Next Article in Journal
Non-Markovianity of a Central Spin Interacting with a Lipkin–Meshkov–Glick Bath via a Conditional Past–Future Correlation
Previous Article in Journal
Correction: Contreras-Reyes, J.E.; Cortés, D.D. Bounds on Rényi and Shannon Entropies for Finite Mixtures of Multivariate Skew-Normal Distributions: Application to Swordfish (Xiphias gladius Linnaeus). Entropy 2016, 18, 382
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework †

Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our conference paper: Xiao, K., Zhu, C., Xie, J., Zhou, Y., Zhu, X., & Zhang, W. (2018). Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems. Proceedings—IEEE INFOCOM, April 2018, 1790–1798.
Submission received: 29 June 2020 / Revised: 13 July 2020 / Accepted: 27 July 2020 / Published: 15 August 2020

Abstract

:
Stealth malware is a representative tool of advanced persistent threat (APT) attacks, which poses an increased threat to cyber-physical systems (CPS) today. Due to the use of stealthy and evasive techniques, stealth malwares usually render conventional heavy-weight countermeasures inapplicable. Light-weight countermeasures, on the other hand, can help retard the spread of stealth malwares, but the ensuing side effects might violate the primary safety requirement of CPS. Hence, defenders need to find a balance between the gain and loss of deploying light-weight countermeasures, which normally is a challenging task. To address this challenge, we model the persistent anti-malware process as a shortest-path tree interdiction (SPTI) Stackelberg game with both static version (SSPTI) and multi-stage dynamic version (DSPTI), and safety requirements of CPS are introduced as constraints in the defender’s decision model. The attacker aims to stealthily penetrate the CPS at the lowest cost (e.g., time, effort) by selecting optimal network links to spread, while the defender aims to retard the malware epidemic as much as possible. Both games are modeled as bi-level integer programs and proved to be NP-hard. We then develop a Benders decomposition algorithm to achieve the Stackelberg equilibrium of SSPTI, and design a Model Predictive Control strategy to solve DSPTI approximately by sequentially solving an 1 + δ approximation of SSPTI. Extensive experiments have been conducted by comparing proposed algorithms and strategies with existing ones on both static and dynamic performance metrics. The evaluation results demonstrate the efficiency of proposed algorithms and strategies on both simulated and real-case-based CPS networks. Furthermore, the proposed dynamic defense framework shows its advantage of achieving a balance between fail-secure ability and fail-safe ability while retarding the stealth malware propagation in CPS.

1. Introduction

Cyber-physical systems (CPS) are integrations of computation, networking, and physical processes, which have tremendously stimulated the development of contemporary critical infrastructures in different domains, such as energy, health care, communication, transportation, and manufacturing [1,2]. However, these integrations have unintentionally entailed new vulnerabilities, threats and challenges in safety and security [3,4]. The growing count of security-related incidents has drawn the increased focus on securing CPS.
Since advanced persistent threat (APT) attacks are usually well-planned and highly-customized, they have become a major and challenging threat for CPS defenders [5]. Specifically, the attackers carry out a long-term campaign with repeated attempts under the support of a highly organized and well-resourced malicious group who provides stealthy and evasive techniques; hence they are capable to adopt a series of advanced actions stealthily, persistently and detrimentally aiming at specific targets in critical infrastructures [5,6,7]. The computer worm Stuxnet, which was the first discovered malware to intelligently damage a nuclear power station, is the epitome of APT attacks [8], as well as other ensuing reported APT malware specimens, i.e., Duqu, Flame, Gauss [9], etc. Owing to the use of stealthy and evasive techniques (e.g., zero-day exploits, obfuscation techniques), these stealth malwares play a vital role in the attack process.
However, the existing security solutions for CPS usually make some of the following flawed assumptions which hinder themselves [10,11]: (i) the security problem is modeled as an one-shot attack-and-defense scenario, violating the feature of persistent actions in the stealth malware propagation; (ii) attackers only possess the ability of using a limited set of fixable exploits for relatively isolated attacks, which is far from the real practice for the stealth malware propagation where different types of stealthy and evasive techniques are used by attackers; and (iii) defenders’ response is confined to cleaning the detected threats and recovering the compromised nodes, neglecting the fact that unknown threats might be undetected, propagated, injected, and updated persistently by APT attackers to pursue long-term gains. Thus, conventional countermeasures, such as intrusion detection systems, enterprise-wide patching, and anti-virus techniques, usually fail to mitigate the risk and damage posed by stealth malwares.
More specifically, there is always a time-span of unprotected exposure when the defenders only adopt conventional countermeasures. Here, the unprotected exposure, which is accompanied by the attack-and-defense process, refers to the time-span between the detection of a certain intrusion and the complete deployment of a specified heavy-weight countermeasure (e.g., exploits patching, specialized anti-malware program). For defenders, their reaction duration towards newly detected threats directly determines the length of unprotected exposure. On the other hand, this unprotected exposure is crucial for the propagation of stealth malwares, since most valuable actions (e.g., updating, packing, targeting, propagating [12,13]) can be smoothly implemented in these time-spans. Given the fragility of CPS [14], attackers’ exploitation of unprotected exposure can bring them profitable returns and thus pose irreversible damages to the system. Unfortunately, the unprotected exposure is almost inevitable and it is difficult to reduce the time-span to a tolerable scale in complex CPS. The reason lies on the fact that a diversity of tools (e.g., zero-day exploits, public exploits) and techniques (e.g., polymorphism, metamorphism) are utilized in persistent actions by attackers, while defenders have to confront the complexity and bear the time-consuming nature of detecting threats accurately, as well as developing and deploying specified heavy-weight treatment countermeasures properly. As a consequence, traditional security approaches which ignore the unprotected exposure provide readily exploitable opportunities for APT attackers to propagate malwares persistently and then achieve malicious goals.
Light-weight countermeasures, on the other hand, can help retard the spread of malwares during the time-span of unprotected exposure, thereby mitigating overall damages and offering additional time for the development and deployment of heavy-weight treatment countermeasures [15,16]. Unfortunately, light-weight countermeasures are likely to incur safety risk because they are usually cursory and sometimes inaccurate; hence, the ensuing side effects are still inherent shortcomings of these countermeasures, especially for the CPS with both safety and security requirements. Safety and security which share identical goals of protecting systems from failures are two key properties of CPS [17]. Safety is protection against unintentional accidents, while security focuses on protecting systems from deliberate cyber attacks. For instance, containment techniques, such as firewalls, content filters, and routing blacklists [18,19], can be implemented to obstruct the propagation of worms whereas some legitimate communication which is necessary for systems’ normal operation might be blocked, as well. That is, when we try to maintain the security of a system using light-weight countermeasures, the safety requirements may be violated. This side effect is usually bearable in traditional information systems; however, the blockage of a critical legitimate control signal which is a safety requirement may lead to a catastrophic cascading in CPS [20]. However, very little research has studied the optimal allocating and scheduling strategy of light-weight countermeasures taking the safety requirement into consideration.
Since security and safety are interdependent with the requirements of one having effects on the other, the satisfaction of fail-secure and fail-safe ability requires a collaborative approach [20]. Here, fail-secure means that access or data will not fall into the wrong or malicious hands in a security failure, while fail-safe indicates that devices in a system will not endanger human lives or property when they fail. Hence, there is an urgent need for defenders to find an optimal trade-off between the gain and loss of deploying light-weight countermeasures in CPS, thereby achieving a balance between fail-secure and fail-safe ability. To address this problem, we model the persistent attack-and-defense process between the CPS defender and the attacker as a dynamic Stackelberg game. The attacker aims to stealthily penetrate the CPS at the lowest cost (e.g., time, effort) by selecting optimal network links to spread. On the other hand, the defender who has limited capabilities to detect stealth malwares aims to maximize the fail-secure ability, i.e., retarding the malware epidemic as much as possible by optimally allocating light-weight countermeasures until the development and deployment of heavy-weight countermeasures. Meanwhile, safety requirements of CPS are considered in the form of constraints in the defender’s decision model, which reflects the primary importance of fail-safe ability. The main contributions of this paper are:
1)
We propose the static shortest-path tree interdiction (SSPTI) game, model it as a bi-level integer program (BLIP), and prove its NP-hardness. A Benders decomposition algorithm (S-BD) is then developed to achieve its Stackelberg equilibrium.
2)
We extend the SSPTI to a multi-stage dynamic shortest-path tree interdiction (DSPTI) game to support the of real-time decision-making in the persistent attack-and-defense process, and design a model predictive control (MPC) strategy for the defender. An 1 + δ approximation algorithm is proposed for the defender to achieve local optimality, thereby expanding the solvable scale of the problem.
3)
The evaluation results demonstrate that the proposed approximation algorithm can enlarge the solvable scale of problems with an order of magnitude improvement (reporting an increase from less than 100 nodes to more than 3000 nodes) and reduce the resources consumption by 60 % .
4)
The performance of proposed MPC strategy is better than existing strategies on both simulated and real-case-based CPS networks. A lower steady infection rate and a higher ratio of giant component can be achieved by MPC strategy simultaneously, which means it can help retard the spread of malwares and the cascade of devices failure at the same time.
The reminder of this paper is organized as follows. Section 2 provides the related work, and Section 3 introduces the network model of CPS and the Stackelberg game model between the defender and the attacker aiming to penetrate the CPS. In Section 4, SSPTI game is formulated as a BLIP, and an exact algorithm is designed for it. The game is then extended to a dynamic version in Section 5, and an MPC strategy is designed for DSPTI. Section 6 reveals the performance of proposed algorithms and strategies. Section 7 concludes this paper.

2. Related Works

2.1. Security Countermeasures

To address the challenge of CPS security, researchers have paid a great attention on the security issues of malwares propagation, such as propagation modeling, prevention, detection, and mitigation [20,21,22]. However, the unprotected exposure is usually neglected and few of them have considered the trade-off between safety and security when using light-weight countermeasures.
Heavy-weight countermeasures have been studied and applied in practice for decades, such as exploits patching [23], nodes or edges removing [24], and anti-malware program updating [20]. Many of those studies use control-theoretic mitigation strategies. Bloem et al. proposed an optimization problem of malware removal or path deployment and they captured the trade-off between the infection speed and patching costs by using an optimal control framework [25]. In Reference [26], a quarantine control method was developed so as to study the propagation and inhibition of virus in time-varying networks. In order to suppress SIS epidemics in networks, Scaman et al. [24] designed a series of control-theoretic resource allocation strategies. In Reference [23], a general framework was developed to achieve optimal patching policies against malware epidemics, in which the issue of disseminating security patches in a large resource-constrained heterogeneous mobile network was taken into account.
On the other hand, there are some researchers that committed to use light-weight countermeasures to secure network systems. For instance, Yau et al. [15] proposed a tolerance mechanism to minimize the damage caused by distributed denial of service (DDoS) attacks. The core of the mechanism is the max-min fair server centric throttling, and the minimization of DDoS damage leads to the loss of legitimate packet. In the defense of selective forwarding attack, by deploying the randomly selected single checkpoint node in the system, the forwarding misbehavior of the malicious vertex can be detected which was a kind of light-weight countermeasure [27]. In order to mitigate TCP SYN flooding attacks, Mohammadi et al. [28] developed an SDN-based light-weight countermeasure in the controller level, in which ongoing TCP connection requests will be checked and malicious hosts will be blocked. In Reference [29], a DoS attacks defense framework for SDN/OpenFlow networks was developed in a protocol-independent manner, where attack traffic is identified by a packet filter.

2.2. Network Interdiction

Network interdiction problems are usually modeled as games involve two players who commonly have opposite utility functions, which have been wildly applied in traditional security problems, such as nuclear smuggling interdiction [30], terrorist attack defense [31], facilities fortification [32], and illegal products detection [33]. Shortest path network interdiction is a typical interdiction game, which was introduced in 1977 by Fulkerson and Harding [34]. In this problem, the interdictor wishes to maximize the shortest path the evader can achieve using limited resources, and the length of arc was assumed to increase linearly with the amount of resource allocated. In the model of mixed integer version proposed by Wood [35], the decision variable became binary and Benders decomposition method was proposed to solve it. After that, variants of network interdiction games with new features were developed. For instance, Bayrak and Bailey proposed a shortest path network interdiction game with information asymmetry, in which the interdictor and the evader have different levels of network information [36]. In Reference [37], the vulnerability of multiple-commodity system to multiple disruptions was studied, where the formulation of finding defense strategies at minimal cost that maintain a high level of demand satisfaction across all commodities was proposed. Borrero et al. investigated sequential interdiction problem in which the interdictor has incomplete initial information about the network, including its structure and arc costs [38]. In their work, learning method was used so that the interdictor can learn about the network structure and arc costs by observing the evader’s actions. A dynamic shortest path network interdiction without goal information was proposed in Reference [39], where goal recognition methodology was introduced to help the inerdictor make a flexible resource assignment.
Recently, some researchers have payed more attention to the development of security strategies of information systems or computer networks within the framework of game theory. In Reference [40], a resilient control problem in CPS was modeled as a two-level receding-horizon dynamic Stackelberg game between the system operator and human adversaries. Panaousis et al. [41] proposed a decision support approach for cyber-security issues in the framework of game theory, in which they modeled non-cooperative cyber-security control games between the network defender and the attacker who can exploit different vulnerabilities in the computer network. An attack graph interdiction game was developed by Nandi et al. in [42] aiming to protect organizations from cyber attacks. In this game, the defender aims to find an optimal affordable subset of links to deploy countermeasures, while the attacker aims to penetrate the network through the feasible path in attack graph. In order to take attackers reaction into account, Durkota et al. [43] studied the optimal strategy making of placement of honeypots in a network using a game-theoretic approach. Using the Bayesian Stackelberg Game, Zeng, et al. [22] studied the problem of infrastructure network protection under asymmetry information in which multiple attackers types were considered and Bayesian Stackelberg game was introduced to model this problem.

3. Network Model and Stackelberg Game

In this section, we introduce the network model of CPS and the Stackelberg game model under the threat of stealth malware epidemic. Basic assumptions about CPS and settings of the game are presented. Table 1 presents the notations of main parameters and variables in this paper.

3.1. Network Model

A CPS network usually includes three layers, i.e., a corporate network, a control network and a field network [44]. As shown in Figure 1, in field network, field devices are instrumented by means of sensors and actuators. The remote terminal unit (RTU) provides a communication interface for field devices, and its role is played by a programmable logic controller (PLC) in many scenarios. The communication link connects the control and filed networks based on various communication techniques, e.g., wire, fiber optic, radio, microwave [45]. The control network contains several servers with various purposes, such as the master terminal unit (MTU) for data collection and periodically RTU polling. Operators access recorded data, check reported alarms and issue commands via a human-machine interfaces (HMI) in this layer. The corporate network usually includes workstations for engineers and system administrators which are generally connected to the Internet and sometimes to the control network via a router.
Although the CPS network is full-connected physically, strict access control and designed communication patterns let the actual network structure not fully connected under operating conditions. Figure 2 gives an abridged view on the topology of an operating CPS network, where links present the permitted or designed communication patterns between CPS devices rather than all possible connections. It is worth noting that any traffic violating the those communication patterns will be treated as abnormal or illegitimate in CPS [45], which is a significant difference between CPS and traditional information systems.
In general, we present the topology of CPS as an undirected graph G = ( V , E ) , where V is the set of CPS devices and E is the set of links connecting devices in V. Each link e E has a weight w e 0 which presents its significance to CPS safety (vector form w ). The cost for an attacker to propagate a malware through the link e is denoted by c e 0 (vector form c ). The allocation of light-weight countermeasures on a link e is assumed to make a delay of d e > 0 (vector form d ) to the malware propagation on this link, while resulting a loss of w e in CPS safety. These parameters can be determined by security and safety maintenance personnel of CPS.

3.2. Stackelberg Game Model

In a typical defense scenario against stealth malware propagation in CPS, the attacker initially selects a set of devices to infect, while the CPS defender usually operates a malware detection system providing with an incomplete infection distribution. When the information of newly-detected threats is reported, the defender must implement countermeasures accordingly; however, heavy-weight countermeasures cannot be implemented immediately due to the existence of unprotected exposure. Then, the issue of how to use light-weight countermeasures to retard the epidemic tends to be crucial to CPS defenders. It is clear that containment techniques can block illegal communication thereby stopping the spread of malwares through certain links, but may put the system at risk due to the blockage of some crucial control signals for safety concerns. In practice, CPS defenders can be classified according to their preference; that is, the one who gives the priority to security is called fail-secure defender, and a fail-safe defender refers to the one who has preference for safety.
To exemplify this, an instance of the defense scenario is given in Figure 2, where workstation 2 has been infected with a kind of malware from an attacker and two copies of this malware has been stealthily spread to mobile workstation and MTU 2. The defender is supposed to know the abnormal condition of workstation 2 based on its detection system, but more time is needed to analyze the malware sample, develop exploits patching, and deploy anti-malware programs. Hence, the defender should firstly implement light-weight countermeasures. A fail-safe defender is likely to isolate the detected infectious device, though its neighbors (i.e., mobile workstation, MTU 1, and MTU 2) may have been infected, as well. That is, no light-weight countermeasures will be taken on those neighbors such that all control signals deriving from them can be transmitted to the remained network, i.e., fail-safe ability can be maintained as much as possible. Apparently, the undetected copies of this malware on mobile workstation and MTU 1 will pose a long-term threat to the security of this CPS. On the other hand, if the defender gives the priority to security, the initially infected workstation 2 and its neighbors who have the risk of infection should be isolated at the same time so as to avoid further infections deriving from possible infected neighbors. In this way, the defender tries its best to prevent illegal access and data leakage; however, the remained network becomes too fragmented to function normally and the blockage of certain control signals (e.g., emergency cut-off signal, load balancing signal, etc.) may increase the risk of safety. Therefore, it is urgent for the defender to achieve a balance between fail-secure and fail-safe ability when adopting light-weight countermeasures to retard the malware propagation.
To this end, we consider a Stackelberg game in the CPS under the threat of stealth malware propagation, named Shortest-path Tree Interdiction Game. There are two players in this game, i.e., a defender and an attacker. That is,
N p = { Defender , Attacker } .
The defender takes action first to allocate defense resources to a set of links, and then the attacker starts to implement its malicious propagation plan based on the observation of defender’s action. The strategy sets of the defender and attacker are defined as S D and  S A as follows:
S D = { s D : = x x X } ,
S A = { s A : = y y Y } ,
which denotes by X the feasible set of x for the defender, and we let Y be the feasible set of y for the attacker. The defender acts as the leader in this game and can observe a distribution of malware instances in the system based on the detected results, though this observation is usually incomplete. The attacker, on the other hand, acts as a follower and is assumed to know the actions of the defender. Here, the follower knows the whole information of its opponent, and this kind of worst-case analysis is proper for defenders who need robust defense strategies.

3.2.1. Utility Function for Attacker and Defender

The target of the attacker is to stealthily penetrate the CPS at the lowest cost (e.g., time, effort) by selecting optimal network links to spread. According to the nature of tree-structure spreading pattern, the propagation problem is modeled as a shortest-path tree problem with a root vertex v s , i.e., the initial infectious device. That is, the aim of the attacker is to minimize the sum of the path lengths (i.e., penetrating time) from v s to each vertex v i V . For multiple initially infected devices, we can introduce an equivalent root vertex and then connect the initial infectious devices to it by links given c e = 0 , w e = + . By contrast, the defender aims to optimally allocate light-weight countermeasures to several links thereby maximizing the attacker’s total penetrating time. In this game, the utility function of the defender is just the opposite of the attacker’s payoff and they are both linear; hence, this is a typical two-player zero-sum game.

3.2.2. Functional Assurance Constraints

To ensure the safety of CPS, some functional assurance constraints are introduced during the defender’s decision-making process of pursuing fail-secure ability. Since allocation of light-weight countermeasures can cause the loss of safety weight on links, the defender can make an upper bound of total loss R on weight such that the defender can assure the whole system’s safety according to the weight vector w and safety requirements. In some cases, the safety of CPS includes the special safety needs of some certain components, such as a data server or workstation with higher safety needs level. As to these cases, each critical component can be similarly assigned an individual upper bound of weight loss r i relating to vertex v i .

3.2.3. Static and Dynamic Version of the Game

A typical Stackelberg game is usually static, i.e., both players adopt a once-and-for-all decision at the beginning of the game. In the SPTI game, if the attacker makes an entire spread plan and does not change it during the spreading process, the interdiction action of the defender can be designed as a static one. This game is defined as static SPTI game, and the equilibrium result provides the defender with a static allocation decision which is optimal when the attacker does not change its spread plan. Furthermore, when the defender face a cunning attacker who takes adaptive actions according to its observation of the countermeasure implementation, dynamic defending in an observe-and-response manner becomes indispensable to a defender dedicating to an efficient defense. This dynamic SPTI game is a kind of extensive game, which provides defenders with a more practical and operational approach to optimal interdiction compared with the static one.

4. Static Shortest-Path Tree Interdiction Game

We first study the static version of the SPTI game, where both players take once-and-for-all strategies during the game. That is, the defender observes the distribution of malware and allocates defense resources all at once, while the attacker implements its designed propagation plan consistently. Hence, this static game is a typical two-player zero-sum Stackelberg game.

4.1. Bi-Level Integer Program Formulation

In order to obtain the equilibrium of players, we first need to formulate the game mathematically. Since the sets of strategies of players deriving from the constraints in the decision models are implicit in the proposed Stackelberg game, it is usually formulated as a BLIP so as to achieve the Stackelberg equilibrium [35]. Let x e be the decision variable of the defender (vector form x ), where x e = 1 if the link e is interdicted by the defender using light-weight countermeasures; otherwise x e = 0 . Similarly, the attacker’s decision variable y e = 1 if the link e is chosen by the attacker as an edge in the propagation tree of malwares; otherwise y e = 0 ; hence, each y denotes a spanning tree from v s . N S ( v i ) denotes the set of links connected to vertex v i . Let U ( x , y ) denote the utility function of this game under the network setting (i.e., c and  d ). Let Y denote the set of all y vectors, i.e., the set of all spanning trees from v s in G. Hence, we can formulate the game as follows:
[ SSPTI ] u * = max x min y U ( x , y )
s . t . y Y ,
e E w e x e R ,
e N S ( i ) w e x e r i v i V ,
where x , y { 0 , 1 } | E | , u * is the Stackelberg equilibrium of this game. Constraint (4) shows that the propagation of malwares should follow a tree-structure pattern. Constraints (5) and (6) are functional assurance constraints, which mean that the allocation of light-weight countermeasures on the whole CPS and each CPS device should not exceed the upper bound R and  r i , respectively.
SSPTI is a BLIP, where the inner-level problem of the attacker is a shortest-path tree problem and the outer-level problem of the defender introduces knapsack Constraints (5) and (6), which adds to its complexity. Without surprise, SSPTI is a NP-hard problem, and the NP-hardness of it is analyzed in Theorem 1.
Theorem 1.
The SSPTI problem is NP-hard.
Proof of Theorem 1.
Firstly, we introduce a problem of finding a subset K of links such that e K w e R and whose removal from G results in the largest increase in the length of the shortest-path tree from root v s to each vertex, called k-most-vital-links problem (KMVP). It is clear that KMVP is a special case of SSPTI problem. Note that we omit the Constraint (6) in the proof because that SSPTI problem without Constraint (6) is equivalent to setting r i R , i V ; thus is a special case of SSPTI problem.
We then prove that KMVP is NP-hard by showing that a k-most-vital-links recognition problem (KRP) related to it is NP-complete. The KRP is:
  • INPUT: A undirected graph G = ( V , E ) ; w 0 , c 0 ; R 0 ; v s V .
  • OUTPUT: Yes, if there exists a set K E such that e K w e R and the total length of the shortest-path tree from v s in G ( V , E \ K ) is U ; no, otherwise.
The existence of a polynomial algorithm for KMVP would imply the existence of a polynomial algorithm for KRP. Hence, we then demonstrate that KRP is NP-complete by reducing the following knapsack problem (KNAP) to it. The KNAP as follows is known to be NP-complete [46].
  • INPUT: a j , b j 0 for j = 1 , 2 , , n ; A , B 0 .
  • OUTPUT: Yes, if there exists a set S ( 1 , 2 , , n ) such that j S a j A and  j S b j B ; no, otherwise.
The reduction process is as follows. We construct an undirected graph with 2 n + 1 vertexes labeled as 0 , 1 , 2 , , 2 n . As shown in Figure 3, there is a link between vertex 0 and j (for j = 1 , 2 , , n ) with length a j and removal cost B + 1 . Vertex n + j (for j = 1 , 2 , , n ) is only adjacent to vertexes 0 and j, where the lengths of link ( 0 , n + j ) and  ( j , n + j ) are both 0, and the removal costs are b j and  B + 1 , respectively.
Finally, we consider the problem KRP defined on this graph with R = B , U = A , and  v s = 0 . It is observed that none of links ( 0 , j ) and  ( j , n + j ) for j = 1 , 2 , , n can be members of K. Therefore, we may assume that only links ( 0 , n + j ) for j = 1 , 2 , , n are removed. For convenience, link ( 0 , n + j ) is simply denoted by index j, and let K be any set of removed links that does not violate the budget constraint e K w e R . Then, j K b j B , and the total length of the shortest-path tree from vertex 0 becomes j K a j . That is, there is a one to one correspondence between solutions of KRP and solutions of KNAP. □

4.2. Algorithm Design of SSPTI

Solving the BLIP is commonly recognized as a difficult task, and has attracted many efforts from researchers [47]. The common base of existing resolution methods for BLIP is the single-level reformulation process (including linear dual approach, Benders decomposition method, etc.), which transforms bi-level programming to the single-level one. Since SSPTI is a BLIP which cannot be solved directly without proper reformulation, we propose a decomposition algorithm for it by applying Benders decomposition approach [35] and then prove its correctness. Before introducing the algorithm S-BD, some additional denotations are given as follows.
Let y ^ { 0 , 1 } | E | denote the incidence vector corresponding to a certain spanning tree from root v s in G. Let Y ^ denote a collection of y ^ . For simplicity, we refer to y ^ as a spanning tree and to Y ^ as a set of spanning trees. For a certain spanning tree y ^ , we introduce a hierarchy vector h to reflect the weight of each link when accumulating the length of path from v s to each vertex. The hierarchy of link e = ( i , j ) is defined as the number of descendants of vertex i, where i is defined as the parent of j without loss of generality. That is, if y ^ e = 0 then h e = 0 , and if y ^ e = 1 , the value of h e is the hierarchy of link e. Hence, for a certain spanning tree y ^ , we can explicitly express the utility function as:
U ( x , y ^ ) = c T H y ^ + x T D H y ^ ,
where D = d i a g ( d ) , and H = d i a g ( h ) .
Based on this explicit expression of utility function, we can reformulate program [SSPTI] as the following decomposed Master-Sub programs:
[ Master ( Y ^ ) ] z Y ^ = max x z
s . t . z c T H y ^ + x T D H y ^ y ^ Y ^ ,
e E w e x e R ,
e N S ( i ) w e x e r i v i V , [ Sub ( x ^ ) ] z x ^ = min y U ( x ^ , y )
s . t . y Y .
For fixed x = x ^ , there is always a solution y ^ Y to [Sub( x ^ )], which is equivalent to a solution to the inner minimization problem of [SSPTI]. Besides, [Sub( x ^ )] is a shortest-path tree problem which can be solved in polynomial time [48]. Problem [Master( Y ^ )], on the other hand, is an equivalent reformulation of [SSPTI] when Y ^ = Y . Therefore, if one could enumerate all shortest-path spanning trees y ^ Y under each x ^ by solving [Sub( x ^ )], the optimal solution of [SSPTI] could be obtained by solving [Master( Y ^ )].
The direct idea of enumerating all shortest-path trees is still time-consuming; however, we can solve [SSPTI] optimally by sequentially generating only a small fraction of the trees in Y in a decomposition manner thereby increasing the efficiency. Given an allowable optimality gap ϵ , the S-BD algorithm is described in Algorithm 1. After that, Theorem 2 demonstrates the correctness of S-BD algorithm.
Algorithm 1 S-BD: Benders Decompostion for SSPTI
1:
   Initialize Y ^ , z ̲ , z ¯ + , x ^ 0 , ϵ
2:
   while z ¯ z ̲ ϵ do
3:
         Solve [Sub( x ^ )] for y ^ and objective value z x ^
4:
          Y ^ Y ^ y ^
5:
         if z ̲ < z x ^ then z ̲ z x ^
6:
         Solve [Master( Y ^ )] for x ^ and objective value z Y ^
7:
          z ¯ z Y ^
8:
   Return x ϵ x ^
Theorem 2.
Algorithm 1 correctly solves SSPTI.
Proof of Theorem 2.
Firstly, let X be the feasible region of x in SSPTI. Since Y ^ Y the following is valid for any x X : min y Y ^ U ( x , y ) min y Y U ( x , y ) . Hence, it is clear that max x X min y Y ^ U ( x , y ) max x X min y Y U ( x , y ) is valid, i.e., [Master( Y ^ )] provides an upper bound to [SSPTI].
Secondly, max x X min y Y U ( x , y ) min y Y U ( x ^ , y ) is apparently satisfied for any specific x ^ , which means the solution to [Sub( x ^ )] is a lower bound of [SSPTI].
Therefore, if z ¯ = z ̲ (i.e., ϵ = 0 ) is valid with a solution x ^ , i.e., max x X min y Y ^ U ( x , y ) = min y Y U ( x ^ , y ) , then we have
max x X min y Y ^ U ( x , y ) = max x X min y Y U ( x , y ) = min y Y U ( x ^ , y ) .
That is, x ^ is the optimal solution for the defender. □

5. Dynamic Shortest-Path Tree Interdiction Game

In the model setting of SSPTI game, both players adopt stationary strategies which sometimes violate the fact that a cunning attacker is likely to adjust its propagation plan according to the dynamic environment thereby achieving a better payoff. The defender, on the other hand, needs to take actions in an observe-and-react loop rather than take an one-shot defense because of the exist of unprotected exposure and forthcoming malicious events. The model of SSPTI obviously cannot meet those dynamic and adaptive needs of the interdictor. In order to meet the fact of real-time defense-and-attack decision-making, this section extends SSPTI to a multi-stage dynamic shortest-path tree interdiction (DSPTI) game, which can be modeled as an extensive-form game.

5.1. Extending SSPTI to the Dynamic Game

In contrast to the SSPTI game, both players can adopt an observe-and-response action rather than an once-and-for-all decision in real cyber-combat. That is, once newly infectious devices are detected, the defender will allocate certain light-weight countermeasures to certain links. Similarly, the attacker can redesign its propagating tree based on the observation of its opponent’s actions. Based on this practical realization, we propose the following DSPTI game.
The DSPTI game in extensive form is an ordered vector,
Γ D = ( N p , V g , E g , s g , ( V g i ) i N p , O , u ) ,
where N p is a finite set of players (i.e., defender and attacker). ( V g , E g , s g ) denotes a tree called the game tree from root s g , which is determined by the initial infected vertex v s , the graph G and the functional assurance Constraints (5) and (6). ( V g i ) i N p is a partition of the set of vertexes that are not leaves, denoting the decision vertex of player i, and in this game the attacker and the defender make decisions in an alternating manner. Let τ be the number of decisions that each player has to make during this game. O denotes the set of possible game outcomes and u is a function associating every leaf of the tree with a game outcome in the set O, i.e., the utility function that accumulates all path lengths from infected root v s to all each vertex for each game outcome. We can also demonstrate that the DSPTI game is NP-hard shown in Theorem 3.
Theorem 3.
The DSPTI game is NP-hard.
Proof of Theorem 3.
Firstly, we introduce a problem of finding a sequence of subsets K t (for t = 1 , 2 , , τ ) of links such that t = 1 τ e K t w e R and whose removal from G sequentially results in the largest increase in the length of the shortest-path tree from root v s to each vertex, called dynamic k-most-vital-links problem (DKMVP). It is clear that DKMVP is a special case of DSPTI problem.
We then prove that DKMVP is NP-hard by showing that a dynamic k-most-vital-links recognition problem (DKRP) related to it is NP-complete. The DKRP is:
  • INPUT: A undirected graph G = ( V , E ) ; w 0 , c 0 ; R 0 ; v s V .
  • OUTPUT: Yes, if there exists a sequence of subsets K t E (for t = 1 , 2 , , τ ) such that t = 1 τ e K t w e R and the accumulated traversing length of the shortest-path tree from v t in G ( V , E \ { K 1 , K 2 , , K t } ) for t = 1 , 2 , , τ is U ; no, otherwise.
Hence, we then demonstrate that DKRP is NP-complete by reducing the knapsack problem (KNAP) in Theorem 1 to it. The reduction process is as follows.
We reuse the graph shown in Figure 3. Similarly, we consider the problem DKRP defined on this graph with R = B , U = A , and  v s = 0 . It is observed that none of links ( 0 , j ) and  ( j , n + j ) for j = 1 , 2 , , n can be members of any K t for t = 1 , 2 , , τ . Therefore, we may assume that only links ( 0 , n + j ) for j = 1 , 2 , , n are removed. For convenience, link ( 0 , n + j ) is simply denoted by index j, and let { K 1 , K 2 , , K τ } be any sequence of sets of removed links in the time period from 1 to τ that does not violate the budget constraint t = 1 τ e K t w e R . It is obvious that K t = , t { 2 , 3 , , τ } ; hence, t = 1 τ e K t w e = j K 1 b j B , and the total length of the shortest-path tree from vertex 0 becomes j K 1 a j . That is, there is a one to one correspondence between solutions of DKRP and solutions of KNAP. □

5.2. A Model Predictive Control Strategy for DSPTI

In addition to its NP-hardness, it is impossible to achieve the Stackelberg equilibrium for the defender before the end of the game due to the uncertainty from incomplete malware detection and the lack of future data. Traditional exponential-state backward recursion approaches to other kinds of multi-stage interdiction games, such as the dynamic-programming algorithm for dynamic shortest-path interdiction game [49], are not capable of tackling the real-time problem in which no future observation information could be obtained in advance and then used in the backward recursion procedure. To address this, drawing on ideas of modern control theory and methodology, we propose a MPC strategy for DSPTI game with respect to the requirement of real-time decision-making. The idea of MPC strategy derive from the advanced approach of process control, i.e., Model Predictive Control, which allows the current stage to be optimized while keeping the future stages in account [50]. The detection system of malwares serves as the system model in this MPC strategy, and the optimizer is defined to solve a local-greedy SSPTI problem (LG-SSPTI) in a rolling horizon manner.
Once newly infectious devices are detected, a new decision round t will be started by the defender and its opponent. According to the idea of MPC, we need to optimally solve the SSPTI at this round t, and only implements decisions on the neighbor links of v s . However, this simple idea is wasteful in the use of computing resource since useless decisions on non-neighbor links of v s are made and SSPTI itself is NP-hard. Therefore, we introduce the local-greedy SSPTI problem first. The approximate decision of the defender at stage t is made by solving the following LG-SSPTI problem:
[ LG - SSPTI ( t ) ] u * ( t ) = max x t min y t U ( x t , y t )
s . t . y t Y ,
e E w e x e t R t ,
e N S ( i ) w e x e t r i t v i V ,
x e t = 0 e N S ( v s ) ,
where x t , y t { 0 , 1 } | E | , u * ( t ) is the Stackelberg equilibrium of this game, and  N S ( v s ) is the set of links directly connected to v s . Constraint (14) denotes that the propagation of malwares should follow a tree-structure pattern. Constraints (15) and (16) are functional assurance constraints at stage t, where  R t and  r i t denotes the available total and individual resources left after stage t 1 . Constraint (17) denotes a local-greedy allocation constraint that only links connected to vertex v s can be selected to allocate light-weight countermeasures at stage t.
Theorem 4.
The LG-SSPTI problem is NP-hard.
Proof of Theorem 4.
Different from the SSPTI problem, Constraint (17) introduces new features. Hence, we first introduce a problem of finding a subset K of links which connected to v s such that e K w e R and whose removal from G results in the largest increase in the length of the shortest-path tree from root v s to each vertex, called local greedy k-most-vital-links problem (LG-KMVP). It is clear that LG-KMVP is a special case of LG-SSPTI problem. Due to the reason in the proof of Theorem 1, we omit the Constraint (16) in the proof.
We then prove that LG-KMVP is NP-hard by showing that a local greedy k-most-vital-links recognition problem (LG-KRP) related to it is NP-complete. The LG-KRP is:
  • INPUT: A undirected graph G = ( V , E ) ; w 0 , c 0 ; R 0 ; v s V .
  • OUTPUT: Yes, if there exists a set K N S ( v s ) such that e K w e R and the total length of the shortest-path tree from v s in G ( V , E \ K ) is U ; no, otherwise.
The existence of a polynomial algorithm for LG-KMVP would imply the existence of a polynomial algorithm for LG-KRP. Hence, we then demonstrate that LG-KRP is NP-complete by reducing the above-mentioned NP-complete problem, i.e., knapsack problem (KNAP) in Theorem (1), to it.
The reduction process is as follows. Since links ( j , n + j ) N S ( v s ) for j = 1 , 2 , , n , they cannot belong to K. Thus, we can still reuse the graph shown in Figure 3 though the removal cost of links ( j , n + j ) for j = 1 , 2 , , n can be set as any value Then, we consider the problem LG-KRP defined on this graph with R = B , U = A , and  v s = 0 . It is observed that none of links ( 0 , j ) for j = 1 , 2 , , n can be members of K. Therefore, we may assume that only links ( 0 , n + j ) for j = 1 , 2 , , n are removed. For convenience, link ( 0 , n + j ) is simply denoted by index j, and let K be any set of removed links that does not violate the budget constraint e K w e R . Then, j K b j B and the total length of the shortest-path tree from vertex 0 becomes j K a j . That is, there is a one to one correspondence between solutions of LG-KRP and solutions of KNAP. □
Let V s ( t ) be the set of infected vertexes at stage t, and  V d ( t ) denote the newly detected set of infected vertexes at t. The MPC strategy for DSPTI problem is shown in Algorithm 2, named as MPC-DSPTI strategy.
Algorithm 2 MPC-DSPTI: MPC Strategy for DSPTI
1:
Initialize Y ^ , z ̲ , z ¯ + , x ^ 0 , t 0
2:
while | V s | < | V | do
3:
      Malware Detection: obtain a set V d ( t )
4:
      if V d ( t ) then
5:
         Defender’s Decision: solve LG-SSPTI(t) for x t
6:
         Malware Interdiction: allocate countermeasures
         according to x t
7:
      Attacker’s Decision: solve [Sub( x t )] for y t
8:
      Malware propagation: penetrate the CPS based on y t
9:
       t t + 1
Although LG-SSPTI problem is still NP-hard, two benefits are brought by introducing the local-greedy allocation constraint. (1) The number of decision variables x is reduced a lot and will not increase directly as the growth of graph G, thereby expanding the solvable scale of the problem. (2) Since only urgent interdiction demands at current stage (i.e., the needs to allocate countermeasures to links that may be penetrated immediately by the attacker) are satisfied, and most resources remain available for future interdiction actions. That is, using this MPC strategy the defender can adopt an observe-and-response decision adaptively. This helps the defender reduce the decision-making risk due to the uncertainty of the distribution of malwares which is essential for avoiding countermeasures resources waste and achieving more robust decisions.
Due to the similarity between LG-SSPTI and SSPTI, the proposed algorithm S-BD can be used to solve LG-SSPTI optimally by adding the Constraint (17) to the the [Master( Y ^ )] in Section 4. In this MPC strategy, the solution of any instance of LG-SSPTI can be viewed as a kind of approximate solution of the SSPTI with the same constraints except the Constraint (17). Let δ = max e E d e c e , and the approximate performance analysis is shown in Theorem 5, which proves that LG-SSPTI holds an 1 + δ approximation for SSPTI.
Theorem 5.
The solution of LG-SSPTI can achieve the 1 + δ approximation for the corresponding SSPTI problem.
Proof of Theorem 5.
Without loss of generality, we omit the superscript “t” in [LG-SSPTI(t)] during this proof. Let X L and Y L be the feasible region of x and y determined by Constraints (14)–(17) in LG-SSPTI, respectively. The optimal solution of SSPTI is u * = max x X min y Y U ( x , y ) = U ( x * , y * ) , and let u L * = max x X L min y Y L U ( x , y ) = U ( x L * , y L * ) be the optimal solution of LG-SSPTI.
Firstly, it is clear that Y L = Y , and X L X ; thus,
u * = max x X min y Y U ( x , y ) max x X L min y Y U ( x , y ) = u L * .
Then, we define u L = U ( x * , y L * ) . For the fixed x * , u * = min y Y U ( x * , y ) ; hence, for the specific y L * Y , we have
u L u * .
Let x * = x a * + x b * , where x e a * = x e * , e N S ( v s ) , else x e a * = 0 . For the fixed y L * , we have the explicit expression of u L as follows:
u L * = c T H y L * + x L * T D H y L * ,
u L = c T H y L * + x * T D H y L * ,
= c T H y L * + x a * T D H y L * + x b * T D H y L * .
Since x a * T X L , y L * Y , we have U ( x a * , y L * ) U ( x L * , y L * ) , i.e.,
c T H y L * + x a * T D H y L * u L * .
On the other hand, item x b * T D H y L * in Equation (22) is the sum of added path lengths on tree y L * except the added path length of links e N S ( v s ) . Since each link can only be interdicted once at most, by assuming that all the links on tree y L * could be interdicted by the defender, we could obtain a upper bound:
x b * T D H y L * < d T H y L * δ · c T H y L * .
Meanwhile, it is clear that
δ · c T H y L * δ · ( c T H y L * + x L * T D H y L * ) = δ · u L * .
Finally, we conclude that ( 1 + δ ) u L * > u L u * , i.e.,
u * u L * < 1 + δ .

6. Performance Evaluation

This section first introduces several defense strategies, including existing strategies and the proposed strategy. Then, we introduce the performance metrics for both static and dynamic strategies, and the evaluation settings in the experiment are given including simulation methods of networks and information of the real-case CPS network. After that, we evaluate our proposed algorithms and strategies through extensive experiments with static and dynamic settings.

6.1. Defense Strategies

We first evaluate two static defense strategies, i.e., SSPTI and LG-SSPTI. The defender who adopts static strategies allocates all available defense resources in an once-and-for-all manner, once infected devices are detected. Then, three different dynamic strategies are considered as follows for evaluation with respect to the pay-off between CPS security and safety.
1)
We propose the static shortest-path tree interdiction (SSPTI) game, model it as a bi-level integer p A fail-safe strategy (FSA): when a device is infected and detected during the unprotected exposure, it will be isolated from the CPS. Although its neighbors may have been infected, as well, no light-weight countermeasures will be taken on them such that fail-safe ability can be maintained as much as possible.
2)
A fail-secure strategy (FSE): when a device is infected and detected during the unprotected exposure, the device itself and its neighbors will be isolated at the same time so as to avoid further infections deriving from possible infected neighbors. Hence, fail-secure ability is the first priority for the defender.
3)
The MPC strategy (MPC): as mentioned in Section 5, when a device is infected and detected during the unprotected exposure, it will be isolated and then light-weight countermeasures will be allocated optimally to its neighbors by solving a LG-SSPTI problem. In fact, this strategy intends to achieve a balance between fail-safe ability and fail-secure ability in CPS defense.

6.2. Performance Metrics and Evaluation Settings

We first use the following metrics for performance comparison in the evaluation of static strategies on different types of networks:
1)
The achieved objective u under different static strategies. That is, the shortest-path three length which the attacker can achieved under the situation of defenders’ countermeasure implementation. The larger u the attacker gains, the more effectively the defender defends in the malware propagation. We mainly compare the achieved u of SSPTI and LG-SSPTI, and analyze the impact of δ on the actual approximate ratio.
2)
The algorithm running time. We compare the running time of SSPTI and LG-SSPTI by changing the scale of the problem.
In the experiments, we select three representative types of CPS networks for evaluation, i.e., square-lattice networks, standard Erd o ¨ s-Rényi (ER) networks [51] and scale-free networks [52]. Lattice networks, where each vertex has the same number of links, have been used to model physical systems [2], such as water supply systems, power grid systems, etc. ER network is the original model of networks based on random graph theory, which has a Poisson degree distribution. Many more real-life networks obey a power-law form in degree distribution, such as the Internet [53], mobile communication networks [54], and airline networks [55]. These systems can be approximately modeled as scale-free networks.
For evaluation, 100 instances of square-lattice networks, ER networks and scale-free networks with 50 vertexes, 85, 178 (in average), and 144 links are generated, respectively, in the evaluation of static strategies. An initial infectious device is randomly generated to evaluate the performance of static strategies. In each instance, link attributes c , w are randomly generated and uniformly distributed on [ 1 , 5 ] . Node attributes r is uniformly distributed on [ 1 , 10 ] . Let interdiction delay d = δ · c so as to analyse the impact of δ . Then, a set of square-lattice networks, ER networks and scale-free networks of different size (from 50 vertexes to 1600 vertexes) are generated with the same link attributes setting to compare the running time. Here, the upper bound of total loss R is set as 0.5 · e E w e , and δ is set as 0.6 to consider the impact of network size on static strategies.
Additionally, the followings metrics are used to evaluate the performance of different dynamic defense strategies, which cares for the gain and loss of deploying light-weight countermeasures against stealth malware propagation in CPS.
1)
The speed and scale of malware propagation, which represents the security situation of the CPS during the defense process.
2)
The size of giant component of the CPS during the defense process, which is a major indicator of safety situation for networked systems.
According to the features of stealth malware detection [12], we can simply assume that the probability that an infected vertex can be detected by the defender grows linearly as the increase of its infection duration, and after a given duration T d it can be certainly detected. The initial ratio of infection is set to be 2% in the experiments that obtain the metrics versus time curves, and then varies from 1% to 100% in order to test the difference of steady infection state (i.e., the final scope of infection) under different initial infection ratios. Here, 100 instances of square-lattice networks, ER networks and scale-free networks with 300 vertexes are generated, respectively, with the same link attributes setting (e.g., c , w , r ), and let δ = 1 . We set the upper bound of total loss R = 0.5 · e E w e , and the individual upper bound of loss r i = 0.8 · e N S ( i ) w e so as to meet the safety requirement of CPS. Moreover, a practical CPS case is used to evaluate the dynamic strategies, i.e., Italian coupled communication and power grid network [56]. There are 39 vertexes and 102 links in the control and communication network, 310 vertexes and 361 links in the power grid network, and 169 coupled links between them. We execute the evaluation 100 times adopting the above link attributes setting and average the numerical results.
We program our algorithms using YALMIP toolbox [57] and Gurobi version 7.0.2 callable library for exact solution for master problems. Computation is performed on a Windows10 (64) computer with 2.40 GHz Intel(R) Core i5 CPU and 4.0G RAM.

6.3. Evaluation Results of Static Strategies

6.3.1. Comparison of Achieved Objective u

The performance comparison of static strategies SSPTI and LG-SSPTI on 100 instances of three types of networks with 50 vertexes is shown in Table 2. It is obvious that as the increase of δ from 0.2 to 1.0 the average actual approximation ratio u * u L * ¯ on square-lattice networks rises from 1.08 to 1.33, whereas that on ER networks and scale-free networks grows slightly from 1.03 to 1.13 and 1.11, respectively. That is, LG-SSPTI strategy can actually achieve a better approximation ratio, though the approximation ratio given by Theorem 5 is 1 + δ , especially on scale-free networks. The length of shortest-path tree for malware propagation on square-lattice networks is noticeably larger than that on ER and scale-free networks with the same nodes scale. Besides, the consumed resources R u when adopting SSPTI strategy is nearly 3 times of that when adopting LG-SSPTI strategy on ER and scale-free networks, and around 7 times of that on square-lattice networks. The result demonstrates that LG-SSPTI strategy can save interdiction resources in a large amount compared with SSPTI, and these saved resources can be used in the future shots of defense thereby bringing extra payoffs.
In summary, the defender who adopts LG-SSPTI strategy can achieve at most 1 + δ approximation of SSPTI strategy and consume quite fewer resources compared with SSPTI strategy in the meantime on square-lattice networks, ER networks and scale-free networks. Additionally, a malware can be spread faster in the manner of shortest-path tree on ER and scale-free networks compared with square-lattice networks, deriving from the structure difference between them.

6.3.2. Comparison of Algorithm Running Time

In Table 3, we compare the algorithm running time of SSPTI and LG-SSPTI on three types of networks. For each number of vertexes | V | , 10 instances are generated for evaluation. With the enlargement of the scale of a problem especially the number of links | E | , the average running time of both strategies increases by various extents. When the scale of networks increase to over 200 links, SSPTI cannot solve all instances optimally in the given time (1800 CPU seconds) on three kinds of networks. However, compared with SSPTI, the solvable scale of LG-SSPTI has increased to 6268, 1479, and 4794 links on square-lattice, ER, and scale-free networks, respectively, and LG-SSPTI is faster than SSPTI by a wide margin. The superiority of LG-SSPTI is rooted in the fact that its decision variables will not increase directly as the growth of network. Since the number of an infected node’s neighbors on square-lattice network is a constant except that of edge nodes, the running time increases slowly as the rise of network size, and the average number of iterations in the decomposition procedure keeps nearly the same. The degree distribution of scale-free networks follows a power low asymptotically, and randomly selected initial infectious nodes usually have a low degree in statistical; hence, the LG-SSPTI running time on scale-free networks is lower than its counterpart on ER networks, which approximately holds Poisson degree distributions.
Therefore, we conclude that LG-SSPTI expands the solvable scale of the problem to a large extent on three kinds of generated networks. Besides, the running time of LG-SSPTI on square-lattice networks and scale-free networks is lower than it counterpart on ER networks.

6.4. Evaluation Results of Dynamic Strategies

6.4.1. Performance on Generated Networks

The propagation performances of three dynamic defense strategies on square-lattice networks, ER networks and scale-free networks are shown in Figure 4, Figure 5 and Figure 6. From the security situation results in subplot (a), our proposed strategy MPC and the fail-secure strategy FSE can effectively retard and mitigate the propagation of malwares and all the ratios of infected vertexes are suppressed fewer than 20%, while the fail-safe strategy FSA cannot prevent malware penetration effectively resulting a higher propagation speed and a larger scope of infection. Meanwhile, scale-free networks tend to be more fragile towards malware propagation no matter which defense strategies the defender adopts. From the safety situation results in subplot (b), the proposed MPC strategy slows the collapse of giant component ratio r g c down and maintains the highest ratio of giant component among three dynamic strategies. At the beginning of the infection, FSA holds a lower collapse rate of r g c compared with that of FSE; however, due to the challenge of stealth malware quick detection, the propagation cannot be controlled in the short term resulting the outbreak of newly infected vertexes in the medium term. Hence, safety cannot be guaranteed as expected without active actions on system security, due to the interdependence between safety and security in CPS. The FSE strategy, on the other hand, can control the propagation of malware, while it gives rise to a sharp drop in r g c at early stages (lower than 60% in Figure 6b). Althougfh, FSE outperforms in maintaining the security situation of CPS before the implementation of heavy-weight countermeasures, the high collapse rate of r g c of FSE at the beginning of infection is likely to make a large loss on safety assurance.
Therefore, among these three strategies, our proposed MPC strategy can align CPS security and safety properly. Although the FSA strategy aims to maintain safety and reduce the loss on system functionalities as much as possible, more vertexes will be infected in the future due to the undetected threats and the unprotected exposure, resulting worse performance on both safety and security maintenance. FSE, on the other hand, can achieve a low infected ratio but fail to maintain the connectivity and safety of CPS.

6.4.2. Performance on Real CPS Cases

The simulation results on Italian coupled communication and power grid network are shown in Figure 7, Figure 8 and Figure 9. From the results in Figure 7, the performances of three strategies are similar to the above conclusions on generated networks, and MPC strategy performs better than the other two strategies in both security and safety assurance. When T d = 5 , the practical CPS network tends to be less fragile than the generated networks due to the difference in network structures. However, as the increase of T d , i.e., the rise of detection difficulty, the performance of all strategies degenerates (see in Figure 8 and Figure 9). Both MPC and FSE strategy have a slight rise in the ratio of infected vertexes, while the spread of malwares cannot be effectively controlled by FSA strategy. The r g c when adopting MPC strategy decreases at the lowest speed and can be controlled in a relatively higher level among three strategies.
As a result, the performance of all strategies degenerates as the increase of detection difficulty. However, the proposed MPC strategy still outperforms other strategies, and it can help retard the spread of malwares and the cascade of devices failure during the time-span of unprotected exposure, thereby achieving a balance between security and safety.

6.4.3. Discussion of Steady Infection State

We then consider the extreme case that no heavy-weight countermeasures are developed and deployed until the steady infection state, i.e., the unprotected exposure is relatively large and only light-weight countermeasures work. This situation is not very common, but considering the cunning techniques of attackers in reality CPS defenders need to take actions in case of emergency. As shown in Figure 10, Figure 11 and Figure 12, the performance of dynamic strategies on the final scope of infection with various initial infection ratios are considered on three types of networks. Here, the detection time threshold T d is set to be 5. As the increase of initial infection ratio, the average steady scope of infection grows to 100% with different rate and the average steady r g c falls to 0%. More specifically, it is clear that FSE and MPC outperform FSA on the steady state of both security and safety situation among three kinds of networks. When the initial infection ratio is 1%, the average final ratio of infected vertexes of FSA is around 38%, 64%, and 78% on square-lattice networks, ER networks and scale-free networks, respectively, while that of MPC and FSE is below 10% and 20%. The performance on r g c assurance of FSA is much worse than MPC and FSE, reporting around 51%, 20%, and 3%, respectively, when the initial infection ratio is 1%, whereas that of MPC and FSE is more than 90% and 70%.
The performance of FSE is slightly better than that of MPC in reducing the scope of infection, but FSE is intrinsically inferior to MPC in safety assurance of CPS. The superiority of FSE in final ratio of infection over MPC is not more than 15% on square-lattice networks and ER networks and 25% on scare-free networks, but MPC can sometimes exceed FES around 45% in the steady r g c . More significantly, even though more vertexes are immune to malwares when using FSE rather than MPC, the CPS is not likely to function well at all because of the extremely fragmented condition. For instance, in Figure 12 when initial infected ratio is 10%, FSE outperforms MPC in final ratio of infection reporting nearly 25% versus 46%; however, the corresponding r g c of FSE and MPC is about 5% and 38%. That is, the CPS adopting FSE becomes a combination of isolated vertexes and network fragments which cannot supports most of the function requirements, although around 75% of these components are not infected. On the other hand, the CPS adopting MPC still has 54% of vertexes which are not infected; meanwhile, 38% vertexes are in the same giant component and belong to the set of 54% uninfected vertexes, i.e., this giant component is protected to be secure and safety at the same time.
Similar results on Italian coupled communication and power grid network can be obtained when the extreme case is taking account, shown in Figure 13. MPC is still the best choice when considering the balance between fail-secure ability and fail-safe ability among those three dynamic defense strategies. The performance of FSE is slightly better than that of MPC in reducing the scope of infection where the gap between is not more than 10%. MPC is intrinsically superior to FSE in safety assurance of CPS, reporting 52% versus 14% in final r g c . Besides, the inferiority of FSA to the other strategies on Italian coupled network is not very large compared to that on generated networks. However, based on the results in Figure 7, Figure 8 and Figure 9, we can conclude that the performance difference between different strategies will become more distinctive as the increase of detection difficulty.
To summarize, considering the extreme case that the unprotected exposure is relatively large and only light-weight countermeasures work, MPC is the best choice when both fail-secure and fail-safe ability is essential among those dynamic strategies on both generated and real-case CPS networks. The reason lies on the fact that a defender who adopts MPC can reduce the scope of final infection and maintain the communication and other normal functions of the giant component to a large extent. Therefore, when the defender faces a stealth APT attack with fewer heavy-weight countermeasures to defense the CPS in an emergency, the proposed MPC strategy can provide a option of using light-weight countermeasures so as to achieve a balance between fail-secure ability and fail-safe ability while retarding the stealth malware propagation in CPS.

7. Conclusions

In this work, we focus on the static and dynamic defense against stealth malware propagation in Cyber-Physical Systems. We first modeled the attack-and-defense process between the CPS defender and attacker as a static shortest-path tree interdiction game, and formulated it as a bi-level linear integer programming. To meet the real-time decision-making requirement, we extended SSPTI game to an extensive-form game, i.e., DSPTI. The NP-hardness of SSPTI and DSPTI was systematically analyzed, and optimal algorithms were designed, as well. In order to find an optimal trade-off between the gain and loss of deploying light-weight countermeasures, we proposed a dynamic defense strategy, i.e., MPC strategy. Extensive experiments have been conducted on both simulated and real-case based CPS networks, which demonstrates the efficiency of the proposed algorithms. Furthermore, those evaluation results illustrated that the defender can achieve a balance between fail-secure ability and fail-safe ability while retarding the stealth malware propagation in CPS. Although, the application of this framework in the practice of CPS defense still needs a lot meticulous research and work, we believe that it will provide valuable enlightenment for subsequent research in the future.

Author Contributions

Conceptualization, K.X. and C.Z.; methodology, K.X.; software, J.X.; validation, Y.Z., X.Z. and W.Z.; investigation, J.X.; data curation, K.X.; writing–original draft preparation, K.X.; writing–review and editing, Y.Z.; visualization, K.X.; supervision, W.Z.; project administration, C.Z.; funding acquisition, C.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was sponsored by the National Natural Science Foundation of China under Grants No.71571186.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xiao, K.; Zhu, C.; Xie, J.; Zhou, Y.; Zhu, X.; Zhang, W. Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems. In Proceedings of the IEEE INFOCOM, Honolulu, HI, USA, 15–19 April 2018; pp. 1790–1798. [Google Scholar]
  2. Gao, J.; Buldyrev, S.V.; Stanley, H.E.; Havlin, S. Networks formed from interdependent networks. Nat. Phys. 2012, 8, 40–48. [Google Scholar] [CrossRef] [Green Version]
  3. Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Wu, G.; Sun, J.; Chen, J. A survey on the security of cyber-physical systems. Control Theory Technol. 2016, 14, 2–10. [Google Scholar] [CrossRef]
  5. Singh, S.; Sharma, P.K.; Moon, S.Y.; Moon, D.; Park, J.H. A comprehensive study on apt attacks and countermeasures for future networks and communications: Challenges and solutions. J. Supercomput. 2016, 75, 1–32. [Google Scholar] [CrossRef]
  6. Chen, P.; Desmet, L.; Huygens, C. A study on advanced persistent threats. In IFIP International Conference on Communications and Multimedia Security; Springer: Amsterdam, The Netherlands, 2014; pp. 63–72. [Google Scholar]
  7. Lee, K.B.; Lim, J.I. The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd. KSII Trans. Internet Inf. Syst. 2016, 10, 857–880. [Google Scholar]
  8. Karnouskos, S. Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011—37th Annual Conference on IEEE Industrial Electronics Society; IEEE: Piscataway, NJ, USA, 2011; pp. 4490–4494. [Google Scholar]
  9. Bencsáth, B.; Pék, G.; Buttyán, L.; Felegyhazi, M. The cousins of stuxnet: Duqu, flame, and gauss. Fut. Internet 2012, 4, 971–1003. [Google Scholar] [CrossRef] [Green Version]
  10. Hu, P.; Li, H.; Fu, H.; Cansever, D.; Mohapatra, P. Dynamic defense strategy against advanced persistent threat with insiders. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 747–755. [Google Scholar]
  11. Ryan, J. Leading Issues in Information Warfare Research; Academic Conferences Limited: Oxford, UK, 2014; pp. 1–58. [Google Scholar]
  12. Rudd, E.M.; Rozsa, A.; Günther, M.; Boult, T.E. A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Commun. Surv. Tutor. 2017, 19, 1145–1172. [Google Scholar] [CrossRef]
  13. Li, M.; Huang, W.; Wang, Y.; Fan, W.; Li, J. The study of apt attack stage model. In Proceedings of the 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, Japan, 26–29 June 2016; pp. 1–5. [Google Scholar]
  14. Li, M.; Huang, W.; Wang, Y.; Fan, W.; Li, J. Optimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness. In IEEE Transactions on Parallel and Distributed Systems; IEEE: Piscataway, NJ, USA, 2012; Volume 23, pp. 1708–1720. [Google Scholar]
  15. Yau, D.K.; Lui, J.; Liang, F.; Yam, Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw. TON 2005, 13, 29–42. [Google Scholar] [CrossRef] [Green Version]
  16. Zhang, G.; Parashar, M. Cooperative detection and protection against network attacks using decentralized information sharing. Clust. Comput. 2010, 13, 67–86. [Google Scholar] [CrossRef]
  17. Sabaliauskaite, G.; Mathur, A.P. Aligning Cyber-Physical System Safety and Security; Springer: Cham, Switzerland, 2015; pp. 41–53. [Google Scholar]
  18. Chun, B.N.; Lee, J.; Weatherspoon, H. Netbait: A Distributed Worm Detection Service; Intel Research Berkeley Technical Report IRB-TR-03; Intel Corporation: Santa Clara, CA, USA, 2003; Volume 33. [Google Scholar]
  19. Yegneswaran, V.; Barford, P.; Jha, S. Global Intrusion Detection in the DOMINO Overlay System. Available online: https://minds.wisconsin.edu/handle/1793/60340 (accessed on 28 July 2020).
  20. Knowles, W.; Prince, D.; Hutchison, D.; Disso, J.F.P.; Jones, K. A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 2015, 9, 52–80. [Google Scholar] [CrossRef]
  21. Del Rey, A.M.A.; Encinas, H.; Vaquero, J.M.; Dios, A.Q.; Sánchez, G.R. A method for malware propagation in industrial critical infrastructures. Integr. Comput.-Aided Eng. 2016, 23, 255–268. [Google Scholar] [CrossRef]
  22. Zeng, C.; Ren, B.; Liu, H.; Chen, J. Applying the bayesian stackelberg active deception game for securing infrastructure networks. Entropy 2019, 21, 909. [Google Scholar] [CrossRef] [Green Version]
  23. Eshghi, S.; Khouzani, M.H.R.; Sarkar, S.; Venkatesh, S.S. Optimal patching in clustered malware epidemics. IEEE/ACM Trans. Netw. 2016, 24, 283–298. [Google Scholar] [CrossRef] [Green Version]
  24. Scaman, K.; Kalogeratos, A.; Vayatis, N. Suppressing epidemics in networks using priority planning. IEEE Trans. Netw. Sci. Eng. 2016, 3, 271–285. [Google Scholar] [CrossRef]
  25. Bloem, M.; Alpcan, T.; Başar, T. Optimal and robust epidemic response for multiple networks. Control Eng. Pract. 2009, 17, 525–533. [Google Scholar] [CrossRef]
  26. Paré, P.E.; Beck, C.L.; Nedić, A. Stability analysis and control of virus spread over time-varying networks. In Proceedings of the 2015 54th IEEE Conference on Decision and Control (CDC), Osaka, Japan, 15–18 December 2015; pp. 3554–3559. [Google Scholar]
  27. Pu, C.; Lim, S. A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Syst. J. 2016, 17, 834–842. [Google Scholar] [CrossRef]
  28. Mohammadi, R.; Javidan, R.; Conti, M. Slicots: An sdn-based lightweight countermeasure for tcp syn flooding attacks. IEEE Trans. Netw. Serv. Manag. 2017, 14, 487–497. [Google Scholar] [CrossRef]
  29. Shang, G.; Zhe, P.; Bin, X.; Aiqun, H.; Kui, R. FloodDefender: Protecting data and control plane resources under sdn-aimed dos attacks. In Proceedings of the 2017 IEEE Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
  30. Morton, D.P.; Pan, F.; Saeger, K.J. Models for nuclear smuggling interdiction. IIE Trans. 2007, 39, 3–14. [Google Scholar] [CrossRef]
  31. Powell, R. Defending against terrorist attacks with limited resources. Am. Pol. Sci. Rev. 2007, 101, 527–541. [Google Scholar] [CrossRef] [Green Version]
  32. Sadati, M.E.H.; Aksen, D.; Aras, N. The r-interdiction selective multi-depot vehicle routing problem. Int. Trans. Oper. Res. 2020, 27, 835–866. [Google Scholar] [CrossRef]
  33. Department, J.S. Deception Tactics for Network Interdiction: A Multiobjective Approach. Networks 2012, 60, 45–58. [Google Scholar]
  34. Fulkerson, D.R.; Harding, G.C. Maximizing the minimum source-sink path subject to a budget constraint. Math. Prog. 1977, 13, 116–118. [Google Scholar] [CrossRef]
  35. Israeli, E.; Wood, R.K. Shortest-path network interdiction. Networks 2002, 40, 97–111. [Google Scholar] [CrossRef]
  36. Bayrak, H.; Bailey, M.D. Shortest path network interdiction with asymmetric information. Networks 2008, 52, 133–140. [Google Scholar] [CrossRef]
  37. McCarter, M.; Barker, K.; Johansson, J.; Ramirez-Marquez, J.E. A bi-objective formulation for robust defense strategies in multi-commodity networks. Reliab. Eng. Syst. Saf. 2018, 176, 154–161. [Google Scholar] [CrossRef] [Green Version]
  38. Borrero, J.S.; Prokopyev, O.A.; Sauré, D. Sequential interdiction with incomplete information and learning. Oper. Res. 2019, 67, 72–89. [Google Scholar] [CrossRef]
  39. Xu, K.; Xiao, K.; Yin, Q.; Zha, Y.; Zhu, C. Bridging the gap between observation and decision-making: Goal recognition and flexible resource allocation in dynamic network interdiction. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17), Melbourne, Australia, 19–25 August 2017; pp. 4477–4483. [Google Scholar]
  40. Zhu, M.; Martinez, S. Stackelberg-game analysis of correlated attacks in cyber-physical systems. In Proceedings of the 2011 American Control Conference, San Francisco, CA, USA, 29 June–1 July 2011; pp. 4063–4068. [Google Scholar]
  41. Panaousis, E.; Fielder, A.; Malacaria, P.; Hankin, C.; Smeraldi, F. Cybersecurity Games and Investments: A Decision Support Approach. Decis. Game Theory Secur. 2014, 8840, 266–286. [Google Scholar]
  42. Nandi, A.K.; Medal, H.R.; Vadlamani, S. Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model. Comput. Oper. Res. 2016, 75, 118–131. [Google Scholar] [CrossRef]
  43. Durkota, K.; Lisý, V.; Kiekintveld, C.; Bošanský, B.; Pěchouček, M. Case studies of network defense with attack graph games. IEEE Intell. Syst. 2016, 31, 24–30. [Google Scholar] [CrossRef]
  44. Barbosa, R.R.; Sadre, R.; Pras, A. Difficulties in modeling SCADA traffic: A comparative analysis. In International Conference on Passive and Active Network Measurement; Springer: Berlin, Germany, 2012; Volume 7192, pp. 126–135. [Google Scholar]
  45. Barbosa, R.R.R. Anomaly Detection in Scada Systems: A Network Based Approach; University of Twente: Enschede, The Netherlands, 2014. [Google Scholar]
  46. Garey, M.R. Computers and intractability: A guide to the theory of np-completeness. Revista Da Escola De Enfermagem Da USP 1979, 44, 340. [Google Scholar]
  47. Smith, J.C.; Song, Y. A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 2020, 283, 797–811. [Google Scholar] [CrossRef]
  48. Narváez, P.; Siu, K.-Y.; Tzeng, H.-Y. New dynamic algorithms for shortest path tree computation. IEEE/ACM Trans. Netw. 2000, 8, 734–746. [Google Scholar] [CrossRef]
  49. Sefair, J.A.; Smith, J.C. Dynamic shortest-path interdiction. Networks 2016, 68, 315–330. [Google Scholar] [CrossRef]
  50. Lee, J.H. Model predictive control: Review of the three decades of development. Int. J. Control Autom. Syst. 2011, 9, 415–424. [Google Scholar] [CrossRef]
  51. Newman, M.E.J. The structure and function of complex networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef] [Green Version]
  52. Barabási, A.-L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [Green Version]
  53. Faloutsos, M.; Faloutsos, P.; Faloutsos, C. On power-law relationships of the internet topology. SIGCOMM Comput. Commun. Rev. 1999, 29, 251–262. [Google Scholar] [CrossRef]
  54. Onnela, J.-P.; Saramäki, J.; Hyvönen, J.; Szabó, G.; Lazer, D.; Kaski, K.; Kertész, J.; Barabási, A.-L. Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. USA 2007, 104, 7332–7336. [Google Scholar] [CrossRef] [Green Version]
  55. Colizza, V.; Barrat, A.; Barthelemy, M.; Vespignani, A. Prediction and predictability of global epidemics: The role of the airline transportation network. Proc. Natl. Acad. Sci. USA 2005, 103, 2015–2020. [Google Scholar] [CrossRef] [Green Version]
  56. Parandehgheibi, M.; Modiano, E. Robustness of interdependent networks: The case of communication networks and the power grid. In 2013 IEEE Global Communications Conference (GLOBECOM); IEEE: Piscataway, NJ, USA, 2013; pp. 2164–2169. [Google Scholar]
  57. Lofberg, J. Yalmip: A toolbox for modeling and optimization in matlab. In 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508); IEEE: Piscataway, NJ, USA, 2004; pp. 284–289. [Google Scholar]
Figure 1. A typical CPS network with three layers.
Figure 1. A typical CPS network with three layers.
Entropy 22 00894 g001
Figure 2. An example of malware propagation in cyber-physical systems (CPS).
Figure 2. An example of malware propagation in cyber-physical systems (CPS).
Entropy 22 00894 g002
Figure 3. A portion of the constructed graph in the reduction process.
Figure 3. A portion of the constructed graph in the reduction process.
Entropy 22 00894 g003
Figure 4. Performance of dynamic defense strategies on square-lattice networks ( | E | = 563 , T d = 5 ). (a) Security situation; (b) safety situation.
Figure 4. Performance of dynamic defense strategies on square-lattice networks ( | E | = 563 , T d = 5 ). (a) Security situation; (b) safety situation.
Entropy 22 00894 g004
Figure 5. Performance of dynamic defense strategies on Erd o ¨ s-Rényi (ER) networks ( | E ¯ | = 526 , T d = 5 ). (a) Security situation; (b) safety situation.
Figure 5. Performance of dynamic defense strategies on Erd o ¨ s-Rényi (ER) networks ( | E ¯ | = 526 , T d = 5 ). (a) Security situation; (b) safety situation.
Entropy 22 00894 g005
Figure 6. Performance of dynamic defense strategies on scale-free networks ( | E | = 597 , T d = 5 ). (a) Security situation; (b) safety situation.
Figure 6. Performance of dynamic defense strategies on scale-free networks ( | E | = 597 , T d = 5 ). (a) Security situation; (b) safety situation.
Entropy 22 00894 g006
Figure 7. Performance of dynamic defense strategies on Italian coupled communication and power grid network ( T d = 5 ). (a) Security situation; (b) safety situation.
Figure 7. Performance of dynamic defense strategies on Italian coupled communication and power grid network ( T d = 5 ). (a) Security situation; (b) safety situation.
Entropy 22 00894 g007
Figure 8. Performance of dynamic defense strategies on Italian coupled communication and power grid network ( T d = 10 ). (a) Security situation; (b) safety situation.
Figure 8. Performance of dynamic defense strategies on Italian coupled communication and power grid network ( T d = 10 ). (a) Security situation; (b) safety situation.
Entropy 22 00894 g008
Figure 9. Performance of dynamic defense strategies on Italian coupled communication and power grid network ( T d = 15 ). (a) Security situation; (b) safety situation.
Figure 9. Performance of dynamic defense strategies on Italian coupled communication and power grid network ( T d = 15 ). (a) Security situation; (b) safety situation.
Entropy 22 00894 g009
Figure 10. Steady State of dynamic defense on square-lattice networks against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Figure 10. Steady State of dynamic defense on square-lattice networks against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Entropy 22 00894 g010
Figure 11. Steady state of dynamic defense on ER networks against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Figure 11. Steady state of dynamic defense on ER networks against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Entropy 22 00894 g011
Figure 12. Steady state of dynamic defense on scale-free networks against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Figure 12. Steady state of dynamic defense on scale-free networks against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Entropy 22 00894 g012
Figure 13. Steady state of dynamic defense on Italian coupled communication and power grid network against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Figure 13. Steady state of dynamic defense on Italian coupled communication and power grid network against various initial infected vertexes ratios. (a) Security situation; (b) safety situation.
Entropy 22 00894 g013
Table 1. Notations of main parameters and variables.
Table 1. Notations of main parameters and variables.
NotationsDescriptions
Sets N p The set of players, i.e., a defender and an attacker
VThe set of devices (vertexes) in the CPS network G. v i V where i = { 1 , 2 , , | V | }
EThe set of links in G. Each link e = ( i , j ) E , v i , v j V
Parameters c e Cost for an attacker to propagate a malware through the link e. c e 0 (vector form c )
d e Delay on link e if it is interdicted by the defender (vector form d )
w e Safety loss of link e if it is interdicted by the defender (vector form w )
RUpper bound of total safety loss for the safe of the whole CPS
r i Individual upper bound of safety loss for the vertex i
uThe utility function for game players
Decision variables x e The defender’s decision variable (vector form x ), where x e = 1 if the link e is interdicted; otherwise x e = 0
y e The attacker’s decision variable (vector form y ) y e = 1 if the link e is chosen to pass through; otherwise y e = 0
Table 2. Comparison of static strategies performance.
Table 2. Comparison of static strategies performance.
Network Type δ SSPTILG-SSPTI u * u L * ¯
u ¯ * σ R u u ¯ * σ R u
Square-lattice Networks0.2520.17151.0864.70479.60137.838.451.08
0.4561.65102.1466.25496.8483.619.401.13
0.6630.09158.6672.45517.23123.838.751.21
0.8654.76125.1273.80513.5397.9210.151.28
1.0677.50161.8780.50505.80107.7210.901.33
Erd o ¨ s-Rényi Networks0.2156.7237.2356.25152.0435.4524.451.03
0.4183.4733.0862.05171.9830.0519.401.07
0.6190.2735.1472.15172.8929.7123.751.10
0.8193.1237.5670.65173.4530.6022.401.11
1.0201.5532.7774.40178.2028.5924.101.13
Scale-free Networks0.2151.5333.5051.25146.7431.6117.351.03
0.4161.0037.6350.50151.6533.6918.901.06
0.6165.6643.2260.05153.1937.1921.551.08
0.8202.8047.9059.00181.4040.3115.901.11
1.0191.8033.9261.05173.1029.0119.951.11
Superscript “ ¯ ” denotes the average of related parameters; σ denotes the standard deviation of u * and u L * ; R u denotes the consumed resources; R is set to be 200.
Table 3. Comparison of running time (static shortest-path tree interdiction (SSPTI) vs. local-greedy (LG)-SSPTI).
Table 3. Comparison of running time (static shortest-path tree interdiction (SSPTI) vs. local-greedy (LG)-SSPTI).
Network TypeProblemSSPTILG-SSPTI
| V | | E | T σ I T σ I
Square-lattice Networks508515.648.43122.800.843
10017136.6115.12215.192.144
200367[8]6.331.933
400742[0]13.525.973
8001534[0]27.0810.413
16003084[0]55.7420.843
32006268[0]235.2547.773
Erd o ¨ s-Rényi Networks5017836.4320.25304.681.616
100368[4]27.6820.6815
200744[0]89.9059.3933
4001479[0]592.19731.9764
8002958[0][8]
16005944[0][5]
320011922[0][0]
Scale-free Networks50144202.82430.485612.5410.7312
100294[1]25.0433.9814
200594[0]26.1612.4210
4001194[0]69.48111.1914
8002394[0]308.63561.7820
16004794[0]483.07341.0012
32009594[0][8]
Nos. in the square brackets presents the number of solvable problems under 1800 CPU second from 10 instances. “–” indicates “not applicable”, i.e., at least one of the 10 instances cannot be solved optimally in the allotted time. T, average running time for 10 instances, in CPU seconds; σ , standard deviation of T in CPU seconds; I, average number of iterations for decomposition algorithms.

Share and Cite

MDPI and ACS Style

Xiao, K.; Zhu, C.; Xie, J.; Zhou, Y.; Zhu, X.; Zhang, W. Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework. Entropy 2020, 22, 894. https://0-doi-org.brum.beds.ac.uk/10.3390/e22080894

AMA Style

Xiao K, Zhu C, Xie J, Zhou Y, Zhu X, Zhang W. Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework. Entropy. 2020; 22(8):894. https://0-doi-org.brum.beds.ac.uk/10.3390/e22080894

Chicago/Turabian Style

Xiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, and Weiming Zhang. 2020. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework" Entropy 22, no. 8: 894. https://0-doi-org.brum.beds.ac.uk/10.3390/e22080894

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop