ABSTRACT
Global connectivity from space using proliferated low Earth orbit (P-LEO) satellite constellations can benefit society at large. An increasing number of public and private actors rely on services that are provided from space through satellites, including Earth monitoring, communications, and internet access. As the dependence of society on satellite constellations grows, threats to P-LEO assets are more likely to increase. Developing strategies that are effective and efficient to defend P-LEO constellations against different types of attacks is warranted. As a first step, we develop a framework to evolve defense strategies for a low-fidelity constellation system against selected low-fidelity adversarial actions by evolving attack strategies, and the strategies are evolved using coevolutionary algorithms. Results show that attackers can easily overcome defenses that are unaware and non-reactive to executed attacks and demonstrate that it may be possible to perform meaningful coevolution of attack and defense strategies that consider selective actions on individual satellites in a constellation. Evolved attack and defense strategies have the potential to promote the development of robust, reliable, and secure P-LEO constellations.
- Holly Arnold, David Masad, Giuliano Andrea Pagani, Johannes Schmidt, and Elena Stepanova. 2013. NetAttack: co-evolution of network and attacker. In Proceedings of the Santa Fe Institute Complex Systems Summer School.Google Scholar
- Kevin D Bowers, Marten Van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L Rivest, and Nikos Triandopoulos. 2012. Defending against the unknown enemy: Applying FlipIt to system security. In International Conference on Decision and Game Theory for Security. Springer, 248--263.Google ScholarCross Ref
- Dave Cliff and Geoffrey F Miller. 1995. Tracking the red queen: Measurements of adaptive progress in co-evolutionary simulations. In European Conference on Artificial Life. Springer, 200--218.Google ScholarCross Ref
- Richard Colbaugh and Kristin Glass. 2012. Leveraging sociological models for prediction I: Inferring adversarial relationships. In 2012 IEEE International Conference on Intelligence and Security Informatics. IEEE, 66--71.Google ScholarCross Ref
- Richard Colbaugh and Kristin Glass. 2012. Predictability-oriented defense against adaptive adversaries. In 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2721--2727.Google ScholarCross Ref
- Inigo del Portillo, Bruce G Cameron, and Edward F Crawley. 2019. A technical comparison of three low earth orbit satellite constellation systems to provide global broadband. Acta Astronautica 159 (2019), 123--135.Google ScholarCross Ref
- Gregory Falco. 2018. The Vacuum of Space Cyber Security. In 2018 AIAA SPACE and Astronautics Forum and Exposition. 5275.Google Scholar
- Dennis Garcia, Anthony Erb Lugo, Erik Hemberg, and Una-May O'Reilly. 2017. Investigating coevolutionary archive based genetic algorithms on cyber defense networks. In Proceedings of the Genetic and Evolutionary Computation Conference Companion. 1455--1462.Google ScholarDigital Library
- Todd Harrison, Kaitlyn Johnson, and Thomas G Roberts. 2019. Space Threat Assessment 2019. Center for Strategic and International Studies.Google Scholar
- Ethan Heilman. 2020. Play FlipIt Online. (May 2020). Retrieved May 8, 2020 from http://ethanheilman.github.io/flipIt/playable_with_instructions.htmlGoogle Scholar
- Stephen T Jones, Alexander V Outkin, Jared Lee Gearhart, Jacob Aaron Hobbs, John Daniel Siirola, Cynthia A Phillips, Stephen Joseph Verzi, Daniel Tauritz, Samuel A Mulder, and Asmeret Bier Naugle. 2017. PLADD: Deterring Attacks on Cyber Systems and Moving Target Defense. Technical Report. Sandia National Lab.(SNL-NM), Albuquerque, NM (United States).Google Scholar
- Aron Laszka, Gabor Horvath, Mark Felegyhazi, and Levente Buttyán. 2014. FlipThem: Modeling targeted attacks with FlipIt for multiple resources. In International Conference on Decision and Game Theory for Security. Springer, 175--194.Google ScholarCross Ref
- Anthony Erb Lugo, Dennis Garcia, Erik Hemberg, and Una-May O'Reilly. 2017. Developing proactive defenses for computer networks with coevolutionary genetic algorithms. In Proceedings of the Genetic and Evolutionary Computation Conference Companion. 273--274.Google ScholarDigital Library
- Kinga Mrugala, Nilufer Tuptuk, and Stephen Hailes. 2017. Evolving attackers against wireless sensor networks using genetic programming. IET Wireless Sensor Systems 7, 4 (2017), 113--122.Google ScholarCross Ref
- Alan Nochenson, Jens Grossklags, et al. 2013. A behavioral investigation of the FlipIt game. In Proceedings of the 12th Workshop on the Economics of Information Security (WEIS). 93.Google Scholar
- Elena Popovici, Anthony Bucci, R Paul Wiegand, and Edwin D De Jong. 2012. Coevolutionary Principles. (2012).Google Scholar
- George Rush, Daniel R Tauritz, and Alexander D Kent. 2015. Coevolutionary agent-based network defense lightweight event system (CANDLES). In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation. 859--866.Google ScholarDigital Library
- Marten Van Dijk, Ari Juels, Alina Oprea, and Ronald L Rivest. 2013. FlipIt: The game of "stealthy takeover". Journal of Cryptology 26, 4 (2013), 655--713.Google ScholarDigital Library
- James Richard Wertz. 2001. Mission geometry: orbit and constellation design and management: spacecraft orbit and attitude systems. Mission geometry: orbit and constellation design and management: spacecraft orbit and attitude systems/James R. Wertz. El Segundo, CA; Boston: Microcosm: Kluwer Academic Publishers, 2001. Space technology library; 13 (2001).Google Scholar
Index Terms
- Adversarial threats to large satellite networks (ATLAS-N): a coevolutionary approach based on flipit
Recommendations
Analysis of satellite-induced factors affecting the accuracy of the BDS satellite differential code bias
Differential code bias (DCB) is one of the main error sources of the positioning, navigation and timing services and slant total electron content extraction. The DCB can usually be estimated together with ionospheric model coefficients from the data of ...
Precise orbit determination for BDS-3 satellites using satellite-ground and inter-satellite link observations
Since November 2017, eight BeiDou global navigation system (BDS-3) satellites equipped with Ka-band inter-satellite link (ISL) payloads have been launched into medium earth orbit. We present the precise orbit determination (POD) for BDS-3 satellites ...
Insider Threats: It's the HUMAN, Stupid!
NCS '19: Proceedings of the Northwest Cybersecurity SymposiumInsider threats refer to threats posed by individuals who intentionally or unintentionally destroy, exfiltrate, or leak sensitive information, or expose their organization to outside attacks. Surveys of organizations in government and industry ...
Comments