Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Cyber War Game in Temporal Networks

  • Jin-Hee Cho,

    Affiliation Computational and Information Sciences Directorate, U.S. Army Research Laboratory, Adelphi, MD 20783, United States of America

  • Jianxi Gao

    jianxi.gao@gmail.com

    Affiliation Center for Complex Network Research and Department of Physics, Northeastern University, Boston, Massachusetts 02115, United States of America

Abstract

In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i.e., winning system state) with minimum resource consumption. However, due to the dynamics of a network caused by a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-complete. We propose two heuristic strategies in a greedy manner based on a node’s two characteristics: resource level and influence based on k-hop reachability. We analyze complexity and optimality of each algorithm compared to optimal solutions for a small-scale static network. Further, we conduct a comprehensive experimental study for a large-scale temporal network to investigate best strategies, given a different environmental setting of network temporality and density. We demonstrate the performance of each strategy under various scenarios of attacker/defender strategies in terms of win probability, resource consumption, and system vulnerability.

Introduction

Many natural and man-made systems can be modeled as complex networks consisting of nodes and links representing the interactions between nodes [1, 2]. One of the most important property of a network is robustness against random failures and target attacks [37], measured by the giant connected component size after perturbations. The percolation threshold is the fraction of non-removed nodes (or links) leading to the collapse of the network [1, 4], which is often predicted by using percolation theory, a method from statistical physics [1, 8]. Increasing evidence shows that networks interact to each other, resulting in a new research area on interdependent networks [9, 10], interconnected networks [11], multiplex [12], multilayer networks [13], and a network of networks [14, 15]. Indeed, these systems can not only model interactions between different networks, but also consider a temporal network [16] in which a network topology changes over time. Understanding vulnerability of these systems helps design interdependent robust infrastructures.

Unlike engineering systems, vulnerability of temporal, mobile networks can be modeled as the cyber games where the attackers intend to compromise users and and the defenders will recover the compromised users to healthy state under the nodes’ resource restriction such as battery life, computational power, and/or the network’s limited bandwidth [17]. Furthermore, an entity often requires decision making based on local information in a fully distributed way and aims to take optimal strategies to maximize resource efficiency (e.g., complete a task with minimum effort) when achieving respective goals. For instance, an attacker compromises more healthy nodes to disrupt a system while a defender recovers compromised nodes to secure the system. Although many existing approaches consider cyber war games by proposing optimal strategies of attackers and defenders [1720], they do not consider optimal strategies with minimum resource consumption in temporal networks.

An attacker-defender cyber game has been explored with various approaches such as game theory [18] or cognitive theory [20]. Zhu and Martinez [18] model a cyber game using a two-level Stackelberg game (leader-follower) to consider a node’s inherent resource constraints in discrete-time, linear time-invariant networks. Recently, Ben-Asher and Gonzalez [20] propose a decision making framework using an instance-based learning technique considering dynamics of a cyber war where multiple attackers and defenders play to maximize their utility. In distributed cyberspaces, however, a network suffers from resource constraints and faces high dynamics under varying network temporality and density. In this work, we question a fundamental problem: how does the network temporality affect the performance of attackers or defenders in a cyber war game under resource-constrained, distributed network environments?

To answer this question, we aim to identify optimal strategies of attackers or defenders that allow a winning in a cyber game with minimum resource consumption in a time-varying, distributed network. In this environment, each node has a limited resource and its resource level is updated over time or upon taking actions. Due to the distributed nature of a network, a node may use local information to make decisions and often can take actions towards its adjacent nodes. That is, attackers or defenders may select a node to compromise or recover among their adjacent nodes, respectively. Considering these challenges derived from the unique characteristics of a given network environment, this optimization problem is not solvable in a polynomial time and known as a NP-complete problem. This work has the following unique contributions:

  1. We consider resource efficiency of cyber strategies taken by attackers or defenders in a resource-constrained, distributed network environment where each attacker or defender can make a decision based on local information without the knowledge of global network (e.g., network topology) and node information (e.g., remaining energy).
  2. We consider a time-varying network such as structural and state dynamics and study how they affect the optimal strategies. Structural dynamic refers to network topology changes that may be caused by node mobility or failure or terrains while state dynamic means resource depletion over time or upon action(s). To consider structural dynamics, we introduce a new influence metric called k-hop influence based on the concept of k-hop reachability. For state dynamics, we consider dynamic adjustment of each node’s status. Both dynamics affect decisions by attackers or defenders to reach their respective system goal state.
  3. We conduct comprehensive performance analysis of the proposed strategies by attackers or defenders which studies the impact of network temporality and density on our performance metrics such as a win probability, minimum resource consumption, and system vulnerability.

System Model

In this section, we explain our network model, node model, and system failure condition considered in this work.

Network Model

We consider a temporal network whose topology changes over time. In our model, at an initial time we generate a random arbitrary network using a given degree distribution. Every time step we randomly select p fraction of link and rewire the nodes between these links randomly. When p = 0, the network is static; when p = 1, we generate a new random network independent from the previous step. In addition, nodes’ resource level depletes with more actions and over time. Given a network with a directed graph at time step t, is a set of vertices, representing nodes (or entities) and is a set of edges, representing connectivity between two vertices. Depending on the existence of an edge between two nodes, i and j, the weight wij(t) can be in , i.e., .

A given network environment is characterized by: (1) it is highly distributed where each node can communicate with or take an action towards its adjacent node(s); (2) it is severely resource-constrained where a node may drain its resource (i.e., battery life or reliability) over time to maintain normal operations even without interacting with other nodes or may consume resource when it takes an action towards any adjacent node; and (3) it is time-varying, dynamic in terms of network temporality (i.e., changing network topology) and remaining resource level of nodes.

We use epidemic spreading based on susceptible-infected-removed (SIR) model [6, 21] to describe attackers’ compromising behaviors and defenders’ recovering behaviors. If a node is recovered from being compromised, it is immune to the attack. Thus, in terms of a node’s lifetime except original attackers or defenders seeded in the network deployment, a user node only experiences one time to be compromised by attackers or recovered by defenders. A network is initialized with three types of players including attackers, defenders, and users based on their state (see Fig 1). We assume that a node is equipped with a host-based intrusion detection mechanism [22], characterized by probabilities of false positives and false negatives, denoted as Pfp and Pfn, respectively. Each node i is capable of extrapolating neighboring nodes j’s resource level based on their activities and signal strength. For each node to be aware of partial or complete network topology, a node broadcasts its neighbor information to the network. Obtaining a global network topology requires all nodes’ neighboring information which is heavily expensive in resource-constrained environments (e.g., wireless mobile networks). To mitigate this overhead, we introduce the concept of k-hop reachability, by limiting the geographic area of disseminating information of adjacent nodes.

thumbnail
Fig 1. Composition of nodes and their dynamic status.

OA for original attackers, Q for quarantined original attackers, OU for original users which have never compromised or recovered before, UA for compromised users becoming attackers, UD for recovered users becoming defenders, OD for original defenders, and RE for resource exhausted. All nodes except the quarantined attackers are regarded as legitimate member nodes and can become resource-exhausted, resulting in non-legitimate members. Where , we can derive , , , and at time t > 0.

https://doi.org/10.1371/journal.pone.0148674.g001

We consider two types of dynamics associated with a node’s characteristics in terms of structural dynamic and state dynamic as follows:

  1. Structural dynamic is reflected based on a node’s temporal location in a network, related to the work on network of networks [2325]. We investigate a node’s influence based on the concept of k-hop reachability [26] in a given time-varying network and employ it as criteria for an attacker’s or defender’s decision to select a node to take an action (i.e., compromising or recovering a node). We explain the computation of a node’s influence in Eq (3) below.
  2. State dynamic is considered in terms of a node’s resource level representing battery life and/or reliability. Structural and state dynamics may evolve at the same time [2729]. The structural and state dynamics are interwoven and affect to each other, the so called dynamics of mutualistic interactions [27]. For example, species abundance affects network rewiring while network structure determines the species abundance. In addition, the coevolution of state and structural dynamics leads to the nestedness of real mutualistic networks [28]. Other examples can be observed in a collective motion of self-propelled particle systems [28] or a network of self-propelled agent systems [29]. In our work, a network topology partially relies on state dynamic while the state dynamic fully depends on structural dynamic.

Node Model

Recall that a given cyber war game is played by attackers, defenders, and users. When an attacker compromises a user, the user is compromised and becomes an attacker who is capable of attacking another healthy user (i.e., a node which has not compromised in the past). Unless the compromised user is recovered by a defender, it remains as compromised. A defender is a node with the capability to recover a compromised user or to quarantine an original attacker. If a compromised user is recovered by the defender, it is immune to the attack such as SIR [6, 3032]. If the recovered node is an original attacker, it is quarantined and cannot perform any attack while it does not have a capability to recover another node. The defender is robust against attacks and will never be compromised by an attacker in which the defenders are trusted entities. Winning a given cyber war depends on whether or not attackers or defenders reach their system goal state, respectively.

Given an initial number of nodes in a network, the network has the following four types of nodes at time t based on their state:

  1. Compromised nodes () include original attackers or compromised users;
  2. Healthy active user nodes () are users who have never compromised in the past;
  3. Defenders () indicate original defenders or recovered users; and
  4. Inactive nodes () are dead nodes due to lack of resources or original attackers being quarantined.

