咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Secure-by-synthesis network wi... 收藏
arXiv

Secure-by-synthesis network with active deception and temporal logic specifications

作     者:Fu, Jie Kulkarni, Abhishek N. Luo, Huan Leslie, Nandi O. Kamhoua, Charles A. 

作者机构:Dept. of Electrical and Computer Engineering Robotics Engineering Program Worcester Polytechnic Institute MA United States U.S. Army Research Laboratory MD United States 

出 版 物:《arXiv》 (arXiv)

年 卷 期:2020年

核心收录:

主  题:Temporal logic 

摘      要:This paper is concerned with the synthesis of strategies in network systems with active cyber deception. Active deception in a network employs decoy systems and other defenses to conduct defensive planning against the intrusion of malicious attackers who have been confirmed by sensing systems. In this setting, the defender s objective is to ensure the satisfaction of security properties specified in temporal logic formulas. We formulate the problem of deceptive planning with decoy systems and other defenses as a two-player games with asymmetrical information and Boolean payoffs in temporal logic. We use level-2 hypergame with temporal logic objectives to capture the incomplete/incorrect knowledge of the attacker about the network system as a payoff misperception. The true payoff function is private information of the defender. Then, we extend the solution concepts of ω-regular games to analyze the attacker s rational strategy given her incomplete information. By generalizing the solution of level-2 hypergame in the normal form to extensive form, we extend the solutions of games with safe temporal logic objectives to decide whether the defender can ensure security properties to be satisfied with probability one, given any possible strategy that is perceived to be rational by the attacker. Further, we use the solution of games with co-safe (reachability) temporal logic objectives to determine whether the defender can engage the attacker, by directing the attacker to a high-fidelity honeypot. The effectiveness of the proposed synthesis methods is illustrated with synthetic network systems with honeypots. Copyright © 2020, The Authors. All rights reserved.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分