Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework †
<p>A typical CPS network with three layers.</p> "> Figure 2
<p>An example of malware propagation in cyber-physical systems (CPS).</p> "> Figure 3
<p>A portion of the constructed graph in the reduction process.</p> "> Figure 4
<p>Performance of dynamic defense strategies on square-lattice networks (<math display="inline"><semantics> <mrow> <mo>|</mo> <mi>E</mi> <mo>|</mo> <mo>=</mo> <mn>563</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>d</mi> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>). (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 5
<p>Performance of dynamic defense strategies on Erd<math display="inline"><semantics> <mover accent="true"> <mi mathvariant="normal">o</mi> <mo>¨</mo> </mover> </semantics></math>s-Rényi (ER) networks (<math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <mover accent="true"> <mi>E</mi> <mo>¯</mo> </mover> <mrow> <mo>|</mo> <mo>=</mo> <mn>526</mn> </mrow> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>d</mi> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>). (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 6
<p>Performance of dynamic defense strategies on scale-free networks (<math display="inline"><semantics> <mrow> <mo>|</mo> <mi>E</mi> <mo>|</mo> <mo>=</mo> <mn>597</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>d</mi> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>). (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 7
<p>Performance of dynamic defense strategies on Italian coupled communication and power grid network (<math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>d</mi> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>). (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 8
<p>Performance of dynamic defense strategies on Italian coupled communication and power grid network (<math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>d</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>). (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 9
<p>Performance of dynamic defense strategies on Italian coupled communication and power grid network (<math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>d</mi> </msub> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>). (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 10
<p>Steady State of dynamic defense on square-lattice networks against various initial infected vertexes ratios. (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 11
<p>Steady state of dynamic defense on ER networks against various initial infected vertexes ratios. (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 12
<p>Steady state of dynamic defense on scale-free networks against various initial infected vertexes ratios. (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> "> Figure 13
<p>Steady state of dynamic defense on Italian coupled communication and power grid network against various initial infected vertexes ratios. (<b>a</b>) Security situation; (<b>b</b>) safety situation.</p> ">
Abstract
:1. Introduction
- 1)
- We propose the static shortest-path tree interdiction (SSPTI) game, model it as a bi-level integer program (BLIP), and prove its NP-hardness. A Benders decomposition algorithm (S-BD) is then developed to achieve its Stackelberg equilibrium.
- 2)
- We extend the SSPTI to a multi-stage dynamic shortest-path tree interdiction (DSPTI) game to support the of real-time decision-making in the persistent attack-and-defense process, and design a model predictive control (MPC) strategy for the defender. An approximation algorithm is proposed for the defender to achieve local optimality, thereby expanding the solvable scale of the problem.
- 3)
- The evaluation results demonstrate that the proposed approximation algorithm can enlarge the solvable scale of problems with an order of magnitude improvement (reporting an increase from less than 100 nodes to more than 3000 nodes) and reduce the resources consumption by .
- 4)
- The performance of proposed MPC strategy is better than existing strategies on both simulated and real-case-based CPS networks. A lower steady infection rate and a higher ratio of giant component can be achieved by MPC strategy simultaneously, which means it can help retard the spread of malwares and the cascade of devices failure at the same time.
2. Related Works
2.1. Security Countermeasures
2.2. Network Interdiction
3. Network Model and Stackelberg Game
3.1. Network Model
3.2. Stackelberg Game Model
3.2.1. Utility Function for Attacker and Defender
3.2.2. Functional Assurance Constraints
3.2.3. Static and Dynamic Version of the Game
4. Static Shortest-Path Tree Interdiction Game
4.1. Bi-Level Integer Program Formulation
- INPUT: A undirected graph ; , ; ; .
- OUTPUT: Yes, if there exists a set such that and the total length of the shortest-path tree from in is ; no, otherwise.
- INPUT: , for ; .
- OUTPUT: Yes, if there exists a set such that and ; no, otherwise.
