A Bayesian Nash Equilibrium-Based Moving Target Defense Against Stealthy Sensor Attacks


Creative Commons License

Umsonst D., Sartas S., Dan G., Sandberg H.

IEEE Transactions on Automatic Control, vol.69, no.3, pp.1659-1674, 2024 (SCI-Expanded) identifier identifier

  • Publication Type: Article / Article
  • Volume: 69 Issue: 3
  • Publication Date: 2024
  • Doi Number: 10.1109/tac.2023.3328754
  • Journal Name: IEEE Transactions on Automatic Control
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Academic Search Premier, Aerospace Database, Applied Science & Technology Source, Business Source Elite, Business Source Premier, Communication Abstracts, Compendex, Computer & Applied Sciences, INSPEC, MathSciNet, Metadex, zbMATH, Civil Engineering Abstracts
  • Page Numbers: pp.1659-1674
  • Keywords: Bayesian games, cyber-physical security, detection threshold, false data injection attacks, game theory, moving target defense (MTD), optimal control, optimization
  • Middle East Technical University Affiliated: Yes

Abstract

We present a moving target defense strategy to reduce the impact of stealthy sensor attacks on feedback systems. The defender periodically and randomly switches between thresholds from a discrete set to increase the uncertainty for the attacker and make stealthy attacks detectable. However, the defender does not know the exact goal of the attacker but only the prior of the possible attacker goals. Here, we model one period with a constant threshold as a Bayesian game and use the Bayesian Nash equilibrium concept to find the distribution for the choice of the threshold in that period, which takes the defender's uncertainty about the attacker into account. To obtain the equilibrium distribution, the defender minimizes its cost consisting of the cost for false alarms and the cost induced by the attack. We present a necessary and sufficient condition for the existence of a moving target defense and formulate a linear program to determine the moving target defense. Furthermore, we present a closed-form solution for the special case when the defender knows the attacker's goals. The results are numerically evaluated on a four-tank process.