메뉴 건너뛰기




Volumn 12, Issue 4, 2017, Pages 779-792

Stealthy Attacks in Dynamical Systems: Tradeoffs between Utility and Detectability with Application in Anonymous Systems

Author keywords

admissible length; anonymity; K L divergence; privacy; Undetectable attacks

Indexed keywords

CONTROLLERS; COSTS; DATA PRIVACY; DYNAMICAL SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; NETWORK SECURITY;

EID: 85027052965     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2607695     Document Type: Article
Times cited : (10)

References (31)
  • 2
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, p. 13, 2011.
    • (2011) ACM Trans. Inf. Syst. Secur. , vol.14 , Issue.1 , pp. 13
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 4
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • May
    • R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon, " IEEE Security Privacy, vol. 9, no. 3, pp. 49-51, May 2011.
    • (2011) IEEE Security Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 10
    • 84871700367 scopus 로고    scopus 로고
    • A point-based mdp for robust single-lane autonomous driving behavior under uncertainties
    • May
    • J. Wei, J. M. Dolan, J. M. Snider, and B. Litkouhi, "A point-based mdp for robust single-lane autonomous driving behavior under uncertainties, " in Proc. IEEE Int. Conf. Robot. Autom. (ICRA), May 2011, pp. 2586-2592.
    • (2011) Proc. IEEE Int. Conf. Robot. Autom. (ICRA) , pp. 2586-2592
    • Wei, J.1    Dolan, J.M.2    Snider, J.M.3    Litkouhi, B.4
  • 13
    • 79953146274 scopus 로고    scopus 로고
    • Detection of impulsive effects in switched daes with applications to power electronics reliability analysis
    • Dec.
    • A. D. Domínguez-Garciá and S. Trenn, "Detection of impulsive effects in switched daes with applications to power electronics reliability analysis, " in Proc. 49th IEEE Conf. Decision Control (CDC), Dec. 2010, pp. 5662-5667.
    • (2010) Proc. 49th IEEE Conf. Decision Control (CDC) , pp. 5662-5667
    • Domínguez-Garciá, A.D.1    Trenn, S.2
  • 14
    • 80053157963 scopus 로고    scopus 로고
    • A graph-theoretical characterization of power network vulnerabilities
    • Jun.
    • F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities, " in Proc. Amer. Control Conf. (ACC), Jun. 2011, pp. 3918-3923.
    • (2011) Proc. Amer. Control Conf. (ACC) , pp. 3918-3923
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 15
    • 77957775842 scopus 로고    scopus 로고
    • Networked control systems under CYBER attacks with applications to power networks
    • Jun.
    • A. Teixeira, H. Sandberg, and K. H. Johansson, "Networked control systems under CYBER attacks with applications to power networks, " in Proc. Amer. Control Conf. (ACC). Jun. 2010, pp. 3690-3696.
    • (2010) Proc. Amer. Control Conf. (ACC) , pp. 3690-3696
    • Teixeira, A.1    Sandberg, H.2    Johansson, K.H.3
  • 16
    • 84887278643 scopus 로고    scopus 로고
    • Attack detection and identification in cyber-physical systems
    • Nov.
    • F. Pasqualetti, F. Dorfler, and F. Bullo, "Attack detection and identification in cyber-physical systems, " IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715-2729, Nov. 2013.
    • (2013) IEEE Trans. Autom. Control , vol.58 , Issue.11 , pp. 2715-2729
    • Pasqualetti, F.1    Dorfler, F.2    Bullo, F.3
  • 17
    • 84940901504 scopus 로고    scopus 로고
    • Security in stochastic control systems: Fundamental limitations and performance bounds
    • Jul.
    • C.-Z. Bai, F. Pasqualetti, and V. Gupta, "Security in stochastic control systems: Fundamental limitations and performance bounds, " in Proc. Amer. Control Conf. (ACC), Jul. 2015, pp. 195-200.
    • (2015) Proc. Amer. Control Conf. (ACC) , pp. 195-200
    • Bai, C.-Z.1    Pasqualetti, F.2    Gupta, V.3
  • 19
    • 84862913450 scopus 로고    scopus 로고
    • Further results on noise-enhanced distributed inference in the presence of Byzantines
    • Sep.
    • M. Gagrani et al., "Further results on noise-enhanced distributed inference in the presence of Byzantines, " in Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton), Sep. 2011, pp. 1222-1229.
    • (2011) Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton) , pp. 1222-1229
    • Gagrani, M.1
  • 20
    • 84857258999 scopus 로고    scopus 로고
    • The frogboiling attack: Limitations of anomaly detection for secure network coordinate systems
    • E. Chan-Tin, D. Feldman, N. Hopper, and Y. Kim, "The frogboiling attack: Limitations of anomaly detection for secure network coordinate systems, " in Proc. Secur. Privacy Commun. Netw., 2009, pp. 448-458.
    • (2009) Proc. Secur. Privacy Commun. Netw. , pp. 448-458
    • Chan-Tin, E.1    Feldman, D.2    Hopper, N.3    Kim, Y.4
  • 23
    • 0038650844 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • New York, NY, USA: Springer-Verlag, Oct.
    • A. Back and U. Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems, " Information Hiding. New York, NY, USA: Springer-Verlag, Oct. 2001.
    • (2001) Information Hiding
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 24
    • 49549085794 scopus 로고    scopus 로고
    • Detection of information flows
    • Nov.
    • T. He and L. Tong, "Detection of information flows, " IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 4925-4945, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 4925-4945
    • He, T.1    Tong, L.2
  • 25
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms, " Commun. ACM, vol. 24, no. 2, pp. 84-90, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 27
    • 84883349409 scopus 로고    scopus 로고
    • Admissible length study in anonymous networking: A detection theoretic perspective
    • Sep.
    • A. Mishra and P. Venkitasubramaniam, "Admissible length study in anonymous networking: A detection theoretic perspective, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1957-1969, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1957-1969
    • Mishra, A.1    Venkitasubramaniam, P.2
  • 28
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • May
    • X.Wang, S. Chen, and S. Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems, " in Proc. IEEE Symp. Secur. Privacy (SP). May 2007, pp. 116-130.
    • (2007) Proc. IEEE Symp. Secur. Privacy (SP) , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 29
    • 2642544584 scopus 로고    scopus 로고
    • From a trickle to a flood: Active attacks on several mix types
    • New York, NY, USA: Springer-Verlag
    • A. Serjantov, R. Dingledine, and P. Syverson, "From a trickle to a flood: Active attacks on several mix types, " in Information Hiding. New York, NY, USA: Springer-Verlag, 2003.
    • (2003) Information Hiding
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.3
  • 30
    • 84890390087 scopus 로고    scopus 로고
    • Anonymity of a buffer constrained chaum mix: Optimal strategy and asymptotics
    • Jul.
    • A. Mishra and P. Venkitasubramaniam, "Anonymity of a buffer constrained chaum mix: Optimal strategy and asymptotics, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, pp. 71-75.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 71-75
    • Mishra, A.1    Venkitasubramaniam, P.2
  • 31
    • 84929329298 scopus 로고    scopus 로고
    • Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs
    • Nov.
    • P. Pradhan and P. Venkitasubramaniam, "Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs, " in Proc. IEEE Inf. Theory Workshop, Nov. 2014. pp. 242-246.
    • (2014) Proc. IEEE Inf. Theory Workshop , pp. 242-246
    • Pradhan, P.1    Venkitasubramaniam, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.