Quickest Change Detection in the Presence of Covert Adversaries

被引:0
作者
Ramtin, A. [1 ]
Hare, Z. [3 ]
Kaplan, L. [3 ]
Nain, P. [2 ]
Veeravalli, V. [4 ]
Towsley, D. [1 ]
机构
[1] UMass, Coll Informat & Comp Sci, Amherst, MA 01003 USA
[2] INRIA, Sophia Antipolis, France
[3] DEVCOM Army Res Lab, Adelphi, MD USA
[4] Univ Illinois, Urbana, IL 61801 USA
来源
MILCOM 2024-2024 IEEE MILITARY COMMUNICATIONS CONFERENCE, MILCOM | 2024年
基金
美国国家科学基金会;
关键词
CuSum; Asymptotic Analysis; Covertness; Time-Varying Distributions; COMMUNICATION;
D O I
10.1109/MILCOM61039.2024.10773845
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the damage that an adversary can effect while remaining covert in the presence of the Cumulative Sum (CuSum) procedure. An adversary is covert if the time to detection is on the same order as the time to false alarm. Damage is given as an increasing function of the KL-divergence of the adversarial actions and the normal distribution prior to the adversarial attack. By analyzing the problem with a focus on the growth function g(n), which measures the cumulative expected log-likelihood ratio after n time slots following the change, we establish conditions under which the adversary remains covert and provide an analysis of the impact of different adversarial strategies on damage.
引用
收藏
页数:6
相关论文
共 6 条
[1]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[2]   Covert Communications: A Comprehensive Survey [J].
Chen, Xinying ;
An, Jianping ;
Xiong, Zehui ;
Xing, Chengwen ;
Zhao, Nan ;
Yu, F. Richard ;
Nallanathan, Arumugam .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02) :1173-1198
[3]   On Covert Communication Against Sequential Change-Point Detection [J].
Huang, Ke-Wen ;
Wang, Hui-Ming ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (11) :7285-7303
[4]   Quickest Change Detection With Non-Stationary Post-Change Observations [J].
Liang, Yuchen ;
Tartakovsky, Alexander G. ;
Veeravalli, Venugopal V. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (05) :3400-3414
[5]   CONTINUOUS INSPECTION SCHEMES [J].
PAGE, ES .
BIOMETRIKA, 1954, 41 (1-2) :100-&
[6]   Fundamental scaling laws of covert DDoS attacks [J].
Ramtin, Amir Reza ;
Nain, Philippe ;
Menasche, Daniel Sadoc ;
Towsley, Don ;
de Souza e Silva, Edmundo .
PERFORMANCE EVALUATION, 2021, 151