Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory

The protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have...

Full description

Bibliographic Details
Main Authors: Stefan Rass, Ali Alshawish, Mohamed Amine Abid, Stefan Schauer, Quanyan Zhu, Hermann De Meer
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7898493/
_version_ 1818641469696638976
author Stefan Rass
Ali Alshawish
Mohamed Amine Abid
Stefan Schauer
Quanyan Zhu
Hermann De Meer
author_facet Stefan Rass
Ali Alshawish
Mohamed Amine Abid
Stefan Schauer
Quanyan Zhu
Hermann De Meer
author_sort Stefan Rass
collection DOAJ
description The protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have proven to be a difficult but significant challenge for practitioners. This paper adopts a game-theoretic modeling of APTs and applies it to the (sub) problem of physical intrusion in an infrastructure. The gap between defining a good theoretical model and practically instantiating it is considered in particular. The model description serves to illustrate what is needed to put it into practice. The main contribution of this paper is the demonstration of how simulation, physical understanding of an infrastructure, and theoretical methods can be combined toward a practical solution to the physical intrusion avoidance problem. Numerical results are given to show how the physical intrusion game is being set up, and how the results obtained from its analysis can be interpreted and used for an optimized defense.
first_indexed 2024-12-16T23:27:40Z
format Article
id doaj.art-10bec882ee2f4c189c068917a1b51e09
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-16T23:27:40Z
publishDate 2017-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-10bec882ee2f4c189c068917a1b51e092022-12-21T22:11:57ZengIEEEIEEE Access2169-35362017-01-0158394840710.1109/ACCESS.2017.26934257898493Physical Intrusion Games—Optimizing Surveillance by Simulation and Game TheoryStefan Rass0https://orcid.org/0000-0003-2821-2489Ali Alshawish1Mohamed Amine Abid2Stefan Schauer3Quanyan Zhu4Hermann De Meer5System Security Group, University of Klagenfurt, Klagenfurt, AustriaComputer Networks and Computer Communications Group, Faculty of Computer Science, University of Passau, Passau, GermanyComputer Networks and Computer Communications Group, Faculty of Computer Science, University of Passau, Passau, GermanyCenter for Digital Safety and Security Security and Communication Technology Group, AIT Austrian Institute Of Technology Gmbh, Klagenfurt, AustriaDepartment of Electrical and Computer Engineering, New York University Tandon School of Engineering, Brooklyn, NY, USAComputer Networks and Computer Communications Group, Faculty of Computer Science, University of Passau, Passau, GermanyThe protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have proven to be a difficult but significant challenge for practitioners. This paper adopts a game-theoretic modeling of APTs and applies it to the (sub) problem of physical intrusion in an infrastructure. The gap between defining a good theoretical model and practically instantiating it is considered in particular. The model description serves to illustrate what is needed to put it into practice. The main contribution of this paper is the demonstration of how simulation, physical understanding of an infrastructure, and theoretical methods can be combined toward a practical solution to the physical intrusion avoidance problem. Numerical results are given to show how the physical intrusion game is being set up, and how the results obtained from its analysis can be interpreted and used for an optimized defense.https://ieeexplore.ieee.org/document/7898493/Securitysurveillancerisk analysisintrusion detection
spellingShingle Stefan Rass
Ali Alshawish
Mohamed Amine Abid
Stefan Schauer
Quanyan Zhu
Hermann De Meer
Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
IEEE Access
Security
surveillance
risk analysis
intrusion detection
title Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
title_full Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
title_fullStr Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
title_full_unstemmed Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
title_short Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
title_sort physical intrusion games x2014 optimizing surveillance by simulation and game theory
topic Security
surveillance
risk analysis
intrusion detection
url https://ieeexplore.ieee.org/document/7898493/
work_keys_str_mv AT stefanrass physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory
AT alialshawish physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory
AT mohamedamineabid physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory
AT stefanschauer physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory
AT quanyanzhu physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory
AT hermanndemeer physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory