Deep reinforcement learning for optimal denial-of-service attacks scheduling

被引:13
作者
Hou, Fangyuan [1 ]
Sun, Jian [1 ]
Yang, Qiuling [1 ]
Pang, Zhonghua [2 ]
机构
[1] Beijing Inst Technol, State Key Lab Intelligent Control & Decis Complex, Beijing 100081, Peoples R China
[2] North China Univ Technol, Key Lab Fieldbus Technol & Automat Beijing, Beijing 100144, Peoples R China
基金
中国国家自然科学基金;
关键词
optimal denial-of-service attack; scheduling; optimization; limited energy; deep reinforcement learning; STATE ESTIMATION; SYSTEMS;
D O I
10.1007/s11432-020-3027-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider an optimal denial-of-service (DoS) attack scheduling problem of N independent linear time-invariant processes, where sensors have limited computational capability. Sensors transmit measurements to the remote estimator via a communication channel that is exposed to DoS attackers. However, due to limited energy, an attacker can only attack a subset of sensors at each time step. To maximally degrade the estimation performance, a DoS attacker needs to determine which sensors to attack at each time step. In this context, a deep reinforcement learning (DRL) algorithm, which combines Q-learning with a deep neural network, is introduced to solve the Markov decision process (MDP). The DoS attack scheduling optimization problem is formulated as an MDP that is solved by the DRL algorithm. A numerical example is provided to illustrate the efficiency of the optimal DoS attack scheduling scheme using the DRL algorithm.
引用
收藏
页数:9
相关论文
共 39 条
  • [1] An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms
    Almomani, Ammar
    Alauthman, Mohammad
    Albalas, Firas
    Dorgham, O.
    Obeidat, Atef
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (02) : 96 - 112
  • [2] Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
  • [3] [Anonymous], 2010, Stuxnet renews power grid security concerns
  • [4] Bhardwaj A, 2017, INT J CLOUD APPL COM, V7, P59, DOI 10.4018/IJCAC.2017070103
  • [5] Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
    Bhushan, Kriti
    Gupta, B. B.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1985 - 1997
  • [6] Cardenas A, 2018, P C HOT TOP SEC CAL
  • [7] Power scheduling for Kalman filtering over lossy wireless sensor networks
    Chen, Jie
    Wang, Gang
    Sun, Jian
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2017, 11 (04) : 531 - 540
  • [8] Chhabra M., 2013, SciRes Journal of Information Security, V4, P165, DOI DOI 10.4236/JIS.2013.43019
  • [9] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. AUTOMATICA, 2018, 89 : 117 - 124
  • [10] Gupta B.B., 2018, Computer and cyber security: principles, algorithm, applications, and perspectives