Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief

Download
2020-12-14
Sasahara, Hampei
Sarıtaş, Serkan
Sandberg, Henrik
This study investigates the relationship between resilience of control systems to attacks and the information available to malicious attackers. Specifically, it is shown that control systems are guaranteed to be secure in an asymptotic manner by rendering reactions against potentially harmful actions covert. The behaviors of the attacker and the defender are analyzed through a repeated signaling game with an undisclosed belief under covert reactions. In the typical setting of signaling games, reactions conducted by the defender are supposed to be public information and the measurability enables the attacker to accurately trace transitions of the defender's belief on existence of a malicious attacker. In contrast, the belief in the game considered in this paper is undisclosed and hence common equilibrium concepts can no longer be employed for the analysis. To surmount this difficulty, a novel framework for decision of reasonable strategies of the players in the game is introduced. Based on the presented framework, it is revealed that any reasonable strategy chosen by a rational malicious attacker converges to the benign behavior as long as the reactions performed by the defender are unobservable to the attacker. The result provides an explicit relationship between resilience and information, which indicates the importance of covertness of reactions for designing secure control systems.
59th IEEE Conference on Decision and Control, CDC 2020

Suggestions

A systematic study of probabilistic aggregation strategies in swarm robotic systems
Soysal, Onur; Şahin, Erol; Department of Computer Engineering (2005)
In this study, a systematic analysis of probabilistic aggregation strategies in swarm robotic systems is presented. A generic aggregation behavior is proposed as a combination of four basic behaviors: obstacle avoidance, approach, repel, and wait. The latter three basic behaviors are combined using a three-state finite state machine with two probabilistic transitions among them. Two different metrics were used to compare performance of strategies. Through systematic experiments, how the aggregation performa...
Continuous improvement on maturity and capability of Security Operation Centres
Acartürk, Cengiz; Erdur, Efe (2020-12-01)
This study addresses maturity and capability assessment of Security Operation Centres (SOC). It aims to contribute to continuous improvement for SOCs by proposing a complementary methodology that provides SOCs a self-assessment capability. The method basically involves an assessment of the gaps between the current and the desired states of the organization and facilitates determining critical aspects that have priority. The proposed methodology is based on the define, measure, analyze, improve, and control ...
Challenges of countering cyber terrorism in the hybrid war contexts
Tanrısever, Oktay Fırat (null; 2019-10-15)
This conference paper seeks to explore the characteristics of cyber terrorism and challenges of countering cyber terrorism in the hybrid war contexts. This conference paper also intends to highlight the difficulties of coping with the terrorist uses of the cyber space and social media when the perpetrators of cyber terrorist acts remain anonymous and the parties of hybrid warfare adhere to the principle of deniability constantly The conference paper puts forward the argument that the concept of cyber terror...
Investigation of personal qualities contributing to psyhological resilience among earthquake survivors : a model testing study
Karaırmak, Özlem; Owen, Dean; Department of Educational Sciences (2007)
This study is designed to investigate the relationships among affective and cognitive personal qualities leading to psychological resilience among natural disaster survivors. The main assumption of this study is that positive personal qualities might be associated with better psychological adjustment. The study aimed at testing a hypothesized theoretical model accounting for resilience with regard to personal qualities. The sample for this study was composed of individuals who were exposed to earthquakes th...
Human presence detection in emergency situations using deep learning based audio-visual systems
Geneci, İzlen; Günel Kılıç, Banu; Bozşahin, Hüseyin Cem; Department of Cognitive Sciences (2022-8-24)
The significance of emergency event detection in surveillance systems has drawn the attention of researchers in recent years. Existing methods mostly depend on visual data to identify any abnormal events since only visual sensors are frequently put in public settings. On the other hand, in an emergency, sound information may be exploited. When eyesight is occluded, audio waves can penetrate to some extent. Applications for visual analysis may be helpful when there is noise in the audio and the scene is cong...
Citation Formats
H. Sasahara, S. Sarıtaş, and H. Sandberg, “Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief,” Virtual, Jeju Island, Güney Kore, 2020, vol. 2020-December, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/94469.