect is amplified N L times. The survival probabilities of cyber components are given by p C | R B = f C B and p C | N B = f C B 1 + y C B , where B = S , M . Then, we have Λ C B y C B = ln 1 + y C B , where B = S , M , which increases in the total number of cyber attacks. As in the previous examples, the net effect of the number of attacks and reinforcements on the survival probabilities of cyber and physical sub-infrastructures is also determined by the correlation function (in addition to Λ P and Λ C B , where B = S , M ) as described in Section 4.6.

6. Conclusions

We studied a class of infrastructures characterized by the number of discrete components that can be disrupted by either cyber or physical attacks, and are protected by cyber and physical reinforcements. We characterized the cyber–physical interactions in these infrastructures at two levels: (i) the failure correlation function specifies the conditional survival probability of a cyber sub-infrastructure given that of the physical sub-infrastructure as a function of their marginal probabilities, and (ii) the individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions. We derived Nash equilibrium conditions in terms of partial derivatives of cost terms, failure correlation function, multiplier functions, and survival probabilities of sub-infrastructures and their partial derivatives. We then estimated the sensitivity functions that indicate the dependence of infrastructure survival probability on these parameters. We applied this approach to models of metro systems, cloud computing infrastructures, and smart power grids at different levels of abstraction when all have a large number of components. These results generalize previous results using simpler utility functions in [2,3,4,5], and specialize the results on systems of systems in [8,43,44,45,46,47,48]. Together, our results enable us to unify the previous results and consider more detailed models of the correlations between the sub-infrastructures in the metro systems, cloud computing infrastructures, and smart power grids, with sharpened focus on cyber and physical sub-infrastructures.
Several extensions of this formulation could be pursued in future studies, including the cases where the effects of attacks and reinforcements of specific components are explicitly accounted for. In such formulations, x C and x P may be replaced by vectors whose components are Boolean representing the reinforcement of a component or a fraction representing the probability of reinforcement. It would also be of future interest to explicitly model various redundancies incorporated by infrastructures to avoid single-point failures (e.g., abstracted by fiber cuts). Such extensions may also require a more refined characterizations of attacks (e.g., single- or multiple-fiber attacks) and defenses, which may lead to their partial successes. Indeed, the attack and defense models can be extended to include their success probabilities to capture cases wherein the attacks and reinforcements are not always guaranteed to fully fail or succeed. It would be interesting to study sequential game formulations of this problem, and cases where different levels of knowledge are available to the attacker and provider. Other future formulations could include multiple attackers and hybrid infrastructure models. For example, physical sub-infrastructure represented by partial differential equations and cyber sub-infrastructures represented by graphs. Applications of our approach to more detailed models of metro systems, cloud computing infrastructures, smart power grids, and high-performance computing complexes would be of future interest.

Author Contributions

Authors made equal overall contributions to the formulation, analytical solutions and applications parts of this paper. N.S.V.R., J.Z. and D.K.Y.Y. are leads for the formulation; N.S.V.R., C.Y.T.M. and F.H. are leads for analytical solutions; and C.Y.T.M. and N.S.V.R. are leads for the development of applications.

