Stealth Data Injection Attacks With Sparsity Constraints
نویسندگان
چکیده
Sparse stealth attack constructions that minimize the mutual information between state variables and observations are proposed. The construction is formulated as design of a multivariate Gaussian distribution aims to while limiting Kullback-Leibler divergence under without attack. sparsity constraint incorporated support distribution. Two heuristic greedy algorithms for first algorithm assumes vector consists independent entries, therefore, requires no communication different attacked locations. second considers correlation entries which results in larger disruption smaller probability detection at expense coordination We numerically evaluate performance proposed on IEEE test systems show it feasible construct attacks generate significant with low number compromised sensors.
منابع مشابه
Recovery Algorithms for Vector-Valued Data with Joint Sparsity Constraints
Vector valued data appearing in concrete applications often possess sparse expansions with respect to a preassigned frame for each vector component individually. Additionally, different components may also exhibit common sparsity patterns. Recently, there were introduced sparsity measures that take into account such joint sparsity patterns, promoting coupling of non-vanishing components. These ...
متن کاملSurface inpainting with sparsity constraints
In this paper we devise a new algorithm for completing surface with missing geometry and topology founded upon the theory and techniques of sparse signal recovery. The key intuition is that any meaningful 3D shape, represented as a discrete mesh, almost certainly possesses a low-dimensional intrinsic structure, which can be expressed as a sparse representation in some transformed domains. Inste...
متن کاملTrading Accuracy for Sparsity in Optimization Problems with Sparsity Constraints
We study the problem of minimizing the expected loss of a linear predictor while constraining its sparsity, i.e., bounding the number of features used by the predictor. While the resulting optimization problem is generally NP-hard, several approximation algorithms are considered. We analyze the performance of these algorithms, focusing on the characterization of the trade-off between accuracy a...
متن کاملHexPADS: A Platform to Detect "Stealth" Attacks
Current systems are under constant attack from many different sources. Both local and remote attackers try to escalate their privileges to exfiltrate data or to gain arbitrary code execution. While inline defense mechanisms like DEP, ASLR, or stack canaries are important, they have a local, program centric view and miss some attacks. Intrusion Detection Systems (IDS) use runtime monitors to mea...
متن کاملStealth Attacks on Ad-Hoc Wireless Networks
We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are ”stealth attacks” in that they minimize the cost to and visibility ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Smart Grid
سال: 2023
ISSN: ['1949-3053', '1949-3061']
DOI: https://doi.org/10.1109/tsg.2023.3238913