Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats

Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to nu...

Full description

Saved in:
Bibliographic Details
Published inDecision and Game Theory for Security pp. 289 - 308
Main Authors Pawlick, Jeffrey, Farhang, Sadegh, Zhu, Quanyan
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 2015
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319255932
9783319255934
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-25594-1_16

Cover

Abstract Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems.
AbstractList Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems.
Author Pawlick, Jeffrey
Zhu, Quanyan
Farhang, Sadegh
Author_xml – sequence: 1
  givenname: Jeffrey
  surname: Pawlick
  fullname: Pawlick, Jeffrey
  email: jpawlick@nyu.edu
  organization: Department of Electrical and Computer Engineering, Polytechnic School of Engineering, New York University, New York, USA
– sequence: 2
  givenname: Sadegh
  surname: Farhang
  fullname: Farhang, Sadegh
  email: farhang@nyu.edu
  organization: Department of Electrical and Computer Engineering, Polytechnic School of Engineering, New York University, New York, USA
– sequence: 3
  givenname: Quanyan
  surname: Zhu
  fullname: Zhu, Quanyan
  email: quanyan.zhu@nyu.edu
  organization: Department of Electrical and Computer Engineering, Polytechnic School of Engineering, New York University, New York, USA
BookMark eNpFkNFKw0AQRVetYFv7Bz7sD6zO7iTZrG8l2CoULFgfZdlkJ21qTEo2Cv17YxV8msudYbj3TNioaRti7EbCrQTQd0anAgVKI1Qcm0hIK5MzNsHBORlwzsYykVIgRubif4FqxMaAoITREV6xWQh7AJBxGoNMx-xtUVcH3u-IZ3X76e95dsypE-vdMVSFq_lLtW1cXTVbvnQfFHjVnI7XHQVqCuJtyef-yw3S8zV1oQo9NT3f7Dpyfbhml6WrA83-5pS9Lh422aNYPS-fsvlK7FUS9aJICydzQ8p7n4D3gBFqo3XqqUxLHOKCptgbnxeqjFSeF1KB1x6Ggi5CwilTv3_DoRuyUmfztn0PVoL9oWcHehbtgMSeYNkfevgNsrJgNw
ContentType Book Chapter
Copyright Springer International Publishing Switzerland 2015
Copyright_xml – notice: Springer International Publishing Switzerland 2015
DOI 10.1007/978-3-319-25594-1_16
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3319255940
9783319255941
EISSN 1611-3349
Editor Panaousis, Emmanouil
Theodorakopoulos, George
Khouzani, MHR
Editor_xml – sequence: 1
  givenname: MHR
  surname: Khouzani
  fullname: Khouzani, MHR
  email: arman.khouzani@qmul.ac.uk
– sequence: 2
  givenname: Emmanouil
  surname: Panaousis
  fullname: Panaousis, Emmanouil
  email: e.panaousis@brighton.ac.uk
– sequence: 3
  givenname: George
  surname: Theodorakopoulos
  fullname: Theodorakopoulos, George
  email: theodorakopoulosG@cardiff.ac.uk
EndPage 308
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-j264t-c8ca1b9e2ddd60dd034379778def8f300107e5d9dbc2f42bbc120d7d0559a43e3
ISBN 3319255932
9783319255934
ISSN 0302-9743
IngestDate Tue Jul 29 20:12:27 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-j264t-c8ca1b9e2ddd60dd034379778def8f300107e5d9dbc2f42bbc120d7d0559a43e3
PageCount 20
ParticipantIDs springer_books_10_1007_978_3_319_25594_1_16
PublicationCentury 2000
PublicationDate 2015
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings
PublicationTitle Decision and Game Theory for Security
PublicationYear 2015
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, United Kingdom
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, United Kingdom
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: CNB H 104.2, ETH Zürich, Zürich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology Madr, Chennai, India
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: Technical University of Dortmund, Dortmund, Germany
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: Los Angeles, USA
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of Berkeley, Berkeley, USA
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max Planck Institute for Informatic, Saarbrücken, Germany
SSID ssj0001585018
ssj0002792
Score 2.3271253
Snippet Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational...
SourceID springer
SourceType Publisher
StartPage 289
SubjectTerms Combine Game
Equilibrium Concept
Nash Equilibrium
Perfect Bayesian Equilibrium
Signaling Game
Title Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats
URI http://link.springer.com/10.1007/978-3-319-25594-1_16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9tAEF4c51J6SNukNH2xh96KgqRdPVzoIZi0IaQhJQ9CoYhd7SpxcOXgSJT2n_TfdmYfku3kklyEEUKPmc-zs9-8CPkw4jJXEkP_isuAY6RwpDIWKIYTKiWswAJ5yG9H6f4ZP7hILgaDfwtZS20jd8q_99aVPEarcA70ilWyD9Bsd1M4Ab9Bv3AEDcNxxfldplltLoubjmPo_6_il3Z19iZx8MSNpesjRL-nbma6q93qFCfmHWcslL7s6OEfVy2e_N6CufAQchOPppMb47COp7PWzIge_5F6Hhx7nZ9MLtG_R2oLk3B9LuWxKXUqDUux63MPMAUfoVY38P7owVonH-Wnbz8fuhDH0ayx9_FTKLxRWmQtomSFtfCs5Qrv2VNvS9tcBnYCtz6O9nTlXmDKYTNkraO21jvFnozM9kD1FtlOKHKLOzNNJO6uG4upIljWhU_jQVRE6RpZy3I-JOu7eweH5z19B9ussA9YhdiH0Qas7FthGZF_69g2euq_YqGE875H3gnKG1_n9Bl5ivUvFAtTQGjPyUDXL8iGlzt1ct8kPxEGFPRKDQw-0WUQ0A4E1ICATmpzsQcBnVXUg4D2IKAOBFvk7Mve6Xg_cMM6gmvwqZugzEsRyZGOlVJpqFTIsNNlluVKV3nFkHvIdKJGSpZxxWMpyygOVaZC-GzBmWYvybCe1foVoamMmQDjEsFCzUUSyUTHmRJVpEWewY57m3z08inw73db-N7bIM2CFSDNwkizQGm-ftDVb8iTHq5vybCZt_oduJ2NfO8g8B_B-np_
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Decision+and+Game+Theory+for+Security&rft.au=Pawlick%2C+Jeffrey&rft.au=Farhang%2C+Sadegh&rft.au=Zhu%2C+Quanyan&rft.atitle=Flip+the+Cloud%3A+Cyber-Physical+Signaling+Games+in+the+Presence+of+Advanced+Persistent+Threats&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2015-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319255934&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=289&rft.epage=308&rft_id=info:doi/10.1007%2F978-3-319-25594-1_16
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon