skip to main content
10.1145/3569902.3570188acmotherconferencesArticle/Chapter ViewAbstractPublication PagesladcConference Proceedingsconference-collections
research-article
Open Access

Modeling attacker behavior in Cyber-Physical-Systems

Authors Info & Claims
Published:17 January 2023Publication History

ABSTRACT

Societies are increasingly dependent on Cyber Physical Systems (CPSs), which are exposed to natural and human-made attacks. Attacks on CPSs can result in security breaches and behaviors that may impose harm on their environments. Understanding attack mechanisms is crucial to preventing losses or damage to people, assets or information. We develop a computational environment that allows to implement attacker agents under a stochastic optimization framework, allowing to use different techniques to model attacking behavior (i.e., policies), including approximate dynamic programming, reinforcement learning, or stochastic programming, as well as arbitrary policies (e.g., rules of thumb). We rely on the ADVISE formalism to represent attack paths on CPSs, leveraging their Markov Decision Process structure to build an environment that allows to test attacker and defender policies. The proposed environment is tested by simulating attacks on a SCADA system previously addressed in the literature, demonstrating satisfactory convergence for a Q-learning algorithm, which allows to identify the attack steps that most frequently lead to successful attacks. The proposed approach allows flexibility in modeling attackers, and allows to conceive models with interacting attacker and defender agents, which is left as the main goal of future work.

References

  1. [1] W. Powell, Reinforcement Learning and Stochastic Optimization, NJ: John Wiley & Sons Inc., 2022.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] E. LeMay, M. D. Ford, K. Keefe, W. H. Sanders and C. Muehrcke, "Model-based Security Metrics using ADversary VIew Security Evaluation (ADVISE)," in Eighth International Conference on Quantitative Evaluation of SysTems, 2011.Google ScholarGoogle Scholar
  3. [3] G. Brockman, V. Cheung, L. Petterson, J. Schneider, J. Schulman, J. Tang and W. Zaremba, "OpenAI Gym," arXiv preprint arXiv:1606.01540, 2016.Google ScholarGoogle Scholar
  4. [4] Cherdantseva, B. P. Yulia, A. Blyth, P. Eden, K. Jones, H. Soulsby and K. Stoddart, "A review of cyber security risk assessment," Computers & Security, vol. 56, pp. 1-27, 2015.Google ScholarGoogle Scholar
  5. [5] A. Sood and R. J. Enbody, "Targeted Cyberattacks," Cyberwarfare, 2013.Google ScholarGoogle Scholar
  6. [6] E. LeMay, W. Unkenholz, D. Parks, C. Muehrcke, K. Keefe and W. H. Sanders, "Adversary-Driven State-Based System Security Evaluation," in 6th International Workshop on Security Measurements and Metrics, New York, 2010.Google ScholarGoogle Scholar
  7. [7] F. T. M. Mariotti, L. Montecchi and P. Lollini, "Extending a security ontology framework to model CAPEC attack paths and TAL adversary profiles," 2022Google ScholarGoogle Scholar
  8. [8] Y. Chen and J. L. C. Hong, "Modeling of Intrusion and Defense for Assessment of Cyber Security at Power Substations," IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 2541-2552, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] M. Rasouli and E. T. D. Miehling, "A Supervisory Control Approach to Dynamic Cyber-Security," in Decision and Game Theory for Security, 2014.Google ScholarGoogle Scholar
  10. [10] A. Ferdowsi, U. Challita, W. Saad and N. B. Mandayam, "Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems," in 21st International Conference on Intelligent Transportation Systems, 2018.Google ScholarGoogle Scholar
  11. [11] A. K. Nandi, H. R. Meda and S. Vadlamani, "Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model," Computers & Operations Research, pp. 118-131, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] R. Sutton and A. Barto, "Reinforcement Learning: An Introdutcion," The MIT Press, 2015.Google ScholarGoogle Scholar

Index Terms

  1. Modeling attacker behavior in Cyber-Physical-Systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            LADC '22: Proceedings of the 11th Latin-American Symposium on Dependable Computing
            November 2022
            167 pages
            ISBN:9781450397377
            DOI:10.1145/3569902

            Copyright © 2022 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 January 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format