Skip to main content

Cyber Epidemics: Modeling Attacker-Defender Dynamics in Critical Infrastructure Systems

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 501))

Abstract

Cyber warfare presents a major potential threat to critical infrastructures (CIs). Decision makers who want to develop resilient CIs must consider both strategic and operational aspects of CIs as well as nonlinear dynamics characterizing such cyber-physical systems. This paper combines System Dynamics (SD) with a game-theoretic approach to understand cyber epidemics dynamics of CI operations triggered by attacker and defender strategic interactions. We model attack-defense dynamics as a continuous game of timing to highlight that effectiveness of strategic moves strongly depends on when to act. We simulate scenarios of proactive and reactive defenses to demonstrate how our model supports cyber security policy optimization. This research builds on our previous work by extending a novel block building modeling framework for disruption impact analysis in networked CIs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Langner, R.: To Kill a Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve. Langner Group, Arlington (2013)

    Google Scholar 

  2. Spiegel Online: Anti-Virus Pioneer Evegeny Kaspersky: “I fear the net will become soon a war zone,” http://www.spiegel.de/international/world/anti-virus-pioneer-evgeny-kaspersky-i-fear-the-net-will-soon-become-a-war-zone-a-770191.html (2011)

  3. Canzani, E.: Modeling dynamics of disruptive events for impact analysis in networked critical infrastructures. In: Proceedings of 13th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2016, Rio de Janeiro, Brazil (2016)

    Google Scholar 

  4. Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45, 1–39 (2013)

    Article  MATH  Google Scholar 

  5. Ten, C., Manimaran, G.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man. Cybern. 40, 853–865 (2010)

    Article  Google Scholar 

  6. He, F., Zhuang, J., States, U.: Game-theoretic analysis of attack and defense in cyber-physical network infrastructures. In: Proceedings of Industrial and Systems Engineering Research Conference (2012)

    Google Scholar 

  7. Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. 47, 1–38 (2014)

    Article  Google Scholar 

  8. Van Dijk, M., Oprea, A., Rivest, R.L.: F L I P I T : The game of “ Stealthy Takeover.” J. Cryptol. 4, 655–713 (2013)

    Google Scholar 

  9. Bowers, K.D., Van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R.L., Triandopoulos, N.: Defending against the unknown enemy: applying FLIPIT to system security. In: Decision and Game Theory for Security. pp. 248–263. Springer, Berlin (2012)

    Google Scholar 

  10. Zhang, M., Zheng, Z., Shroff, N.B.: Stealthy attacks and observable defenses: a game theoretic model under strict resource constraints. Signal Information Processing (GlobalSIP), 2014 IEEE Global Conference on IEEE. pp. 813–817 (2014)

    Google Scholar 

  11. Sterman, J.D.: Business Dynamics: Systems Thinking and Modeling for a Complex World. Irwin/McGraw-Hill, New York (2000)

    Google Scholar 

  12. Singh, G., Baliya, S.: Detection of malicious traffic and checksum error in network using wireshark. Int. J. Sci. Res. Sci. Eng. Technol. 1, 356–359 (2015)

    Google Scholar 

Download references

Acknowledgments

Elisa Canzani PhD research is funded within the Marie Curie Research & Innovation Actions by the European Union FP7/2007-2013 under REA grant agreement n°_317382, NITIMesr.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elisa Canzani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Canzani, E., Pickl, S. (2016). Cyber Epidemics: Modeling Attacker-Defender Dynamics in Critical Infrastructure Systems. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41932-9_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41931-2

  • Online ISBN: 978-3-319-41932-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics