Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
The protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7898493/ |
_version_ | 1818641469696638976 |
---|---|
author | Stefan Rass Ali Alshawish Mohamed Amine Abid Stefan Schauer Quanyan Zhu Hermann De Meer |
author_facet | Stefan Rass Ali Alshawish Mohamed Amine Abid Stefan Schauer Quanyan Zhu Hermann De Meer |
author_sort | Stefan Rass |
collection | DOAJ |
description | The protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have proven to be a difficult but significant challenge for practitioners. This paper adopts a game-theoretic modeling of APTs and applies it to the (sub) problem of physical intrusion in an infrastructure. The gap between defining a good theoretical model and practically instantiating it is considered in particular. The model description serves to illustrate what is needed to put it into practice. The main contribution of this paper is the demonstration of how simulation, physical understanding of an infrastructure, and theoretical methods can be combined toward a practical solution to the physical intrusion avoidance problem. Numerical results are given to show how the physical intrusion game is being set up, and how the results obtained from its analysis can be interpreted and used for an optimized defense. |
first_indexed | 2024-12-16T23:27:40Z |
format | Article |
id | doaj.art-10bec882ee2f4c189c068917a1b51e09 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-16T23:27:40Z |
publishDate | 2017-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-10bec882ee2f4c189c068917a1b51e092022-12-21T22:11:57ZengIEEEIEEE Access2169-35362017-01-0158394840710.1109/ACCESS.2017.26934257898493Physical Intrusion Games—Optimizing Surveillance by Simulation and Game TheoryStefan Rass0https://orcid.org/0000-0003-2821-2489Ali Alshawish1Mohamed Amine Abid2Stefan Schauer3Quanyan Zhu4Hermann De Meer5System Security Group, University of Klagenfurt, Klagenfurt, AustriaComputer Networks and Computer Communications Group, Faculty of Computer Science, University of Passau, Passau, GermanyComputer Networks and Computer Communications Group, Faculty of Computer Science, University of Passau, Passau, GermanyCenter for Digital Safety and Security Security and Communication Technology Group, AIT Austrian Institute Of Technology Gmbh, Klagenfurt, AustriaDepartment of Electrical and Computer Engineering, New York University Tandon School of Engineering, Brooklyn, NY, USAComputer Networks and Computer Communications Group, Faculty of Computer Science, University of Passau, Passau, GermanyThe protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have proven to be a difficult but significant challenge for practitioners. This paper adopts a game-theoretic modeling of APTs and applies it to the (sub) problem of physical intrusion in an infrastructure. The gap between defining a good theoretical model and practically instantiating it is considered in particular. The model description serves to illustrate what is needed to put it into practice. The main contribution of this paper is the demonstration of how simulation, physical understanding of an infrastructure, and theoretical methods can be combined toward a practical solution to the physical intrusion avoidance problem. Numerical results are given to show how the physical intrusion game is being set up, and how the results obtained from its analysis can be interpreted and used for an optimized defense.https://ieeexplore.ieee.org/document/7898493/Securitysurveillancerisk analysisintrusion detection |
spellingShingle | Stefan Rass Ali Alshawish Mohamed Amine Abid Stefan Schauer Quanyan Zhu Hermann De Meer Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory IEEE Access Security surveillance risk analysis intrusion detection |
title | Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory |
title_full | Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory |
title_fullStr | Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory |
title_full_unstemmed | Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory |
title_short | Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory |
title_sort | physical intrusion games x2014 optimizing surveillance by simulation and game theory |
topic | Security surveillance risk analysis intrusion detection |
url | https://ieeexplore.ieee.org/document/7898493/ |
work_keys_str_mv | AT stefanrass physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory AT alialshawish physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory AT mohamedamineabid physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory AT stefanschauer physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory AT quanyanzhu physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory AT hermanndemeer physicalintrusiongamesx2014optimizingsurveillancebysimulationandgametheory |