The total number of nodes initially given can be derived as . We summarize the network node composition and dynamic status of nodes in Fig 1.

In a given network, a certain fraction of nodes are compromised by outside attacker(s). We study how quickly attackers or defenders reach their respective goal state from the initial state as shown in Fig 1. As time elapses, the compromised nodes start compromising other legitimate member nodes based on their attack strategy to reach the system failure state based on System Failure Condition (SFC) (see a next subsection, System Failure Condition). We discuss attacker and defender strategies in Section Attacker and Defender Strategies later. As some nodes become compromised, defenders detect them and start performing the recovery process of compromised nodes to prevent or mitigate system failure by eliminating all compromised nodes from the system.

Next we represent the characteristics of a node as a vector by: (1) where ri(t) is node i’s resource level at time t and and indicate the in-degree and out-degree of node i within k-hop distance from itself at time t, respectively. The out-degree of node i with a given k indicates the concept of reachability, i.e., how many nodes are reachable from node i in a network. The in-degree of node i with k-hop distance means how many nodes can reach node i within k-hop distance. We use k-hop reachability [26] to mitigate the computation or communication overhead to exchange neighbors information. We use the k-hop distance in-degree and out-degree of node i to calculate its influence in the network.

Each node disseminates adjacent nodes information in order to provide a global view of the network. To mitigate high communication overhead, it disseminates neighbors information within a k-hop distance. Given an adjacency matrix, , for a directed graph , matrix L(k)(t) consists of elements with a binary value 0 or 1 representing that node j is reachable from node i within k-hop distance. L(k)(t) is computed based on the shortest path algorithm for a directed graph considered [33].

Based on L(k)(t) calculated above, let D(k)(t) be a 2 × n matrix for the in-degree and out-degree of n number of nodes based on k-hop distance. D(k)(t) is denoted as each element with and , which are calculated based on L(k)(t) with elements for all i and j by: (2)

The degree of a node’s influence is used as one of criteria attackers or defenders take actions to minimize the accumulated resource consumption until they reach the respective system goal state. A node’s influence is calculated by: (3) implies a node’s influence over other nodes in a network with a given k-hop distance compared to other nodes’ influence over the node itself. A node with high influence, , means that the node has high influence over others while it is not much influenced by other nodes. For simplicity, we did not include time unit t in the equations above but the influence may be affected by the dynamics of a network topology which was examined in the simulation experiments by varying network temporality.

We consider the state ri(t) of a node i changes over time according to its incoming neighboring nodes, strategy chosen, and whether an action is taken or not. ri(t) is i’s remaining resource level at time t. Based on ei(t) above, node i’s remaining resource level, ri(t), is updated as: (4) where ri(t = 0) for all i’s is randomly selected as a real number ranged in [0.5, 1] based on uniform distribution and its resource level, ri(t), decreases over time. σ denotes a decay of resource over time to maintain its normal operation, ranged in [0, 1] as a real number. ei(t) is defined as: (5) ei(t) counts the cost only when node i chooses node j to take an action; 0 otherwise. The above implies that when node j has a high resource level, an attacker or a defender needs to consume more resource to take an action towards node j. λ is a constant parameter to adjust the speed of the resource consumption per action. ei(t) implies node i consumes more resource to take an action towards node j with higher resource level. Note that node i takes an action only when ri(t − 1) − σei(t)>0.

When node i selects node j to take an action, node i’s action is effective towards node j with a probability by: (6) sij(t) implies that when node j has high resource, node i’s action is less likely to be effective, vice-versa.

When ri(t) = 0, it means node i dies due to the lack of resource. This node is not part of legitimate members in the network, and accordingly the total number of active nodes at time t, , decreases. increments as more inactive nodes exist in the network. In this work, each attacker or defender can compromise or recover one adjacent node at a time, not allowing actions towards multiple nodes simultaneously.

System Failure Condition

The goal of attackers is to reach the system state to failure. To model the attackers’ target state based on the system failure state, we define the system failure condition (SFC) in terms of the loss of two system security goals: (1) loss of integrity based on the concept of Byzantine Failure [34] where the system fails with too many compromised entities (e.g., the system with more than one-third of participating entities being compromised), leading to increased attack severity due to collusive attack; and (2) loss of availability based on the fact that the system does not have a sufficient number of healthy, active nodes for mission execution. Some nodes may die due to lack of resources while other nodes may be compromised due to node capture attack by attackers. Therefore, the SFC is defined by: (7) where is the total number of compromised nodes at time t, refers to the number of active nodes at time t regardless of their status, either compromised or healthy. indicates the total number of inactive nodes including original attackers quarantined plus dead user nodes due to lack of resource. Where is the total number of nodes that are initially given, ρ1 bounds the maximum number of compromised nodes that can exist without failure while ρ2 is the fraction of the maximum number of inactive nodes that can exist without failure in the network.

Cyber War Game

This section discusses how the cyber war game is formulated as an optimization problem. In addition, we describe attacker and defender strategies proposed in this work and analyze their solution complexity.

Problem Formulation

We formalize this problem as an optimization problem that minimizes accumulated resource consumption until the system goal state reaches by solving the following objective function as: (8) Here is a set of nodes belonging to a party (i.e., either attackers or defenders) where includes a set of nodes taking actions to reach a respective system target state. is same as for attackers while it is for defenders in Fig 1.

For attackers, e(t) is a vector of the resource consumed by attackers successfully where e(t) = [e1(t), …, ei(t), …, em(t)]T and and ei(t) represents resource consumed by node i to compromise another node in at time t (See Eq (5) for ei(t)). Similarly, for defenders, e(t) is a vector of the resource consumed by the defenders to successfully recover compromised nodes in , where e(t) = [e1(t), …, ei(t), …, em(t)]T and and ei(t) indicates node i’s resource consumption to recover a compromised node at time t. This problem is to identify a set of nodes by which attackers or defenders take actions to reach their respective goal state while minimizing resource consumption. Recall that attackers or defenders can only take actions towards their adjacent neighbors (i.e., 1-hop neighbor).

In Eq (8) above, a small amount of resource decay over time (i.e., σ) without any additional activity (e.g., compromising or recovering actions) is omitted. The imposed constraints are: (1) node i can take an action towards node j only when wij(t)>0 which means there is a directed edge from node i to node j; and (2) node i should have sufficient resource to take an action towards node j (i.e., ri(t) − ei(t)>0).

Attacker and Defender Strategies

In this section, we discuss what strategies attackers or defenders can take to win a cyber war game with minimum resource consumption, respectively.

Node i, either attacker or defender, selects an adjacent node j (it should be originally a user) with minimum resource consumption to compromise or recover node j while reaching the target state as quickly as possible. We propose two heuristic strategies based on a node’s two characteristics as follows: (1) a node’s resource level; and (2) a node’s influence based on k-hop reachability as shown in Eq (3), called k-hop influence in this work. Therefore, each node i can have two strategies to select adjacent node j to take an action as follows:

  1. Resource-First (RF): node i selects node j with the minimum resource among all adjacent nodes.
  2. Influence-First (IF): node i selects node j with the maximum influence among all adjacent nodes.

Both strategies above have the goal to win a game with the minimum resource consumption by either minimizing resource consumption in each step or maximizing a chance to reach the goal state with minimum time where both strategies aim to minimize the accumulated resource consumption until the end state. We denote attackers’ two strategies as Resource-First-Attack (RF-A) and Influence-First-Attack (IF-A). Similarly, defenders’ strategies are notated as Resource-First-Defense (RF-D) and Influence-First-Defense (IF-D). In all cases, if node i’s expected resource consumption by taking an action towards node j exceeds its current remaining resource in Eq (4), node i does not take any action towards node j to save its resource for its own survival.

Solution Complexity Analysis

In this section, we analyze the solution complexity of three algorithms: optimal solution using brute-force algorithm (BFA) based on depth-first-search, resource-first (RF) and influence-first (IF). In particular, we analyze the strategies taken by attackers and how their strategies affect the resource consumption. In order to find feasible solution space, we relax some conditions defined in this work. The time-varying network condition is relaxed by using a static network to identify optimal solution using BFA. We assume that a static network has nodes connected to other nodes with a weight eij where eij is computed based on ei in Eq (5) where an edge exists between nodes i and j. Note that eij is updated whenever node i takes an action with any adjacent node. For example, i’s resource will be updated as it takes actions towards adjacent nodes j’s. Accordingly, eij for all adjacent nodes j’s is affected by node i’s resource adjustment. In order to minimize the effect of randomness, we consider sij = 1. Note that we remove all the relaxed conditions used above and show simulation results for a large time-varying, dynamic network later in a next section.

In this section, we analyze the complexity of solution search in three algorithms including BFA, RF and IF. We analyze the complexity in terms of attackers’ perspective where the attackers require compromising more nodes to reach their goal state as defenders recover the compromised nodes over time. We approximate the complexity of solution search algorithms where a graph has n vertices and each vertex has an average of m out-degrees.

  1. Brute Force Attack (BFA): we simply calculate the combination of choosing c out of n where n is the total number of nodes and c is the number of nodes required to be compromised to meet SFC. Since the loss of integrity failure is a more tight condition than the loss of availability failure unless many nodes quickly drain their resources, we treat c as the minimum number of compromised nodes to make the system failure in this case. This is computed by selecting c number of compromised nodes out of n which is the initial number of nodes given, denoted as C(n, c) = O(n2n) where cn/2 (i.e., ρ1 ≤ 1/2) and n! = o(nn). Since each node computes this brute-force solution, resulting in O(n2n) and there is the overhead to obtain global network topology, O(n3), the complexity of brute-force optimal solution is O(n2n+n3), leading to O(n2n).
  2. Resource-First-Attack (RF-A): it is linear proportional to n as each attacker chooses one among multiple adjacent nodes based on the minimum resource. Given an initial number of attackers c0, and the average out-degrees m, the maximum round of compromising actions by all attackers, h, each attacker compromises another healthy node. It is estimated by: Therefore, RF-A has a complexity of O(n2) where each node runs O(n).
  3. Influence-First-Attack (IF-A): it is similar to RF-A for the compromising process, O(n2), but it has the overhead to compute k-influence, leading to O(n3).

Experiments and Analysis

We show the results and analyze their trends under two network environments: (1) a static network to identify optimal solutions; and (2) a temporal network by varying network temporality p and nodes’ average degree d.

Metrics

The following performance metrics are used:

  1. Win probability () refers to attackers’ average win probability. Attackers win when SFC is met; defenders win when there exist no compromised nodes in a network.
  2. Resource Consumption() is the average accumulated resource consumed by either attackers or defenders until time T which is the time that they attain their respective goal based on Eq (8).
  3. System Vulnerability () refers to the degree of the system vulnerability in terms of the number of compromised nodes and the number of inactive nodes, as addressed in SFC. When , this indicates the system failure state. This is estimated by: n (9) where is the maximum number of compromised nodes allowed in the system without failure at time t and is the number of compromised nodes in the system at time t. indicates the maximum number of members that are not committing for mission execution and is the maximum bound tolerated by the system. is the number of inactive or compromised members currently in the network.

Result Analysis under a Small-Scale Static Network

Experimental Setting.

Since it is not feasible to obtain optimal solution(s) of a given problem under a time-varying network consisting of a large number of nodes (i.e., NP-Complete), we first validate the optimality of the given problem by comparing the three algorithms in a static network consisting of 20 nodes. In the next section below, we will discuss results under temporal networks. We use an environment setting with λ = 0.05, σ = 0.001 (i.e., in resource calculation in Eq (4)), and k = 2 (i.e., in k-hop influence in Eq (3)). Resource levels of nodes are assigned as a real number ranged in [0.5, 1] based on the uniform distribution in order to consider vastly different resource levels of nodes in a network. We set up the network based on Erdös-Rényi (ER) model with a different probability, q, given for two nodes to be randomly connected in the network deployment. To make the given network have vastly different degrees in a directed network, we randomly select a pair of nodes to remove an edge (i.e., when edges exist between nodes i and j in both directions such as i to j or vice-versa, we keep one edge while removing the other edge).

Result.

In Fig 2, we show the minimum resource consumed by three algorithms including two strategies and one optimal solution based on BFA. In order to demonstrate the optimality of the given problem, we use a simplified cyber war scenario. The scenario is that an attacker compromises user nodes while a defender may recover compromised user nodes. Thus, in Fig 2, we show the number of compromised nodes as x-axis while plotting the resource consumption in y-axis. Each strategy shown here is a strategy taken by an attacker, such as brute-force-attack (BFA), resource-first-attack (RF-A), or influence-first-attack (IF-A).

thumbnail
Fig 2. Optimality Analysis of Attack Strategies in a Static Network.

(a)-(b) For ER networks composed of N = 20 nodes with (a) q = 0.4, and (b) q = 0.7, we plot the resource consumption as a function of the number of compromised nodes for three different strategies. (c) Number of feasible solution as a function of the number of compromised nodes for two different ER networks. (d) Resource consumption as a function of the number of nodes for two different strategies.

https://doi.org/10.1371/journal.pone.0148674.g002

As shown in Fig 2(a) and 2(b), although BFA performs the best consuming the minimum resource among three in both network conditions (i.e., sparse with q = 0.4 and dense with q = 0.7), it occurs prohibitively high overhead for solution search as shown in Fig 2(c). For the other two strategies, RF-A or IF-A, we notice IF-A becomes outperforming RF-A as attackers compromise more nodes particularly under a sparse network. Lastly we experiment the impact of varying the total number of nodes, , in a network. In Fig 2(d), we investigate the impact of on resource consumption of the two strategies. We set the number of compromised nodes to . In this case, IF-A outperforms RF-A as a network size becomes larger. In a network with higher node density but less network density (i.e., sparse with q = 0.5 in this case), attackers prefer IF-A over RF-A in compromising a large number of nodes in the network.

Result Analysis under a Large-Scale Temporal Network

Experimental Setting.

For a large-scale temporal network, we use a random network based on ER network model where network temporality p is used as a rewiring probability that two nodes i and j are connected at time t. We consider the total number of nodes, where the nodes consists of the initial number of attacker, |OA| = 1, the initial number of defenders, |OD| = 50, and the initial number of users, |OU| = 949. We set λ = 0.05, σ = 0.001, and k = 6. For network environmental conditions, network temporality p and nodes’ average degree d (i.e., higher d indicates higher network density) are varied to observe their impact on performance. All data points shown in the results are collected based on 100 of realizations. We summarize all key design parameters, their meanings and corresponding default values in Table 1. For dependent variables, we note dependent under ‘Value’ in Table 1.

thumbnail
Table 1. Key design parameters, their meanings and default values.

https://doi.org/10.1371/journal.pone.0148674.t001

Result.

Fig 3 shows how network temporality p and network density d affect attackers’ win probability. We vary p to see its impact on Pw under sparse or dense network with d = 0.5 or d = 2.5, respectively, as shown in Fig 3(a) and 3(b). In a sparse network of Fig 3(a), regardless of defenders’ strategies, attackers’ IF outperforms among others. In addition, higher p in a sparse network helps attackers to win. In a dense network of Fig 3(b), although attackers’ IF outperforms the RF counterpart, when defenders choose RF, attackers have higher chances to win the game. More interestingly, in this dense network, higher network temporality p deteriorates attackers’ chances to win. Fig 3(c) shows the effect of varying d on attackers’ Pw. In all strategy scenarios, higher d does not help attackers to win because higher network density will increase a chance for a node to be recovered by defenders.

thumbnail
Fig 3. Effect of network temporality (p) and density (d) on win probability (Pw).

(a) A win probability as a function of temporality for four pairs of strategies by defenders and attackers under a sparse network with average degree d = 0.5. (b) A win probability vs. temporality for four pairs of strategies of defenders and attackers under a dense network with average degree d = 2.5. (c) A win probability as a function of an average degree for four pairs of strategies of defenders and attackers with high network temporality p = 0.5.

https://doi.org/10.1371/journal.pone.0148674.g003

Fig 4 shows how network temporality and density impact attackers’ resource consumption (). In a sparse network of Fig 4(a), higher occurs as p increases and when attackers take IF strategy. Higher Pw leads to higher because attackers should take more actions. For a dense network of Fig 4(b), higher Pw does not necessarily lead to higher . This case is shown when attackers use RF (i.e., red and green curves). This is because choosing a node with low remaining resource does not lead to a higher chance to compromise more nodes in next decision rounds. In Fig 4(c), a critical point of d exists in maximizing . A network with smaller d helps attackers to win quickly due to a less chance to be recovered by defenders in a sparse network. On the other hand, a dense network with high d allows compromised nodes to be easily recovered. Thus, there exists a balance point of d maximizing .

thumbnail
Fig 4. Effect of network temporality (p) and density (d) on defenders’ and attackers’ resource consumption ().

(a) Resource consumption of defenders vs. temporality under a sparse network with average degree d = 0.5. (b) Resource consumption of defenders vs. temporality under a dense network with average degree d = 2.5 (b). (c) Resource consumption of defenders as a function of average degree for four pairs of strategies of defenders and attackers with high network temporality p = 0.5. (d)-(f) Similar plots for attackers’ resource consumption.

https://doi.org/10.1371/journal.pone.0148674.g004

The trends of defenders’ observed are also very similar to the ones observed in attackers’ in Fig 4. Due to the space constraint, we do not show the results here. The reason is that defenders basically follow attackers’ actions as they should recover the compromised nodes. However, in our results, defenders’ is significantly lower than attackers’ because attackers consume more resource than defenders by taking actions to compromise user nodes.

Lastly, Fig 5 shows how system vulnerability evolves over time under different network temporality and density. Comparing Fig 5(a) & 5(b) and 5(c) & 5(d) for a sparse network vs. a dense network, there exists a critical point that maximizes system vulnerability but three cases out of four do not experience system failure where implies system failure. That is, although the system has a higher chance to be endangered by system vulnerability, it can survive over time by reducing the vulnerability. However, for a dense network, the system ultimately fails due to a high chance for nodes to be compromised by attackers. On the other hand, comparing Fig 5(a) & 5(c) and 5(b) & 5(d) for high temporality vs. low temporality, a longer time is taken to experience high vulnerability or failure under low temporality (i.e., Fig 5(a) & 5(c)) than under high temporality (i.e., Fig 5(b) & 5(d)).

thumbnail
Fig 5. Effect of network temporality (p) and density (d) on system vulnerability ().

(a) Plot of system vulnerability over time t under dense (d = 2.5) and low temporality (p = 0.05) networks. (b) Plot of system vulnerability over time t for dense (d = 2.5) and high temporality (p = 0.5) networks. (c) System vulnerability as a function of t for sparse (d = 0.5) and low temporality (p = 0.05) networks. (d) System vulnerability over time t under sparse (d = 0.5) and high temporality (p = 0.5) networks.

https://doi.org/10.1371/journal.pone.0148674.g005

Conclusion

Given a cyber war game for a resource-constrained, temporal, distributed network, we studied how each party can win the game with minimum resource consumption. We devised two heuristic strategies in a greedy manner based on a node’s influence and resource level to maximize a win probability while minimizing resource consumption. We investigated the effect of the proposed heuristic strategies on performance metrics including a win probability, minimum resource consumption, and security vulnerability. We investigated how network temporality and density affect performance of the strategies.

We found that attackers’ influence-first (IF-A) strategy outperforms resource-first (RF-A) strategy under both sparse and dense networks across a wide range of network temporality. In addition, in a dense network, IF-A consumes less resource than RF-A. Network temporality helps attackers to win a game under a sparse network while it may deteriorate the win probability under a dense network due to a higher chance for them to be recovered by defenders. Although a higher win probability generates higher resource consumption, a certain point of node degree exists to maximize resource consumption. In addition, system vulnerability is significantly affected by network temporality and density because the network characteristics are critical for a node to reach its system goal state with minimum resource consumption.

Our work may raise the following open research questions: how can network temporality be described in real networks?; how can the proposed work be validated with a real network dataset?; If each node is modeled as an agent using game theory, how can Nash Equilibrium be identified in a cyber war game?; and how do heterogeneous network or node characteristics affect optimal strategies of attackers and defenders in a cyber war game?

Acknowledgments

Research was in part, for Dr. Jianxi Gao, sponsored by the Army Research Laboratory via the Network Science Collaborative Technology Alliance (NS CTA) program and was accomplished under Cooperative Agreement Number W911NF-09-2-0053. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. Dr. Jianxi Gao also acknowledges the support of the John Templeton Foundation: Mathematical and Physical Sciences grant number PFI-777; The Defense Threat Reduction Agency Basic Research Grant No. HDTRA1-10-1-0100; European Commission grant numbers FP7317532 (MULTIPLEX) and 641191 (CIMPLEX); and the National Natural Science Foundation of China (Grants 61374160 and 71201132). The sponsors had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

Author Contributions

Conceived and designed the experiments: JHC JXG. Performed the experiments: JHC JXG. Analyzed the data: JXG. Contributed reagents/materials/analysis tools: JHC. Wrote the paper: JHC JXG. Addressed referees’ comments: JHC JXG.

References

  1. 1. Cohen R, Havlin S. Complex networks: structure, robustness and function. Cambridge University Press; 2010.
  2. 2. Albert R, Barabási AL. Statistical mechanics of complex networks. Reviews of modern physics. 2002;74(1):47.
  3. 3. Albert R, Jeong H, Barabási AL. Error and attack tolerance of complex networks. Nature. 2000;406:378–382. pmid:10935628
  4. 4. Cohen R, Erez K, Ben-Avraham D, Havlin S. Resilience of the Internet to random breakdowns. Physical Review Letters. 2000;85(21):4626–4628. pmid:11082612
  5. 5. Newman ME. The structure and function of complex networks. SIAM review. 2003;45(2):167–256.
  6. 6. Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang DU. Complex networks: Structure and dynamics. Physics reports. 2006;424(4):175–308.
  7. 7. Newell A, Obenshain D, Tantillo T, Nita-Rotaru C, Amir Y. Increasing network resiliency by optimally assigning diverse variants to routing nodes. In: 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN); 2013. p. 1–12.
  8. 8. Bunde S A & Havlin . Fractals and Disordered Systems. New York: Springer; 1996.
  9. 9. Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S. Catastrophic cascade of failures in interdependent networks. Nature. 2010;464(7291):1025–1028. pmid:20393559
  10. 10. Parshani R, Buldyrev SV, Havlin S. Interdependent Networks: Reducing the Coupling Strength Leads to a Change from a First to Second Order Percolation Transition. Physical Review Letters. 2010 Jul;105:048701. pmid:20867893
  11. 11. Brummitt CD, D’Souza RM, Leicht E. Suppressing cascades of load in interdependent networks. Proceedings of the National Academy of Sciences. 2012;109(12):E680–E689.
  12. 12. Gomez S, Diaz-Guilera A, Gomez-Gardeñes J, Perez-Vicente CJ, Moreno Y, Arenas A. Diffusion dynamics on multiplex networks. Physical Review Letters. 2013;110(2):028701. pmid:23383947
  13. 13. Kivelä M, Arenas A, Barthelemy M, Gleeson JP, Moreno Y, Porter MA. Multilayer networks. arXiv preprint arXiv:13097233. 2013;.
  14. 14. Gao J, Buldyrev SV, Havlin S, Stanley HE. Robustness of a network of networks. Physical Review Letters. 2011;107(19):195701. pmid:22181627
  15. 15. Gao J, Buldyrev SV, Stanley HE, Havlin S. Networks formed from interdependent networks. Nature Physics. 2012;8(1):40–48.
  16. 16. Holme P, Saramäki J. Temporal networks. Physics reports. 2012;519(3):97–125.
  17. 17. Hu P, LI H, Fu H, Cansever D, Mohapatra P. Dynamic Defense Strategy against Advanced Persistent Threat with Insiders. In: Proceedings IEEE INFOCOM; 2015. p. 1–10.
  18. 18. Zhu M, Martinez S. Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American Control Conference (ACC); 2011. p. 4063–4068.
  19. 19. Zhang Z, Nait-Abdesselam F, Ho PH. Boosting Markov Reward models for probabilistic security evaluation by characterizing behaviors of attacker and defender. In: Availability, Reliability and Security, 2008. ARES 08. Third International Conference on. IEEE; 2008. p. 352–359.
  20. 20. Ben-Asher N, Gonzalez C. 10. In: et al S J, editor. CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War. vol. 56. Springer; 2015. p. 207–220.
  21. 21. Neri FM, Pérez-Reche FJ, Taraskin SN, Gilligan CA. Heterogeneity in susceptible–infected–removed (SIR) epidemics on lattices. Journal of The Royal Society Interface. 2010;p. rsif20100325.
  22. 22. Mukherjee B, Heberlein LT, Levitt KN. Network intrusion detection. Network, IEEE. 1994;8(3):26–41.
  23. 23. Gao J, Buldyrev S, Havlin S, Stanley H. Robustness of a network formed by n interdependent networks with a one-to-one correspondence of dependent nodes. Physical Review E. 2012;85(6):066134.
  24. 24. Gao J, Buldyrev SV, Stanley HE, Xu X, Havlin S. Percolation of a general network of networks. Physical Review E. 2013;88(6):062816.
  25. 25. Liu X, Peng H, Gao J. Vulnerability and controllability of networks of networks. Chaos, Solitons & Fractals. 2015;80:125–138.
  26. 26. Cheng J, Wang H, Shang Z, Yu JX, Cheng H. K-reach: Who is in your small world. PVLDB. 2012;.
  27. 27. Suweis S, Simini F, Banavar JR, Maritan A. Emergence of structural and dynamical properties of ecological mutualistic networks. Nature. 2013;500(7463):449–452. pmid:23969462
  28. 28. Vicsek T, Czirók A, Ben-Jacob E, Cohen I, Shochet O. Novel type of phase transition in a system of self-driven particles. Physical review letters. 1995;75(6):1226. pmid:10060237
  29. 29. Peng H, Zhao D, Liu X, Gao J. Collective Motion in a Network of Self-Propelled Agent Systems. PloS one. 2015;10(12):e0144153. pmid:26640954
  30. 30. Pastor-Satorras R, Vespignani A. Epidemic spreading in scale-free networks. Physical review letters. 2001;86(14):3200. pmid:11290142
  31. 31. Valdez LD, Macri PA, Braunstein LA. Intermittent social distancing strategy for epidemic control. Physical Review E. 2012 22 March;.
  32. 32. Mieghem PV, van de Bovenkamp R. Non-Markovian Infection Spread Dramatically Alters the Susceptible-Infected-Susceptible Epidemic Threshold in Networks. Physical Review Letters. 2013 March;110:108701:1–5.
  33. 33. Johnson DB. Efficient algorithms for shortest paths in sparse networks. Journal of the ACM (JACM). 1977;24(1):1–13.
  34. 34. Gärtner FC. Byzantine Failures and Security: Arbitrary is Not (always) Random. Swiss Federal Institute of Technology (EPFL) School of Computer and Communication Sciences; 2003. IC/2003/20.