Detection in Adversarial Environments

被引:88
作者
Vamvoudakis, Kyriakos G. [1 ]
Hespanha, Joao P. [1 ]
Sinopoli, Bruno [2 ]
Mo, Yilin [3 ]
机构
[1] Univ Calif Santa Barbara, Ctr Control Dynam Syst & Computat CCDC, Santa Barbara, CA 93106 USA
[2] Carnegie Mellon Univ, Elect & Comp Engn Dept, Pittsburgh, PA 15213 USA
[3] CALTECH, Comp & Math Sci Dept, Pasadena, CA 91125 USA
基金
美国国家科学基金会;
关键词
Adversarial detection; Byzantine sensors; cyber security; estimation; zero-sum games; NETWORKS; SYSTEMS; INFORMATION; SECURITY; ATTACKS; GAMES;
D O I
10.1109/TAC.2014.2351671
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose new game theoretic approaches to estimate a binary random variable based on sensor measurements that may have been corrupted by a cyber-attacker. The estimation problem is formulated as a zero-sum partial information game in which a detector attempts to minimize the probability of an estimation error and an attacker attempts to maximize this probability. While this problem can be solved exactly by reducing it to the computation of the value of a matrix, this approach is computationally feasible only for a small number of sensors. The two key results of this paper provide complementary computationally efficient solutions to the construction of the optimal detector. The first result provides an explicit formula for the optimal detector but it is only valid when the number of sensors is roughly smaller than two over the probability of sensor errors. In contrast, the detector provided by the second result is valid for an arbitrary number of sensor. While it may result in a probability of estimation error that is is an element of above the minimum achievable, we show that this error is an element of is small when the number of sensors is large, which is precisely the case for which the first result does not apply.
引用
收藏
页码:3209 / 3223
页数:15
相关论文
共 22 条
[1]   A game theoretic analysis of intrusion detection in access control systems [J].
Alpcan, T ;
Basar, T .
2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, :1568-1573
[2]   Security and trust for wireless autonomic networks - Systems and control methods [J].
Baras, John S. .
EUROPEAN JOURNAL OF CONTROL, 2007, 13 (2-3) :105-133
[3]  
Basar T, 1998, Dynamic Noncooperative Game Theory
[4]  
Becker S, 2011, I C DEPEND SYS NETWO, P133, DOI 10.1109/DSN.2011.5958213
[5]  
Byres E., 2004, P VDE C
[6]  
Cardenas A., 2008, P 3 C HOT TOP SEC SA, P1
[7]  
Fuchs ZE, 2011, P AMER CONTR CONF, P4532
[8]  
Hespanha Joao., 2000, P 2 DARPA JFACC S AD
[9]   A ROBUST VERSION OF THE PROBABILITY RATIO TEST [J].
HUBER, PJ .
ANNALS OF MATHEMATICAL STATISTICS, 1965, 36 (06) :1753-1758
[10]  
KOSUT O, 2006, P 44 ANN ALL C COMM