4.2. Algorithm Design of SSPTI
Algorithm 1 S-BD: Benders Decompostion for SSPTI |
|
5. Dynamic Shortest-Path Tree Interdiction Game
5.1. Extending SSPTI to the Dynamic Game
- INPUT: A undirected graph ; , ; ; .
- OUTPUT: Yes, if there exists a sequence of subsets (for ) such that and the accumulated traversing length of the shortest-path tree from in for is ; no, otherwise.
5.2. A Model Predictive Control Strategy for DSPTI
- INPUT: A undirected graph ; , ; ; .
- OUTPUT: Yes, if there exists a set such that and the total length of the shortest-path tree from in is ; no, otherwise.
Algorithm 2 MPC-DSPTI: MPC Strategy for DSPTI |
|
6. Performance Evaluation
6.1. Defense Strategies
- 1)
- We propose the static shortest-path tree interdiction (SSPTI) game, model it as a bi-level integer p A fail-safe strategy (FSA): when a device is infected and detected during the unprotected exposure, it will be isolated from the CPS. Although its neighbors may have been infected, as well, no light-weight countermeasures will be taken on them such that fail-safe ability can be maintained as much as possible.
- 2)
- A fail-secure strategy (FSE): when a device is infected and detected during the unprotected exposure, the device itself and its neighbors will be isolated at the same time so as to avoid further infections deriving from possible infected neighbors. Hence, fail-secure ability is the first priority for the defender.
- 3)
- The MPC strategy (MPC): as mentioned in Section 5, when a device is infected and detected during the unprotected exposure, it will be isolated and then light-weight countermeasures will be allocated optimally to its neighbors by solving a LG-SSPTI problem. In fact, this strategy intends to achieve a balance between fail-safe ability and fail-secure ability in CPS defense.
6.2. Performance Metrics and Evaluation Settings
- 1)
- The achieved objective u under different static strategies. That is, the shortest-path three length which the attacker can achieved under the situation of defenders’ countermeasure implementation. The larger u the attacker gains, the more effectively the defender defends in the malware propagation. We mainly compare the achieved u of SSPTI and LG-SSPTI, and analyze the impact of on the actual approximate ratio.
- 2)
- The algorithm running time. We compare the running time of SSPTI and LG-SSPTI by changing the scale of the problem.
- 1)
- The speed and scale of malware propagation, which represents the security situation of the CPS during the defense process.
- 2)
- The size of giant component of the CPS during the defense process, which is a major indicator of safety situation for networked systems.
6.3. Evaluation Results of Static Strategies
6.3.1. Comparison of Achieved Objective u
6.3.2. Comparison of Algorithm Running Time
6.4. Evaluation Results of Dynamic Strategies
6.4.1. Performance on Generated Networks
6.4.2. Performance on Real CPS Cases
6.4.3. Discussion of Steady Infection State
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Xiao, K.; Zhu, C.; Xie, J.; Zhou, Y.; Zhu, X.; Zhang, W. Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems. In Proceedings of the IEEE INFOCOM, Honolulu, HI, USA, 15–19 April 2018; pp. 1790–1798. [Google Scholar]
- Gao, J.; Buldyrev, S.V.; Stanley, H.E.; Havlin, S. Networks formed from interdependent networks. Nat. Phys. 2012, 8, 40–48. [Google Scholar] [CrossRef] [Green Version]
- Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Wu, G.; Sun, J.; Chen, J. A survey on the security of cyber-physical systems. Control Theory Technol. 2016, 14, 2–10. [Google Scholar] [CrossRef]
- Singh, S.; Sharma, P.K.; Moon, S.Y.; Moon, D.; Park, J.H. A comprehensive study on apt attacks and countermeasures for future networks and communications: Challenges and solutions. J. Supercomput. 2016, 75, 1–32. [Google Scholar] [CrossRef]
- Chen, P.; Desmet, L.; Huygens, C. A study on advanced persistent threats. In IFIP International Conference on Communications and Multimedia Security; Springer: Amsterdam, The Netherlands, 2014; pp. 63–72. [Google Scholar]
- Lee, K.B.; Lim, J.I. The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd. KSII Trans. Internet Inf. Syst. 2016, 10, 857–880. [Google Scholar]
- Karnouskos, S. Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011—37th Annual Conference on IEEE Industrial Electronics Society; IEEE: Piscataway, NJ, USA, 2011; pp. 4490–4494. [Google Scholar]
- Bencsáth, B.; Pék, G.; Buttyán, L.; Felegyhazi, M. The cousins of stuxnet: Duqu, flame, and gauss. Fut. Internet 2012, 4, 971–1003. [Google Scholar] [CrossRef] [Green Version]
- Hu, P.; Li, H.; Fu, H.; Cansever, D.; Mohapatra, P. Dynamic defense strategy against advanced persistent threat with insiders. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 747–755. [Google Scholar]
- Ryan, J. Leading Issues in Information Warfare Research; Academic Conferences Limited: Oxford, UK, 2014; pp. 1–58. [Google Scholar]
- Rudd, E.M.; Rozsa, A.; Günther, M.; Boult, T.E. A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Commun. Surv. Tutor. 2017, 19, 1145–1172. [Google Scholar] [CrossRef]
- Li, M.; Huang, W.; Wang, Y.; Fan, W.; Li, J. The study of apt attack stage model. In Proceedings of the 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, Japan, 26–29 June 2016; pp. 1–5. [Google Scholar]
- Li, M.; Huang, W.; Wang, Y.; Fan, W.; Li, J. Optimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness. In IEEE Transactions on Parallel and Distributed Systems; IEEE: Piscataway, NJ, USA, 2012; Volume 23, pp. 1708–1720. [Google Scholar]
- Yau, D.K.; Lui, J.; Liang, F.; Yam, Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw. TON 2005, 13, 29–42. [Google Scholar] [CrossRef] [Green Version]
- Zhang, G.; Parashar, M. Cooperative detection and protection against network attacks using decentralized information sharing. Clust. Comput. 2010, 13, 67–86. [Google Scholar] [CrossRef]
- Sabaliauskaite, G.; Mathur, A.P. Aligning Cyber-Physical System Safety and Security; Springer: Cham, Switzerland, 2015; pp. 41–53. [Google Scholar]
- Chun, B.N.; Lee, J.; Weatherspoon, H. Netbait: A Distributed Worm Detection Service; Intel Research Berkeley Technical Report IRB-TR-03; Intel Corporation: Santa Clara, CA, USA, 2003; Volume 33. [Google Scholar]
- Yegneswaran, V.; Barford, P.; Jha, S. Global Intrusion Detection in the DOMINO Overlay System. Available online: https://minds.wisconsin.edu/handle/1793/60340 (accessed on 28 July 2020).
- Knowles, W.; Prince, D.; Hutchison, D.; Disso, J.F.P.; Jones, K. A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 2015, 9, 52–80. [Google Scholar] [CrossRef]
- Del Rey, A.M.A.; Encinas, H.; Vaquero, J.M.; Dios, A.Q.; Sánchez, G.R. A method for malware propagation in industrial critical infrastructures. Integr. Comput.-Aided Eng. 2016, 23, 255–268. [Google Scholar] [CrossRef]
- Zeng, C.; Ren, B.; Liu, H.; Chen, J. Applying the bayesian stackelberg active deception game for securing infrastructure networks. Entropy 2019, 21, 909. [Google Scholar] [CrossRef] [Green Version]
- Eshghi, S.; Khouzani, M.H.R.; Sarkar, S.; Venkatesh, S.S. Optimal patching in clustered malware epidemics. IEEE/ACM Trans. Netw. 2016, 24, 283–298. [Google Scholar] [CrossRef] [Green Version]
- Scaman, K.; Kalogeratos, A.; Vayatis, N. Suppressing epidemics in networks using priority planning. IEEE Trans. Netw. Sci. Eng. 2016, 3, 271–285. [Google Scholar] [CrossRef]
- Bloem, M.; Alpcan, T.; Başar, T. Optimal and robust epidemic response for multiple networks. Control Eng. Pract. 2009, 17, 525–533. [Google Scholar] [CrossRef]
- Paré, P.E.; Beck, C.L.; Nedić, A. Stability analysis and control of virus spread over time-varying networks. In Proceedings of the 2015 54th IEEE Conference on Decision and Control (CDC), Osaka, Japan, 15–18 December 2015; pp. 3554–3559. [Google Scholar]
- Pu, C.; Lim, S. A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Syst. J. 2016, 17, 834–842. [Google Scholar] [CrossRef]
- Mohammadi, R.; Javidan, R.; Conti, M. Slicots: An sdn-based lightweight countermeasure for tcp syn flooding attacks. IEEE Trans. Netw. Serv. Manag. 2017, 14, 487–497. [Google Scholar] [CrossRef]
- Shang, G.; Zhe, P.; Bin, X.; Aiqun, H.; Kui, R. FloodDefender: Protecting data and control plane resources under sdn-aimed dos attacks. In Proceedings of the 2017 IEEE Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
- Morton, D.P.; Pan, F.; Saeger, K.J. Models for nuclear smuggling interdiction. IIE Trans. 2007, 39, 3–14. [Google Scholar] [CrossRef]
- Powell, R. Defending against terrorist attacks with limited resources. Am. Pol. Sci. Rev. 2007, 101, 527–541. [Google Scholar] [CrossRef] [Green Version]
- Sadati, M.E.H.; Aksen, D.; Aras, N. The r-interdiction selective multi-depot vehicle routing problem. Int. Trans. Oper. Res. 2020, 27, 835–866. [Google Scholar] [CrossRef]
- Department, J.S. Deception Tactics for Network Interdiction: A Multiobjective Approach. Networks 2012, 60, 45–58. [Google Scholar]
- Fulkerson, D.R.; Harding, G.C. Maximizing the minimum source-sink path subject to a budget constraint. Math. Prog. 1977, 13, 116–118. [Google Scholar] [CrossRef]
- Israeli, E.; Wood, R.K. Shortest-path network interdiction. Networks 2002, 40, 97–111. [Google Scholar] [CrossRef]
- Bayrak, H.; Bailey, M.D. Shortest path network interdiction with asymmetric information. Networks 2008, 52, 133–140. [Google Scholar] [CrossRef]
- McCarter, M.; Barker, K.; Johansson, J.; Ramirez-Marquez, J.E. A bi-objective formulation for robust defense strategies in multi-commodity networks. Reliab. Eng. Syst. Saf. 2018, 176, 154–161. [Google Scholar] [CrossRef] [Green Version]
- Borrero, J.S.; Prokopyev, O.A.; Sauré, D. Sequential interdiction with incomplete information and learning. Oper. Res. 2019, 67, 72–89. [Google Scholar] [CrossRef]
- Xu, K.; Xiao, K.; Yin, Q.; Zha, Y.; Zhu, C. Bridging the gap between observation and decision-making: Goal recognition and flexible resource allocation in dynamic network interdiction. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17), Melbourne, Australia, 19–25 August 2017; pp. 4477–4483. [Google Scholar]
- Zhu, M.; Martinez, S. Stackelberg-game analysis of correlated attacks in cyber-physical systems. In Proceedings of the 2011 American Control Conference, San Francisco, CA, USA, 29 June–1 July 2011; pp. 4063–4068. [Google Scholar]
- Panaousis, E.; Fielder, A.; Malacaria, P.; Hankin, C.; Smeraldi, F. Cybersecurity Games and Investments: A Decision Support Approach. Decis. Game Theory Secur. 2014, 8840, 266–286. [Google Scholar]
- Nandi, A.K.; Medal, H.R.; Vadlamani, S. Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model. Comput. Oper. Res. 2016, 75, 118–131. [Google Scholar] [CrossRef]
- Durkota, K.; Lisý, V.; Kiekintveld, C.; Bošanský, B.; Pěchouček, M. Case studies of network defense with attack graph games. IEEE Intell. Syst. 2016, 31, 24–30. [Google Scholar] [CrossRef]
- Barbosa, R.R.; Sadre, R.; Pras, A. Difficulties in modeling SCADA traffic: A comparative analysis. In International Conference on Passive and Active Network Measurement; Springer: Berlin, Germany, 2012; Volume 7192, pp. 126–135. [Google Scholar]
- Barbosa, R.R.R. Anomaly Detection in Scada Systems: A Network Based Approach; University of Twente: Enschede, The Netherlands, 2014. [Google Scholar]
- Garey, M.R. Computers and intractability: A guide to the theory of np-completeness. Revista Da Escola De Enfermagem Da USP 1979, 44, 340. [Google Scholar]
- Smith, J.C.; Song, Y. A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 2020, 283, 797–811. [Google Scholar] [CrossRef]
- Narváez, P.; Siu, K.-Y.; Tzeng, H.-Y. New dynamic algorithms for shortest path tree computation. IEEE/ACM Trans. Netw. 2000, 8, 734–746. [Google Scholar] [CrossRef]
- Sefair, J.A.; Smith, J.C. Dynamic shortest-path interdiction. Networks 2016, 68, 315–330. [Google Scholar] [CrossRef]
- Lee, J.H. Model predictive control: Review of the three decades of development. Int. J. Control Autom. Syst. 2011, 9, 415–424. [Google Scholar] [CrossRef]
- Newman, M.E.J. The structure and function of complex networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef] [Green Version]
- Barabási, A.-L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [Green Version]
- Faloutsos, M.; Faloutsos, P.; Faloutsos, C. On power-law relationships of the internet topology. SIGCOMM Comput. Commun. Rev. 1999, 29, 251–262. [Google Scholar] [CrossRef]
- Onnela, J.-P.; Saramäki, J.; Hyvönen, J.; Szabó, G.; Lazer, D.; Kaski, K.; Kertész, J.; Barabási, A.-L. Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. USA 2007, 104, 7332–7336. [Google Scholar] [CrossRef] [Green Version]
- Colizza, V.; Barrat, A.; Barthelemy, M.; Vespignani, A. Prediction and predictability of global epidemics: The role of the airline transportation network. Proc. Natl. Acad. Sci. USA 2005, 103, 2015–2020. [Google Scholar] [CrossRef] [Green Version]
- Parandehgheibi, M.; Modiano, E. Robustness of interdependent networks: The case of communication networks and the power grid. In 2013 IEEE Global Communications Conference (GLOBECOM); IEEE: Piscataway, NJ, USA, 2013; pp. 2164–2169. [Google Scholar]
- Lofberg, J. Yalmip: A toolbox for modeling and optimization in matlab. In 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508); IEEE: Piscataway, NJ, USA, 2004; pp. 284–289. [Google Scholar]
Notations | Descriptions | |
---|---|---|
Sets | The set of players, i.e., a defender and an attacker | |
V | The set of devices (vertexes) in the CPS network G. where | |
E | The set of links in G. Each link , | |
Parameters | Cost for an attacker to propagate a malware through the link e. (vector form ) | |
Delay on link e if it is interdicted by the defender (vector form ) | ||
Safety loss of link e if it is interdicted by the defender (vector form ) | ||
R | Upper bound of total safety loss for the safe of the whole CPS | |
Individual upper bound of safety loss for the vertex i | ||
u | The utility function for game players | |
Decision variables | The defender’s decision variable (vector form ), where if the link e is interdicted; otherwise | |
The attacker’s decision variable (vector form ) if the link e is chosen to pass through; otherwise |
Network Type | SSPTI | LG-SSPTI | ||||||
---|---|---|---|---|---|---|---|---|
Square-lattice Networks | 0.2 | 520.17 | 151.08 | 64.70 | 479.60 | 137.83 | 8.45 | 1.08 |
0.4 | 561.65 | 102.14 | 66.25 | 496.84 | 83.61 | 9.40 | 1.13 | |
0.6 | 630.09 | 158.66 | 72.45 | 517.23 | 123.83 | 8.75 | 1.21 | |
0.8 | 654.76 | 125.12 | 73.80 | 513.53 | 97.92 | 10.15 | 1.28 | |
1.0 | 677.50 | 161.87 | 80.50 | 505.80 | 107.72 | 10.90 | 1.33 | |
Erds-Rényi Networks | 0.2 | 156.72 | 37.23 | 56.25 | 152.04 | 35.45 | 24.45 | 1.03 |
0.4 | 183.47 | 33.08 | 62.05 | 171.98 | 30.05 | 19.40 | 1.07 | |
0.6 | 190.27 | 35.14 | 72.15 | 172.89 | 29.71 | 23.75 | 1.10 | |
0.8 | 193.12 | 37.56 | 70.65 | 173.45 | 30.60 | 22.40 | 1.11 | |
1.0 | 201.55 | 32.77 | 74.40 | 178.20 | 28.59 | 24.10 | 1.13 | |
Scale-free Networks | 0.2 | 151.53 | 33.50 | 51.25 | 146.74 | 31.61 | 17.35 | 1.03 |
0.4 | 161.00 | 37.63 | 50.50 | 151.65 | 33.69 | 18.90 | 1.06 | |
0.6 | 165.66 | 43.22 | 60.05 | 153.19 | 37.19 | 21.55 | 1.08 | |
0.8 | 202.80 | 47.90 | 59.00 | 181.40 | 40.31 | 15.90 | 1.11 | |
1.0 | 191.80 | 33.92 | 61.05 | 173.10 | 29.01 | 19.95 | 1.11 |
Network Type | Problem | SSPTI | LG-SSPTI | |||||
---|---|---|---|---|---|---|---|---|
Square-lattice Networks | 50 | 85 | 15.64 | 8.43 | 12 | 2.80 | 0.84 | 3 |
100 | 171 | 36.61 | 15.12 | 21 | 5.19 | 2.14 | 4 | |
200 | 367 | [8] | – | – | 6.33 | 1.93 | 3 | |
400 | 742 | [0] | – | – | 13.52 | 5.97 | 3 | |
800 | 1534 | [0] | – | – | 27.08 | 10.41 | 3 | |
1600 | 3084 | [0] | – | – | 55.74 | 20.84 | 3 | |
3200 | 6268 | [0] | – | – | 235.25 | 47.77 | 3 | |
Erds-Rényi Networks | 50 | 178 | 36.43 | 20.25 | 30 | 4.68 | 1.61 | 6 |
100 | 368 | [4] | – | – | 27.68 | 20.68 | 15 | |
200 | 744 | [0] | – | – | 89.90 | 59.39 | 33 | |
400 | 1479 | [0] | – | – | 592.19 | 731.97 | 64 | |
800 | 2958 | [0] | – | – | [8] | – | – | |
1600 | 5944 | [0] | – | – | [5] | – | – | |
3200 | 11922 | [0] | – | – | [0] | – | – | |
Scale-free Networks | 50 | 144 | 202.82 | 430.48 | 56 | 12.54 | 10.73 | 12 |
100 | 294 | [1] | – | – | 25.04 | 33.98 | 14 | |
200 | 594 | [0] | – | – | 26.16 | 12.42 | 10 | |
400 | 1194 | [0] | – | – | 69.48 | 111.19 | 14 | |
800 | 2394 | [0] | – | – | 308.63 | 561.78 | 20 | |
1600 | 4794 | [0] | – | – | 483.07 | 341.00 | 12 | |
3200 | 9594 | [0] | – | – | [8] | – | – |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xiao, K.; Zhu, C.; Xie, J.; Zhou, Y.; Zhu, X.; Zhang, W. Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework. Entropy 2020, 22, 894. https://doi.org/10.3390/e22080894
Xiao K, Zhu C, Xie J, Zhou Y, Zhu X, Zhang W. Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework. Entropy. 2020; 22(8):894. https://doi.org/10.3390/e22080894
Chicago/Turabian StyleXiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, and Weiming Zhang. 2020. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework" Entropy 22, no. 8: 894. https://doi.org/10.3390/e22080894
APA StyleXiao, K., Zhu, C., Xie, J., Zhou, Y., Zhu, X., & Zhang, W. (2020). Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework. Entropy, 22(8), 894. https://doi.org/10.3390/e22080894