Funding

This work is funded by the Mathematics of Complex, Distributed, Interconnected Systems Program, Office of Advanced Computing Research, U.S. Department of Energy, and by Extreme Scale Systems Center, sponsored by U. S. Department of Defense, and performed at Oak Ridge National Laboratory managed by UT-Battelle, LLC for U.S. Department of Energy under Contract No. DE-AC05-00OR22725.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Yau, D.K.Y.; Zhuang, J. Defense Strategies for Asymmetric Networked Systems with Discrete Components. Sensors 2018, 18, 1421. [Google Scholar] [CrossRef] [PubMed]
  2. Rao, N.S.V.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Cyber-physical correlations for infrastructure resilience: A game-theoretic approach. In Proceedings of the International Conference on Information Fusion, Salamanca, Spain, 7–10 July 2014. [Google Scholar]
  3. Rao, N.S.V.; Ma, C.Y.T.; Shah, U.; Zhuang, J.; He, F.; Yau, D.K.Y. On resilience of cyber-physical infrastructures using discrete product-form games. In Proceedings of the International Conference on Information Fusion, Washington, DC, USA, 6–9 July 2015. [Google Scholar]
  4. Rao, N.S.V.; Poole, S.W.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Cyber and physical information fusion for infrastructure protection: A game-theoretic approach. In Proceedings of the International Conference on Information Fusion, Istanbul, Turkey, 9–12 July 2013. [Google Scholar]
  5. Rao, N.S.V.; Poole, S.W.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Infrastructure resilience using cyber-physical game-theoretic approach. In Proceedings of the International Symposium on Resilient Cyber System, San Francisco, CA, USA, 13–15 August 2013. [Google Scholar]
  6. Fudenberg, D.; Tirole, J. Game Theory; MIT Press: Cambridge, MA, USA, 2003. [Google Scholar]
  7. Rass, S.; König, S.; Schauer, S. On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. In Decision and Game Theory for Security; Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S., Eds.; Springer International Publishing: Cham, The Netherland, 2017; pp. 494–505. [Google Scholar]
  8. Rao, N.S.V.; Ma, C.Y.T.; He, F. Defense strategies for multi-site cloud computing server infrastructures. In Proceedings of the International Conference on Distributed Computing and Networking, Varanasi, India, 4–7 January 2018. [Google Scholar]
  9. DHS. Critical Infrastructure Sectors; DHS: Anacostia, Southeast Washington, DC, USA, 2015. [Google Scholar]
  10. Rinaldi, S.M.; Peerenboom, J.P.; Kelly, T.K. Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. 2001, 21, 11–25. [Google Scholar] [CrossRef]
  11. Brown, G.; Carlyle, M.; Salmerón, J.; Wood, K. Defending Critical Infrastructure. Interfaces 2006, 36, 532–544. [Google Scholar] [CrossRef] [Green Version]
  12. Brown, G.; Carlyle, M.; Salmeron, J.; Wood, K. Analyzing the vulnerability of critical infrastructure to attack and planning defenses. In Tutorials in Operations Research: Emerging Theory, Methods, and Applications; INFORMS: Catonsville, MD, USA, 2005; pp. 102–123. [Google Scholar]
  13. Moteff, J.; Parfomak, P. Critical Infrastructure and Key Assets: Definition and Identification; DTIC Document; DTIC: Los Angeles, CA, USA, 2004. [Google Scholar]
  14. Scaparra, M.P.; Church, R.L. A bilevel mixed-integer program for critical infrastructure protection planning. Comput. Oper. Res. 2008, 35, 1905–1923. [Google Scholar] [CrossRef]
  15. Lewis, T.G. Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation; John Wiley & Sons: New York, NY, USA, 2014. [Google Scholar]
  16. Bu, S.; Yu, F.R. A game-theoretical scheme in the smart grid with demand-side management: Towards a smart cyber-physical power infrastructure. IEEE Trans. Emerg. Top. Comput. 2013, 1, 22–32. [Google Scholar] [CrossRef]
  17. Hahn, A.; Ashok, A.; Sridhar, S.; Govindarasu, M. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 2013, 4, 847–855. [Google Scholar] [CrossRef]
  18. Karnouskos, S. Cyber-physical systems in the smartgrid. In Proceedings of the 2011 9th IEEE International Conference on Industrial Informatics (INDIN), Lisbon, Portugal, 26–29 July 2011; pp. 20–23. [Google Scholar]
  19. Mo, Y.; Kim, T.H.J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–physical security of a smart grid infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar]
  20. Pasqualetti, F.; Dörfler, F.; Bullo, F. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of the 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), Orlando, FL, USA, 12–15 December 2011; pp. 2195–2201. [Google Scholar]
  21. Kure, H.I.; Islam, S.; Razzaque, M.A. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Appl. Sci. 2018, 8, 898. [Google Scholar] [CrossRef]
  22. Bier, V.M.; Azaiez, M.N. (Eds.) Game Theoretic Risk Analysis of Security Threats; Springer: Berlin, Germany, 2009. [Google Scholar]
  23. Sandler, T. Terrorism & game theory. Simul. Gaming 2003, 34, 319–337. [Google Scholar]
  24. Hausken, K. Strategic defense and attack of series systems when agents move sequentially. IIE Trans. 2011, 43, 483–504. [Google Scholar] [CrossRef]
  25. Cardenas, A.A.; Amin, S.; Sastry, S. Secure control: Towards survivable cyber-physical systems. In Proceedings of the The 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 495–500. [Google Scholar]
  26. Chen, P.Y.; Cheng, S.M.; Chen, K.C. Smart attacks in smart grid communication networks. IEEE Commun. Mag. 2012, 50, 24–29. [Google Scholar] [CrossRef]
  27. Shiva, S.; Roy, S.; Dasgupta, D. Game theory for cyber security. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA, 21–23 April 2010; p. 34. [Google Scholar]
  28. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.P. Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 2013, 45, 25. [Google Scholar] [CrossRef]
  29. Jose, V.R.R.; Zhuang, J. Technology Adoption, Accumulation, and Competition in Multi-period Attacker-Defender Games. Mil. Oper. Res. 2013, 18, 33–47. [Google Scholar] [CrossRef]
  30. He, F.; Zhuang, J. Modelling `contracts’ between a terrorist group and a government in a sequential game. J. Oper. Res. Soc. 2012, 63, 790–809. [Google Scholar] [CrossRef]
  31. Jenelius, E.; Westin, J.; Holmgren, J. Critical infrastructure protection under imperfect attacker perception. Int. J. Crit. Infrastruct. Prot. 2010, 3, 16–26. [Google Scholar] [CrossRef]
  32. Nikoofal, M.; Zhuang, J. Robust Allocation of a Defensive Budget Considering an Attackers Private Information. Risk Anal. 2012, 32, 930–943. [Google Scholar] [CrossRef] [PubMed]
  33. Shan, X.; Zhuang, J. Cost of Equity in Homeland Security Resource Allocation In the Face of A Strategic Attacker. Risk Anal. 2013, 33, 1083–1099. [Google Scholar] [CrossRef] [PubMed]
  34. Shan, X.; Zhuang, J. Hybrid Defensive Resource Allocations in the Face of Partially Strategic Attackers in a Sequential Defender-attacker Game. Eur. J. Oper. Res. 2013, 228, 262–272. [Google Scholar] [CrossRef]
  35. Hausken, K.; Levitin, G. Review of Systems Defense and Attack Models. Int. J. Perform. Eng. 2012, 8, 355–366. [Google Scholar]
  36. Das, S.K.; Kant, K.; Zhang, N. An Analytical Framework for Cyber-Physical Networks; Morgan Kaufman: Los Altos, CA, USA, 2012. [Google Scholar]
  37. Ma, C.Y.T.; Yau, D.K.Y.; Rao, N.S.V. Scalable solutions of Markov games for smart-grid infrastructure protection. IEEE Trans. Smart Grid 2013, 4, 47–55. [Google Scholar] [CrossRef]
  38. Rao, N.S.V.; Ma, C.Y.T.; Yau, D.K.Y. On robustness of a class of cyber-physical network infrastructures. In Workshop on Design, Modeling and Evaluation of Cyber Physical Systems; IEEE: New York, NY, USA, 2011. [Google Scholar]
  39. Ma, C.Y.T.; Yau, D.K.Y.; Rao, N.S.V. Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Trans. Power Syst. 2013, 28, 1676–1886. [Google Scholar] [CrossRef]
  40. Alpcan, T.; Basar, T. Network Security: A Decision and Game Theoretic Approach; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  41. Rao, N.S.V.; Poole, S.W.; Ma, C.Y.T.; He, F.; Zhuang, J.; Yau, D.K.Y. Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal. 2016, 36, 694–710. [Google Scholar] [CrossRef] [PubMed]
  42. He, F.; Zhuang, J.; Rao, N.S.V.; Ma, C.Y.T.; Yau, D.K.Y. Game-Theoretic resilience analysis of cyber-physical systems. In Proceedings of the IEEE Conference on Cyber Physical Systems, Networks and Applications, Philadelphia, PA, USA, 8–11 April 2013. [Google Scholar]
  43. Rao, N.S.V.; Imam, N.; Ma, C.Y.T.; Hausken, K.; He, F.; Zhuang, J. On defense strategies for system of systems using aggregated correlations. In Proceedings of the 11th Annual IEEE International Systems Conference, Montreal, QC, Canada, 24–27 April 2017. [Google Scholar]
  44. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Zhuang, J. Defense strategies for infrastructures with multiple systems of components. In Proceedings of the International Conference on Information Fusion, Heidelberg, Germany, 5–8 July 2016. [Google Scholar]
  45. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Yau, D.K.Y.; Zhuang, J. Game-Theoretic strategies for asymmetric networked systems. In Proceedings of the International Conference on Information Fusion, Xi’an, China, 10–13 July 2017. [Google Scholar]
  46. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Yau, D.K.Y.; Zhuang, J. Defense strategies for asymmetric networked systems under composite utilities. In Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Daegu, Korea, 16–18 November 2017. [Google Scholar]
  47. Rao, N.S.V.; Ma, C.Y.T.; Hausken, K.; He, F.; Zhuang, J. Game-Theoretic strategies for systems of components using product-form utilities. In Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Baden, Germany, 19–21 September 2016. [Google Scholar]
  48. Rao, N.S.V.; Ma, C.Y.T.; He, F. On defense strategies for recursive system of systems using aggregated correlations. In Proceedings of the International Conference on Information Fusion, Cambridge, UK, 10–13 July 2018. [Google Scholar]
Figure 1. Cloud computing infrastructure.
Figure 1. Cloud computing infrastructure.
Games 09 00052 g001
Figure 2. Metro system.
Figure 2. Metro system.
Games 09 00052 g002
Figure 3. Smart power grid infrastructure. SCADA: supervisory control and data acquisition.
Figure 3. Smart power grid infrastructure. SCADA: supervisory control and data acquisition.
Games 09 00052 g003
Table 1. Notation.
Table 1. Notation.
SymbolExplanation
x C , x P number of cyber and physical components reinforced, respectively
y C , y P number of cyber and physical components attacked, respectively
P C P x C , x P , y C , y P survival probability of the infrastructure
P C , P P marginal survival probabilities of cyber and physical sub-infrastructures, respectively
f ( P C , P P ) failure correlation function (i.e., the failure probability of cyber sub-infrastructure given the other’s failure)
Λ C ( x C , x P , y C , y P ) , Λ P ( x C , x P , y C , y P ) multiplier functions of cyber and physical sub-infrastructures
U D x C , x P , y C , y P , U A x C , x P , y C , y P provider’s and attacker’s composite utility function, respectively
F D , G ( x C , x P , y C , y P ) , F D , L ( x C , x P , y C , y P ) provider’s reward and cost multiplier functions, respectively
F A , G ( x C , x P , y C , y P ) , F A , L ( x C , x P , y C , y P ) attacker’s reward and cost multiplier functions, respectively
g D x C , x P , y C , y P reward for rendering the infrastructure operational in the provider’s sum-form utility function
L D ( x C , x P ) , L A ( y C , y P ) provider’s and attacker’s total cost of cyber and physical attacks, respectively
G D ( x C , x P , y C , y P ) , G A ( x C , x P , y C , y P ) provider’s and attacker’s reward, respectively
a C , b C coefficients in the linear correlation function
p C | R , p C | N conditional survival probability of a cyber component with and without reinforcement, respectively
p P | R , p P | N conditional survival probability of a physical component with and without reinforcement, respectively
p C | R i , p P | R j survival probabilities of reinforced cyber component of type i and reinforced physical component of type j, respectively
p C | N i , p P | N j survival probabilities of cyber component of type i and physical component of type j without reinforcement, respectively
N C i , N P j number of type i cyber components and type j physical components, respectively
ξ coefficient of inherent robustness of cyber component
α coefficient representing a partial effect of cyber–physical correlation
N L number of trains running on a line, or the number of sensors connected using a communication node
N S number of servers connected through a fiber
f P normalization factor in the survival probability of metro system and smart power grid infrastructure
f C normalization factor in the survival probability of cloud computing infrastructure
L G , L D ( x C , x P , y C , y P ) composite gain–cost term
F G , L D , B ( x C , x P , y C , y P ) provider’s gain–cost gradient with respect to x B , where B = C , P , for cyber and physical components, respectively
Θ C · , Θ P · cyber and physical scaled gain–cost gradients, respectively
x C T , x C S number of reinforced control centers and signals in metro system, respectively
x C S , x C R number of reinforced servers and routers in cloud computing infrastructure, respectively
x C S , x C M number of reinforced communication nodes and smart meters in smart power grid infrastructure, respectively
P A S , P A M probabilities of an attack on a communication node and smart meter in smart power grid infrastructure, respectively
Table 2. Gain and cost terms for sum-form and product-form utilities of the provider.
Table 2. Gain and cost terms for sum-form and product-form utilities of the provider.
F D , G G D F D , L
sum-form: U D + 1 P C P g D 1
product-form: U D × 00 1 P C P
Table 3. Gain and cost terms and their multipliers for sum-form and product-form utilities of the provider.
Table 3. Gain and cost terms and their multipliers for sum-form and product-form utilities of the provider.
F D , G G D F D , L L D F D , G P CP G D x B F D , L P CP
sum-form: U D + 1 P C P g D 1 L D −100
product-form: U D × 00 1 P C P L D 00−1

Share and Cite

MDPI and ACS Style

Rao, N.S.V.; Ma, C.Y.T.; He, F.; Yau, D.K.Y.; Zhuang, J. Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures. Games 2018, 9, 52. https://doi.org/10.3390/g9030052

AMA Style

Rao NSV, Ma CYT, He F, Yau DKY, Zhuang J. Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures. Games. 2018; 9(3):52. https://doi.org/10.3390/g9030052

Chicago/Turabian Style

Rao, Nageswara S. V., Chris Y. T. Ma, Fei He, David K. Y. Yau, and Jun Zhuang. 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures" Games 9, no. 3: 52. https://doi.org/10.3390/g9030052

APA Style

Rao, N. S. V., Ma, C. Y. T., He, F., Yau, D. K. Y., & Zhuang, J. (2018). Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures. Games, 9(3), 52. https://doi.org/10.3390/g9030052

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop