Table of Content

Open Access iconOpen Access

ARTICLE

Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

Wen Tian1, Xiaopeng Ji1,*, Weiwei Liu1, Guangjie Liu1, Rong Lin1,2, Jiangtao Zhai3, Yuewei Dai3

School of Automation, Nanjing University of Science and Technology, Nanjing, 210094, China.
Department of Engineering, Durham University, South Road, Durham DH1 3LE, UK.
School of Electrics and Information Engineering, Jiangsu University of Science and Technology, Zhenjiang, 212003, China.

* Corresponding Author: Xiaopeng Ji. Email: email.

Computers, Materials & Continua 2019, 60(1), 193-211. https://doi.org/10.32604/cmc.2019.05290

Abstract

Cyber-physical system (CPS) is an advanced system that integrats physical processes, computation and communication resources. The security of cyber-physical systems has become an active research area in recent years. In this paper, we focus on defensive strategies against network attacks in CPS. We introduce both low- and highinteraction honeypots into CPS as a security management tool deliberately designed to be probed, attacked and compromised. In addition, an analysis resource constraint is introduced for the purpose of optimizing defensive strategies against network attacks in CPS. We study the offensive and defensive interactions of CPS and model the offensive and defensive process as an incomplete information game with the assumption that the defender's analysis resource is unknown to the attacker. We prove the existence of several Bayesian-Nash equilibria in the low- and high-interaction honeypot game without analysis cost constraints and obtain the attacker's equilibrium strategy firstly. Then, we take the impact of analysis cost on the capture effect of honeypots into consideration and further optimize the defensive strategy by allocating analysis resource between low- and high-interaction honeypot with resource constraint. Finally, the proposed method is evaluated through numerical simulation and prove to be effective in obtaining the optimal defensive strategy.

Keywords


Cite This Article

W. Tian, X. Ji, W. Liu, G. Liu, R. Lin et al., "Defense strategies against network attacks in cyber-physical systems with analysis cost constraint based on honeypot game model," Computers, Materials & Continua, vol. 60, no.1, pp. 193–211, 2019.

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2462

    View

  • 1155

    Download

  • 0

    Like

Share Link