Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories (2404.01205v2)
Abstract: Cyber resilience is a complementary concept to cybersecurity, focusing on the preparation, response, and recovery from cyber threats that are challenging to prevent. Organizations increasingly face such threats in an evolving cyber threat landscape. Understanding and establishing foundations for cyber resilience provide a quantitative and systematic approach to cyber risk assessment, mitigation policy evaluation, and risk-informed defense design. A systems-scientific view toward cyber risks provides holistic and system-level solutions. This chapter starts with a systemic view toward cyber risks and presents the confluence of game theory, control theory, and learning theories, which are three major pillars for the design of cyber resilience mechanisms to counteract increasingly sophisticated and evolving threats in our networks and organizations. Game and control theoretic methods provide a set of modeling frameworks to capture the strategic and dynamic interactions between defenders and attackers. Control and learning frameworks together provide a feedback-driven mechanism that enables autonomous and adaptive responses to threats. Game and learning frameworks offer a data-driven approach to proactively reason about adversarial behaviors and resilient strategies. The confluence of the three lays the theoretical foundations for the analysis and design of cyber resilience. This chapter presents various theoretical paradigms, including dynamic asymmetric games, moving horizon control, conjectural learning, and meta-learning, as recent advances at the intersection. This chapter concludes with future directions and discussions of the role of neurosymbolic learning and the synergy between foundation models and game models in cyber resilience.
- Measuring systemic risk. The review of financial studies, 30(1):2–47, 2017.
- R. Aumann and A. Brandenburger. Epistemic conditions for nash equilibrium. Econometrica: Journal of the Econometric Society, pages 1161–1180, 1995.
- R. J. Aumann. Subjectivity and correlation in randomized strategies. Journal of mathematical Economics, 1(1):67–96, 1974.
- R. J. Aumann. Agreeing to disagree. The Annals of Statistics, 4(6):1236–1239, 1976.
- R. J. Aumann and A. Heifetz. Incomplete information. Handbook of game theory with economic applications, 3:1665–1686, 2002.
- T. Bodström and T. Hämäläinen. A novel method for detecting apt attacks by using ooda loop and black swan theory. In Computational Data and Social Networks: 7th International Conference, CSoNet 2018, Shanghai, China, December 18–20, 2018, Proceedings 7, pages 498–509. Springer, 2018.
- T. Börgers. An introduction to the theory of mechanism design. Oxford University Press, USA, 2015.
- Compliance signaling games: toward modeling the deterrence of insider threats. Computational and Mathematical Organization Theory, 22:318–349, 2016.
- J. Chen and Q. Zhu. A game-and decision-theoretic approach to resilient interdependent network analysis and design. Springer, 2019.
- J. Chen and Q. Zhu. Interdependent strategic security risk management with bounded rationality in the internet of things. IEEE Transactions on Information Forensics and Security, 14(11):2958–2971, 2019.
- S. Fang and Q. Zhu. Fundamental limits of obfuscation for linear gaussian dynamical systems: An information-theoretic approach. In 2021 American Control Conference (ACC), pages 4574–4579. IEEE, 2021.
- S. Fang and Q. Zhu. Fundamental stealthiness–distortion trade-offs in cyber-physical systems. In Security and Resilience in Cyber-Physical Systems: Detection, Estimation and Control, pages 37–60. Springer, 2022.
- J. Farooq and Q. Zhu. Resource management for on-demand mission-critical internet of things applications. John Wiley & Sons, 2021.
- M. J. Farooq and Q. Zhu. Secure and reconfigurable network design for critical information dissemination in the internet of battlefield things (iobt). In 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pages 1–8. IEEE, 2017.
- M. J. Farooq and Q. Zhu. Adaptive and resilient revenue maximizing dynamic resource allocation and pricing for cloud-enabled iot systems. In 2018 Annual American Control Conference (ACC), pages 5292–5297. IEEE, 2018.
- M. J. Farooq and Q. Zhu. A multi-layer feedback system approach to resilient connectivity of remotely deployed mobile internet of things. IEEE Transactions on Cognitive Communications and Networking, 4(2):422–432, 2018.
- M. J. Farooq and Q. Zhu. On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (iobt). IEEE Transactions on Wireless Communications, 17(4):2618–2632, 2018.
- M. J. Farooq and Q. Zhu. Modeling, analysis, and mitigation of dynamic botnet formation in wireless iot networks. IEEE Transactions on Information Forensics and Security, 14(9):2412–2426, 2019.
- Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: A Meta-Learning Approach. IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 00:1–6, 2023.
- Y. Ge and Q. Zhu. Mufaza: Multi-source fast and autonomous zero-trust authentication for 5g networks. In MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), pages 571–576. IEEE, 2022.
- Y. Ge and Q. Zhu. Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks. IEEE Transactions on Information Forensics and Security, 2023.
- Y. Ge and Q. Zhu. Zero trust for cyber resilience. arXiv preprint arXiv:2312.02882, 2023.
- J. C. Harsanyi. Games with incomplete information played by “bayesian” players, i–iii part i. the basic model. Management science, 14(3):159–182, 1967.
- Manipulating adversary’s belief: A dynamic game approach to deception by design for proactive network security. In Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings, pages 273–294. Springer, 2017.
- Y. Hu and Q. Zhu. Evasion-aware neyman-pearson detectors: A game-theoretic approach. In 2022 IEEE 61st Conference on Decision and Control (CDC), pages 6111–6117. IEEE, 2022.
- Y. Hu and Q. Zhu. Detection in human-sensor systems under quantum prospect theory using bayesian persuasion frameworks. In 2023 IEEE Statistical Signal Processing Workshop (SSP), pages 36–40. IEEE, 2023.
- Y. Hu and Q. Zhu. Game of travesty: Decoy-based psychological cyber deception for proactive human agents. arXiv preprint arXiv:2309.13403, 2023.
- A large-scale markov game approach to dynamic protection of interdependent infrastructure networks. In International Conference on Decision and Game Theory for Security, pages 357–376. Springer, 2017.
- Distributed and optimal resilient planning of large-scale interdependent critical infrastructures. In 2018 winter simulation conference (WSC), pages 1096–1107. IEEE, 2018.
- L. Huang and Q. Zhu. A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems. Computers & Security, 89:101660, 2020.
- L. Huang and Q. Zhu. Duplicity games for deception design with an application to insider threat mitigation. IEEE Transactions on Information Forensics and Security, 16:4843–4856, 2021.
- Reinforcement learning for feedback-enabled cyber resilience. Annual reviews in control, 53:273–295, 2022.
- Cyber deception. Cham, Switzerland: Springer, 2016.
- IoT supply chain security risk analysis and mitigation: Modeling, computations, and software tools. Springer Nature, 2022.
- Conjectural online learning with first-order beliefs in asymmetric information stochastic games. arXiv preprint arXiv:2402.18781, 2024.
- Self-Adaptive Driving in Nonstationary Environments through Conjectural Online Lookahead Adaptation. 2023 IEEE International Conference on Robotics and Automation (ICRA), 00:7205–7211, 2023.
- Decision-dominant strategic defense against lateral movement for 5g zero-trust multi-domain networks. arXiv preprint arXiv:2310.01675, 2023.
- Blackwell Online Learning for Markov Decision Processes. 2021 55th Annual Conference on Information Sciences and Systems (CISS), 00:1–6, 2021.
- The Confluence of Networks, Games, and Learning a Game-Theoretic Framework for Multiagent Decision Making Over Networks. IEEE Control Systems, 42(4):35–67, 2022.
- T. Li and Q. Zhu. Symbiotic game and foundation models for cyber deception operations in strategic cyber warfare. arXiv preprint arXiv:2403.10570, 2024.
- Herd behaviors in epidemics: A dynamics-coupled evolutionary games approach. Dynamic Games and Applications, 12(1):183–213, 2022.
- S. Liu and Q. Zhu. Stackelberg risk preference design. arXiv preprint arXiv:2206.12938, 2022.
- S. Liu and Q. Zhu. Cyber insurance for cyber resilience. arXiv preprint arXiv:2312.02921, 2023.
- Dependable demand response management in the smart grid: A stackelberg game approach. IEEE Transactions on Smart Grid, 4(1):120–132, 2013.
- Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3):1–39, 2013.
- To trust or not: A security signaling game between service provider and client. In Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings 6, pages 322–333. Springer, 2015.
- R. B. Myerson. Mechanism design. Springer, 1989.
- A First Order Meta Stackelberg Method for Robust Federated Learning. In Adversarial Machine Learning Frontiers Workshop at 40th International Conference on Machine Learning, 6 2023.
- Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study. 2023 62nd IEEE Conference on Decision and Control (CDC), 00:8328–8333, 2023.
- On the Resilience of Traffic Networks under Non-Equilibrium Learning. 2023 American Control Conference (ACC), 00:3484–3489, 2023.
- Modeling and analysis of leaky deception using signaling games with evidence. IEEE Transactions on Information Forensics and Security, 14(7):1871–1886, 2018.
- A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Computing Surveys (CSUR), 52(4):1–28, 2019.
- Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats. In Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings 6, pages 289–308. Springer, 2015.
- J. Pawlick and Q. Zhu. A stackelberg game perspective on the conflict between machine learning and data obfuscation. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1–6. IEEE, 2016.
- J. Pawlick and Q. Zhu. Proactive defense against physical denial of service attacks using poisson signaling games. In International Conference on Decision and Game Theory for Security, pages 336–356. Springer, 2017.
- J. Pawlick and Q. Zhu. Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control. IEEE Transactions on Information Forensics and Security, 12(12):2906–2919, 2017.
- Game theory for cyber deception. Springer, 2021.
- G. Peng and Q. Zhu. Game-theoretic analysis of optimal control and sampling for linear stochastic systems. In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 647–654. IEEE, 2019.
- A receding-horizon mdp approach for performance evaluation of moving target defense in networks. In 2020 IEEE Conference on Control Technology and Applications (CCTA), pages 1–7. IEEE, 2020.
- Cyber-security in critical infrastructures, volume 297. Springer, 2020.
- Bounded rationality. Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach, pages 99–114, 2020.
- Exploiting bounded rationality in risk-based cyber camouflage games. In Decision and Game Theory for Security: 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings 11, pages 103–124. Springer, 2020.
- Reference architecture for holonic manufacturing systems: Prosa. Computers in industry, 37(3):255–274, 1998.
- Z. Xu and Q. Zhu. A cyber-physical game framework for secure and resilient multi-agent autonomous systems. In 2015 54th IEEE Conference on Decision and Control (CDC), pages 5156–5161. IEEE, 2015.
- R. Zager and J. Zager. Ooda loops in cyberspace: A new cyber-defense model. J. Article, 21(12), 2017.
- R. Zhang and Q. Zhu. FlipIn: A game-theoretic cyber insurance framework for incentive-compatible cyber risk management of internet of things. IEEE Transactions on Information Forensics and Security, 15:2026–2041, 2019.
- R. Zhang and Q. Zhu. Optimal cyber-insurance contract design for dynamic risk management and mitigation. IEEE Transactions on Computational Social Systems, 9(4):1087–1100, 2021.
- A bi-level game approach to attack-aware cyber insurance of computer networks. IEEE Journal on Selected Areas in Communications, 35(3):779–794, 2017.
- Game-theoretic analysis of cyber deception: Evidence-based strategies and dynamic risk mitigation. Modeling and Design of secure Internet of Things, pages 27–58, 2020.
- T. Zhang and Q. Zhu. Hypothesis testing game for cyber deception. In Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings 9, pages 540–555. Springer, 2018.
- Q. Zhu. Cyber insurance. arXiv preprint arXiv:1810.00290, 2018.
- Q. Zhu and T. Başar. Dynamic policy-based ids configuration. In Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, pages 8600–8605. IEEE, 2009.
- Q. Zhu and H. Ishii. Introduction to the special section on learning and security for multi-agent systems. Annual Reviews in Control, 53:249–251, 2022.
- Q. Zhu and S. Rass. Game theory meets network security: A tutorial. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pages 2163–2165, 2018.
- Q. Zhu and S. Rass. On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access, 6:13958–13971, 2018.
- Network security configurations: A nonzero-sum stochastic game approach. In Proceedings of the 2010 American control conference, pages 1059–1064. IEEE, 2010.
- Distributed strategic learning with application to network security. In Proceedings of the 2011 American control conference, pages 4057–4062. IEEE, 2011.
- Hybrid learning in stochastic games and its application in network security. Reinforcement Learning and Approximate Dynamic Programming for Feedback Control, pages 303–329, 2012.
- Q. Zhu and Z. Xu. Cross-layer design for secure and resilient cyber-physical systems. Springer, 2020.
- Conceptual modeling framework to integrate resilient and interdependent infrastructure in extreme weather. Journal of Infrastructure Systems, 23(4):04017034, 2017.
- Promoting resilience for food, energy, and water interdependencies. Journal of Environmental Studies and Sciences, 6:50–61, 2016.