attack model
Recently Published Documents


TOTAL DOCUMENTS

173
(FIVE YEARS 63)

H-INDEX

10
(FIVE YEARS 3)

2021 ◽  
pp. 1-48
Author(s):  
Parker Kotlarz ◽  
Juan C. Nino ◽  
Marcelo Febo

Abstract Alzheimer’s disease (AD) is a severe neurodegenerative disorder that affects a growing worldwide elderly population. Identification of brain functional biomarkers is expected to help determine preclinical stages for targeted mechanistic studies and development of therapeutic interventions to deter disease progression. Connectomic analysis, a graph theory-based methodology used in the analysis of brain-derived connectivity matrices was used in conjunction with percolation theory targeted attack model to investigate the network effects of AD-related amyloid deposition. We used matrices derived from resting state functional magnetic resonance imaging collected on mice with extracellular amyloidosis (TgCRND8 mice, n = 17) and control littermates (n = 17). Global, nodal, spatial, and percolation-based analysis was performed comparing AD and control mice. These data indicate a short-term compensatory response to neurodegeneration in the AD brain via a strongly connected core network with highly vulnerable or disconnected hubs. Targeted attacks demonstrated a greater vulnerability of AD brains to all types of attacks and identified progression models to mimic AD brain functional connectivity through betweenness centrality and collective influence metrics. Furthermore, both spatial analysis and percolation theory identified a key disconnect between the anterior brain of the AD mice to the rest of the brain network.


Author(s):  
Yuancheng Li ◽  
Haiyan Hou

The importance of Phasor Manipulation Unit (PMU) in the smart grid makes it a target for attackers who can create PMU Data Manipulation Attacks (PDMA) by adding a small constant to change the magnitude and angle of the voltage and current captured by the PMU. To prevent the attack result from being detected by PDMA detection based on the properties of equivalent impedance, this paper proposes a collaborative step attack. In this attack, the equivalent impedance’s value on the end of the transmission line is equal whether before or after been attack, which is taken as the constraint condition. The objective function of it is to minimize the number of the elements which is not 0 in attack vector but this number is not 0. Turn a vector construction problem into an optimization problem by building objective functions and constraints and then we use the Alternating Direction Method of Multipliers (ADMM) and Convex Relaxation (CR) to solve. The experiment verifies the feasibility of using the CR-ADMM algorithm to construct attack vectors from two aspects of attack vector construction time and vector sparsity. Further, it uses the constructed attack vectors to carry out attacks on PMU. The experimental results show that the measurement value of PMU will change after the attack, but the equivalent impedance value at both ends of the transmission line remains the same. The attack vector successfully bypasses the PDMA detection method based on the property of equivalent impedance and the attack model constructed based on this method was more covert than the original model.


Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2736
Author(s):  
Biao Sun ◽  
Zhou Gu ◽  
Tianyi Xiong

This study investigates the time-varying formation tracking (TVFT) control problem for multiple unmanned aerial vehicle (multi-UAV) systems under deception attacks by utilizing an event-triggered mechanism (ETM). First, for the sake of alleviating the communication burden, an effective ETM is designed in this paper. Second, to deal with deception attacks in the communication network, a random deception attack model under the designed ETM is constructed. Finally, a novel formation tracking control scheme for multi-UAV systems under deception attack combining the ETM is proposed to achieve the expected TVFT. The stability analysis of the formation control system is given by using the Lyapunov stability theory and linear matrix inequality (LMI) technique. Simulations are conducted to verify the effectiveness of the proposed formation control scheme.


2021 ◽  
Vol 2062 (1) ◽  
pp. 012001
Author(s):  
Rohit Bathla ◽  
Priyanka Ahlawat

Abstract Wireless sensor network (WSN) is the interconnection of very small sensors placed in hostile environments. It results in physically node capturing of a node. These further decreases the performance of key management scheme as number of captured nodes increases. In the paper, we approach the issue of node capturing from adversary view. Adversary is considered more intelligent and aims to capture less nodes with maximum destructiveness in the network. This reduces energy capturing cost of adversary in launching this attack. The proposed models exploit different vulnerable points in the networks to build a matrix based attack model. These use dominating set of nodes with node path vulnerability value to quantify the probability of network compromise. These also focus on low capturing cost nodes with high destructiveness in the network. Later, it also considers the travelling capturing cost which also be minimized. Thus all factors are used to compute final attack matrix. It is shown that above models have improved performance in damaging the network in terms of energy capturing cost and number of attacking rounds.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xinghua Liu ◽  
Dandan Bai ◽  
Yunling Lv ◽  
Rui Jiang ◽  
Shuzhi Sam Ge

Considering various cyberattacks aiming at the Internet of Vehicles (IoV), secure pose estimation has become an essential problem for ground vehicles. This paper proposes a pose estimation approach for ground vehicles under randomly occurring deception attacks. By modeling attacks as signals added to measurements with a certain probability, the attack model has been presented and incorporated into the existing process and measurement equations of ground vehicle pose estimation based on multisensor fusion. An unscented Kalman filter-based secure pose estimator is then proposed to generate a stable estimate of the vehicle pose states; i.e., an upper bound for the estimation error covariance is guaranteed. Finally, the simulation and experiments are conducted on a simple but effective single-input-single-output dynamic system and the ground vehicle model to show the effectiveness of UKF-based secure pose estimation. Particularly, the proposed scheme outperforms the conventional Kalman filter, not only by resulting in more accurate estimation but also by providing a theoretically proved upper bound of error covariance matrices that could be used as an indication of the estimator’s status.


2021 ◽  
pp. 1-8
Author(s):  
P. Shanmuga Sundari ◽  
M. Subaji

The recommendation system is affected with attacks when the users are given liberty to rate the items based on their impression about the product or service. Some malicious user or other competitors’ try to inject fake rating to degrade the item’s graces that are mostly adored by several users. Attacks in the rating matrix are not executed just by a single profile. A group of users profile is injected into rating matrix to decrease the performance. It is highly complex to extract the fake ratings from the mixture of genuine profile as it resides the same pattern. Identifying the attacked profile and the target item of the fake rating is a challenging task in the big data environment. This paper proposes a unique method to identify the attacks in collaborating filtering method. The process of extracting fake rating is carried out in two phases. During the initial phase, doubtful user profile is identified from the rating matrix. In the following phase, the target item is analysed using push attack count to reduce the false positive rates from the doubtful user profile. The proposed model is evaluated with detection rate and false positive rates by considering the filler size and attacks size. The experiment was conducted with 6%, 8% and 10% filler sizes and with different attack sizes that ranges from 0%–100%. Various classification techniques such as decision tree, logistic regression, SVM and random forest methods are used to classify the fake ratings. From the results, it is witnessed that SVM model works better with random and bandwagon attack models at an average of 4% higher accuracy. Similarly the decision tree method performance better at an average of 3% on average attack model.


Computers ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 87
Author(s):  
Juan Jose Gomez-Ricardez ◽  
Jose Juan Garcia-Hernandez

Although the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size content replacement attack is an attack against watermarking schemes which performs content replacement that increases or reduces the number of samples in the signal. This attack modifies the content and length of the signal, as well as desynchronizes the position of the watermark and its removal. In this paper, a source-channel coding approach for protecting an audio signal against this attack was applied. Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal. This technique allowed compressing at a bit rate of 64 kbps and obtaining a watermarked audio signal with an excellent quality scale. In the watermark restoration, an interpolation was applied after the source-channel decoding to recover the content and the length. The procedure of decimation–interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio. A synchronization strategy was designed to detect the positions where the number of samples in the signal was increased or reduced. The restoration ability of the proposed scheme was tested with a mathematical model of the discordant size content replacement attack. The attack model confirmed that it is necessary to design a synchronizing strategy to correctly extract the watermark and to recover the tampered signal. Experimental results show that the scheme has better restoration ability than state-of-the-art schemes. The scheme was able to restore a tampered area of around 20% with very good quality, and up to 58.3% with acceptable quality. The robustness against the discordant size content replacement attack was achieved with a transparency threshold above −2.


Energies ◽  
2021 ◽  
Vol 14 (13) ◽  
pp. 3887
Author(s):  
Mustain Billah ◽  
Adnan Anwar ◽  
Ziaur Rahman ◽  
Syed Md. Galib

Accurate building energy prediction is useful in various applications starting from building energy automation and management to optimal storage control. However, vulnerabilities should be considered when designing building energy prediction models, as intelligent attackers can deliberately influence the model performance using sophisticated attack models. These may consequently degrade the prediction accuracy, which may affect the efficiency and performance of the building energy management systems. In this paper, we investigate the impact of bi-level poisoning attacks on regression models of energy usage obtained from household appliances. Furthermore, an effective countermeasure against the poisoning attacks on the prediction model is proposed in this paper. Attacks and defenses are evaluated on a benchmark dataset. Experimental results show that an intelligent cyber-attacker can poison the prediction model to manipulate the decision. However, our proposed solution successfully ensures defense against such poisoning attacks effectively compared to other benchmark techniques.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-23
Author(s):  
Jun Zhou ◽  
Mengquan Li ◽  
Pengxing Guo ◽  
Weichen Liu

As an emerging role in new-generation on-chip communication, optical networks-on-chip (ONoCs) provide ultra-high bandwidth, low latency, and low power dissipation for data transfers. However, the thermo-optic effects of the photonic devices have a great impact on the operating performance and reliability of ONoCs, where the thermal-aware control with accurate measurements, e.g., thermal sensing, is typically applied to alleviate it. Besides, the temperature-sensitive ONoCs are prone to be attacked by the hardware Trojans (HTs) covertly embedded in the counterfeit integrated circuits (ICs) from the malicious third-party vendors, leading to performance degradation, denial-of-service (DoS), or even permanent damages. In this article, we focus on the tampering and snooping attacks during the thermal sensing via micro-ring resonator (MR) in ONoCs. Based on the provided workflow and attack model, a new structure of the anti-HT module is proposed to verify and protect the obtained data from the thermal sensor for attacks in its optical sampling and electronic transmission processes. In addition, we present the detection scheme based on the spiking neural networks (SNNs) to implement an accurate classification of the network security statuses for further high-level control. Evaluation results indicate that, with less than 1% extra area of a tile, our approach can significantly enhance the hardware security of thermal sensing for ONoC with trivial costs of up to 8.73%, 5.32%, and 6.14% in average latency, execution time, and energy consumption, respectively.


Sign in / Sign up

Export Citation Format

Share Document