Stealth Data Injection Attacks With Sparsity Constraints

نویسندگان

چکیده

Sparse stealth attack constructions that minimize the mutual information between state variables and observations are proposed. The construction is formulated as design of a multivariate Gaussian distribution aims to while limiting Kullback-Leibler divergence under without attack. sparsity constraint incorporated support distribution. Two heuristic greedy algorithms for first algorithm assumes vector consists independent entries, therefore, requires no communication different attacked locations. second considers correlation entries which results in larger disruption smaller probability detection at expense coordination We numerically evaluate performance proposed on IEEE test systems show it feasible construct attacks generate significant with low number compromised sensors.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recovery Algorithms for Vector-Valued Data with Joint Sparsity Constraints

Vector valued data appearing in concrete applications often possess sparse expansions with respect to a preassigned frame for each vector component individually. Additionally, different components may also exhibit common sparsity patterns. Recently, there were introduced sparsity measures that take into account such joint sparsity patterns, promoting coupling of non-vanishing components. These ...

متن کامل

Surface inpainting with sparsity constraints

In this paper we devise a new algorithm for completing surface with missing geometry and topology founded upon the theory and techniques of sparse signal recovery. The key intuition is that any meaningful 3D shape, represented as a discrete mesh, almost certainly possesses a low-dimensional intrinsic structure, which can be expressed as a sparse representation in some transformed domains. Inste...

متن کامل

Trading Accuracy for Sparsity in Optimization Problems with Sparsity Constraints

We study the problem of minimizing the expected loss of a linear predictor while constraining its sparsity, i.e., bounding the number of features used by the predictor. While the resulting optimization problem is generally NP-hard, several approximation algorithms are considered. We analyze the performance of these algorithms, focusing on the characterization of the trade-off between accuracy a...

متن کامل

HexPADS: A Platform to Detect "Stealth" Attacks

Current systems are under constant attack from many different sources. Both local and remote attackers try to escalate their privileges to exfiltrate data or to gain arbitrary code execution. While inline defense mechanisms like DEP, ASLR, or stack canaries are important, they have a local, program centric view and miss some attacks. Intrusion Detection Systems (IDS) use runtime monitors to mea...

متن کامل

Stealth Attacks on Ad-Hoc Wireless Networks

We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are ”stealth attacks” in that they minimize the cost to and visibility ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Smart Grid

سال: 2023

ISSN: ['1949-3053', '1949-3061']

DOI: https://doi.org/10.1109/tsg.2023.3238913