Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats
Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to nu...
Saved in:
Published in | Decision and Game Theory for Security pp. 289 - 308 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Cham
Springer International Publishing
2015
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 3319255932 9783319255934 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-319-25594-1_16 |
Cover
Abstract | Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems. |
---|---|
AbstractList | Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems. |
Author | Pawlick, Jeffrey Zhu, Quanyan Farhang, Sadegh |
Author_xml | – sequence: 1 givenname: Jeffrey surname: Pawlick fullname: Pawlick, Jeffrey email: jpawlick@nyu.edu organization: Department of Electrical and Computer Engineering, Polytechnic School of Engineering, New York University, New York, USA – sequence: 2 givenname: Sadegh surname: Farhang fullname: Farhang, Sadegh email: farhang@nyu.edu organization: Department of Electrical and Computer Engineering, Polytechnic School of Engineering, New York University, New York, USA – sequence: 3 givenname: Quanyan surname: Zhu fullname: Zhu, Quanyan email: quanyan.zhu@nyu.edu organization: Department of Electrical and Computer Engineering, Polytechnic School of Engineering, New York University, New York, USA |
BookMark | eNpFkNFKw0AQRVetYFv7Bz7sD6zO7iTZrG8l2CoULFgfZdlkJ21qTEo2Cv17YxV8msudYbj3TNioaRti7EbCrQTQd0anAgVKI1Qcm0hIK5MzNsHBORlwzsYykVIgRubif4FqxMaAoITREV6xWQh7AJBxGoNMx-xtUVcH3u-IZ3X76e95dsypE-vdMVSFq_lLtW1cXTVbvnQfFHjVnI7XHQVqCuJtyef-yw3S8zV1oQo9NT3f7Dpyfbhml6WrA83-5pS9Lh422aNYPS-fsvlK7FUS9aJICydzQ8p7n4D3gBFqo3XqqUxLHOKCptgbnxeqjFSeF1KB1x6Ggi5CwilTv3_DoRuyUmfztn0PVoL9oWcHehbtgMSeYNkfevgNsrJgNw |
ContentType | Book Chapter |
Copyright | Springer International Publishing Switzerland 2015 |
Copyright_xml | – notice: Springer International Publishing Switzerland 2015 |
DOI | 10.1007/978-3-319-25594-1_16 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 3319255940 9783319255941 |
EISSN | 1611-3349 |
Editor | Panaousis, Emmanouil Theodorakopoulos, George Khouzani, MHR |
Editor_xml | – sequence: 1 givenname: MHR surname: Khouzani fullname: Khouzani, MHR email: arman.khouzani@qmul.ac.uk – sequence: 2 givenname: Emmanouil surname: Panaousis fullname: Panaousis, Emmanouil email: e.panaousis@brighton.ac.uk – sequence: 3 givenname: George surname: Theodorakopoulos fullname: Theodorakopoulos, George email: theodorakopoulosG@cardiff.ac.uk |
EndPage | 308 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-j264t-c8ca1b9e2ddd60dd034379778def8f300107e5d9dbc2f42bbc120d7d0559a43e3 |
ISBN | 3319255932 9783319255934 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:12:27 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-j264t-c8ca1b9e2ddd60dd034379778def8f300107e5d9dbc2f42bbc120d7d0559a43e3 |
PageCount | 20 |
ParticipantIDs | springer_books_10_1007_978_3_319_25594_1_16 |
PublicationCentury | 2000 |
PublicationDate | 2015 |
PublicationDateYYYYMMDD | 2015-01-01 |
PublicationDate_xml | – year: 2015 text: 2015 |
PublicationDecade | 2010 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham |
PublicationSeriesSubtitle | Security and Cryptology |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings |
PublicationTitle | Decision and Game Theory for Security |
PublicationYear | 2015 |
Publisher | Springer International Publishing |
Publisher_xml | – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: CNB H 104.2, ETH Zürich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology Madr, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Technical University of Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of Berkeley, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatic, Saarbrücken, Germany |
SSID | ssj0001585018 ssj0002792 |
Score | 2.3271253 |
Snippet | Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational... |
SourceID | springer |
SourceType | Publisher |
StartPage | 289 |
SubjectTerms | Combine Game Equilibrium Concept Nash Equilibrium Perfect Bayesian Equilibrium Signaling Game |
Title | Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats |
URI | http://link.springer.com/10.1007/978-3-319-25594-1_16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9tAEF4c51J6SNukNH2xh96KgqRdPVzoIZi0IaQhJQ9CoYhd7SpxcOXgSJT2n_TfdmYfku3kklyEEUKPmc-zs9-8CPkw4jJXEkP_isuAY6RwpDIWKIYTKiWswAJ5yG9H6f4ZP7hILgaDfwtZS20jd8q_99aVPEarcA70ilWyD9Bsd1M4Ab9Bv3AEDcNxxfldplltLoubjmPo_6_il3Z19iZx8MSNpesjRL-nbma6q93qFCfmHWcslL7s6OEfVy2e_N6CufAQchOPppMb47COp7PWzIge_5F6Hhx7nZ9MLtG_R2oLk3B9LuWxKXUqDUux63MPMAUfoVY38P7owVonH-Wnbz8fuhDH0ayx9_FTKLxRWmQtomSFtfCs5Qrv2VNvS9tcBnYCtz6O9nTlXmDKYTNkraO21jvFnozM9kD1FtlOKHKLOzNNJO6uG4upIljWhU_jQVRE6RpZy3I-JOu7eweH5z19B9ussA9YhdiH0Qas7FthGZF_69g2euq_YqGE875H3gnKG1_n9Bl5ivUvFAtTQGjPyUDXL8iGlzt1ct8kPxEGFPRKDQw-0WUQ0A4E1ICATmpzsQcBnVXUg4D2IKAOBFvk7Mve6Xg_cMM6gmvwqZugzEsRyZGOlVJpqFTIsNNlluVKV3nFkHvIdKJGSpZxxWMpyygOVaZC-GzBmWYvybCe1foVoamMmQDjEsFCzUUSyUTHmRJVpEWewY57m3z08inw73db-N7bIM2CFSDNwkizQGm-ftDVb8iTHq5vybCZt_oduJ2NfO8g8B_B-np_ |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Decision+and+Game+Theory+for+Security&rft.au=Pawlick%2C+Jeffrey&rft.au=Farhang%2C+Sadegh&rft.au=Zhu%2C+Quanyan&rft.atitle=Flip+the+Cloud%3A+Cyber-Physical+Signaling+Games+in+the+Presence+of+Advanced+Persistent+Threats&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2015-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319255934&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=289&rft.epage=308&rft_id=info:doi/10.1007%2F978-3-319-25594-1_16 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |