National critical infrastructures are vital to the functioning of modern societies and economies. The dependence on these infrastructures is so succinct that their incapacitation or destruction has a debilitating and cascading effect on national security. Critical infrastructure sectors ranging from financial services to power and transportation to communications and health care, all depend on massive information communication technology networks. Cyberspace is composed of numerous interconnected computers, servers and databases that hold critical data and allow critical infrastructures to function. Securing critical data in a cyberspace that holds against growing and evolving cyber threats is an important focus area for most countries across the world. A novel approach is proposed to assess the vulnerabilities of own networks against adversarial attackers, where the adversary's perception of strengths and vulnerabilities are modelled using game theoretic techniques. The proposed game theoretic framework models the uncertainties of information with the players (attackers and defenders) in terms of their information sets and their behaviour is modelled and assessed using a probability and belief function framework. The attack-defence scenarios are exercised on a virtual cyber warfare test-bed to assess and evaluate vulnerability of cyber systems. Optimal strategies for attack and defence are computed for the players which are validated using simulation experiments on the cyber war-games testbed, the results of which are used for security analyses.
The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructure model for military, terrestrial and atypical networks, which are characterised by transmission delay and intermittent network connections. The possibility of limited connectivity and resource scarcity in DTNs make them vulnerable to various cyber-attacks, including interference attacks such as jamming. We study the defence against jamming attacks in a delay tolerant network with two adversarial players -the jammer, and the transmitterreceiver pair in a game theoretic environment. The transmitters seek to choose an optimal time to schedule the transmission securely to maximise the probability of successful delivery before the session expires, while signal interferences from the jammer attempts to minimise this probability. We design strategies for the transmitters that offset transmission period based inference of network traffic by the jammer. We deduce a solution for this game, using a probability distribution function over finite number of strategies for both the players to compute their expected payoff. Using a simulation test-bed, we create several scenarios in which the players are considered to have perfect/imperfect information and compute the expected payoff and resulting equilibrium values. The cases of perfect /imperfect information of the players are further studied using entropy based measures. These results are used to strategically evaluate the optimal time for the players, and assess the efficiency of the strategies used by the transmitters against jammer attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.