scholarly journals Applying the Bayesian Stackelberg Active Deception Game for Securing Infrastructure Networks

Entropy ◽  
2019 ◽  
Vol 21 (9) ◽  
pp. 909 ◽  
Author(s):  
Chengyi Zeng ◽  
Baoan Ren ◽  
Hongfu Liu ◽  
Jing Chen

With new security threats cropping up every day, finding a real-time and smart protection strategy for critical infrastructure has become a big challenge. Game theory is suitable for solving this problem, for it provides a theoretical framework for analyzing the intelligent decisions from both attackers and defenders. However, existing methods are only based on complete information and only consider a single type of attacker, which is not always available in realistic situations. Furthermore, although infrastructure interconnection has been greatly improved, there is a lack of methods considering network characteristics. To overcome these limitations, we focus on the problem of infrastructure network protection under asymmetry information. We present a novel method to measure the performance of infrastructure from the network perspective. Moreover, we propose a false network construction method to simulate how the defender applies asymmetric information to defend against the attacker actively. Meanwhile, we consider multiple types of attackers and introduce the Bayesian Stackelberg game to build the model. Experiments in real infrastructure networks reveal that our approach can improve infrastructure protection performance. Our method gives a brand new way to approach the problem of infrastructure security defense.


Author(s):  
Hannah Lobban ◽  
Yasser Almoghathawi ◽  
Nazanin Morshedlou ◽  
Kash Barker

Critical infrastructure networks, including water, power, communication, and transportation, among others, are necessary to society’s functionality. In recent years, the threat of different types of disruptions to such infrastructure networks has become an increasingly important problem to address. Due to existing interdependencies, damage to a small area of one of the networks could have far-reaching effects on the ability to meet demand across the entire system. Common disruption scenarios include, among others, intentional malevolent attacks, natural disasters, and random failures. Similar works have focused on only one type of scenario, but combining a variety of disruptions may lead to more realistic results. Additionally, the concept of social vulnerability, which describes an area’s ability to prepare for and respond to a disruption, must be included. This should promote not only the protection of the most at-risk components but also ensure that socially vulnerable communities are given adequate resources. This work provides a decision making framework to determine the allocation of defensive resources that accounts for all these factors. Accordingly, we propose a multi-objective mathematical model with the objectives of: (i) minimizing the vulnerability of a system of interdependent infrastructure networks, and (ii) minimizing the total cost of the resource allocation strategy. Moreover, to account for uncertainty in the proposed model, this paper incorporates a means to address robustness in finding the most adaptable network protection plan to reduce the vulnerability of the system of interdependent networks to a variety of disruption scenarios. The proposed work is illustrated with an application to social vulnerability and interdependent power, gas, and water networks in Shelby County, Tennessee.



2020 ◽  
Vol 2 (1) ◽  
pp. 35-42
Author(s):  
Hemalatha R ◽  
Rhesa M.J. ◽  
Revathi S

The hest for technological advancement in mobile communication is due to augmentation of wireless user. The deployment of 5G mobile communication is less than 4G mobile communication due to challenges in security like cyberwarfare, espionage, critical infrastructure threats. Nevertheless, critic of neurological discomforts, tissue damage in living organisms occur in the existence of EMF radiation. Also, physical scarcity for spectral efficiency arises due to ubiquitous data traffic. Inspite of these disputes data rate, low latency, device to device communication is also a challenge. In this paper we provide a survey on radiation effects, security threats, traffic management.



2019 ◽  
Author(s):  
James Williams

This paper introduces a novel set of component importance measures that are based on the concept of critical flow. Various research communities have developed techniques for identifying critical components of networks. The methods in this paper extend previous work on flow-based centrality measures by adapting them to the assessment of critical infrastructure in urban systems. The motivation is to provide municipalities with a means of reasoning about the impact of urban interventions. An infrastructure system is represented as a flow network in which demand nodes are assigned both demand values and criticality ratings. Sensitive elements in the network are those that carry critical flows, where a flow is deemed critical to the extent that it satisfies critical demand. A method for computing these flows is presented, and its utility is demonstrated by comparing the new measures to existing flow centrality measures. The paper also shows how the method may be combined with standard approaches to reliability analysis.



Author(s):  
Г.С. Мокану

Угрозы информационной безопасности в компьютерных сетях стали одной из основных проблем для владельцев ПК. При этом особое распространение этих угроз коснулось сетей WI-FI, в которых происходит как несанкционированный доступ к данным, так и только снижение уровня защиты сети. Практически все современные мобильные устройства (смартфоны, планшеты, ноутбуки и нетбуки) имеют возможность подключения к беспроводному Интернету или, точнее, к сети WI-FI, эта функция теперь является стандартной для этих устройств. nformation security threats in computer networks have become one of the main problems for PC owners. At the same time, a particular spread of these threats affected WI-FI networks, in which both unauthorized access to data and only a decrease in the level of network protection occur. Almost all modern mobile devices (smartphones, tablets, laptops and netbooks) have the ability to connect to the wireless Internet or, more precisely, to the WI-FI network, this function is now standard for these devices.



2011 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Matthew Warren ◽  
Shona Leitch

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.



Author(s):  
Arif I. Sarwat ◽  
Aditya Sundararajan ◽  
Imtiaz Parvez ◽  
Masood Moghaddami ◽  
Amir Moghadasi


Author(s):  
Conrad Zorn ◽  
Raghav Pant ◽  
Scott Thacker ◽  
Asaad Y. Shamseldin

Abstract Critical infrastructure networks are geographically distributed systems spanning multiple scales. These networks are increasingly interdependent for normal operations, which causes localized asset failures from natural hazards or man-made interference to propagate across multiple networks, affecting those far removed from an initiating failure event. This paper provides methodology to identify such failure propagation effects by quantifying the spatial variability in magnitude, frequency, and disruptive reach of failures across national infrastructure networks. To achieve this, we present methodology to combine functionally interdependent infrastructure networks with geographic interdependencies by simulating complete asset failures across a national scale grid of spatially localized hazards. A range of metrics are introduced to compare the systemic vulnerabilities of infrastructure systems and the resulting spatial variability in both the potential for initiating widespread failures and the risk of being impacted by distant hazards. We demonstrate the approach through an application in New Zealand of infrastructures across the energy (electricity, petroleum supply), water and waste (water supply, wastewater, solid waste), telecommunications (mobile networks), and transportation sectors (passenger rail, ferry, air, and state highways). In addition to identifying nationally significant systemic vulnerabilities, we observe that nearly half (46%) of the total disruptions across the simulation set can be attributed to network propagation initiated asset failures. This highlights the importance in considering interdependencies when assessing infrastructure risks and prioritizing investment decisions for enhancing resilience of national networks.



Sign in / Sign up

Export Citation Format

Share Document