Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








15,280 Hits in 7.0 sec

Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective [article]

Mauro Barni, Benedetta Tondi
2014 arXiv   pre-print
We analyze the distinguishability of two sources in a Neyman-Pearson set-up when an attacker is allowed to modify the output of one of the two sources subject to a distortion constraint.  ...  maximum average per-sample distortion introduced by the attacker for which the two sources can be distinguished ensuring arbitrarily small, yet positive, error exponents for type I and type II error probabilities  ...  ACKNOWLEDGMENT We thank Alessandro Agnetis for the useful discussions on the optimization problems underlying the computation of the EMD.  ... 
arXiv:1407.3704v1 fatcat:324r5qzwi5g7ramezz5kxf5uvi

Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations [article]

Ioannis Zografopoulos and Nikos D. Hatziargyriou and Charalambos Konstantinou
2023 arXiv   pre-print
(e.g., adversary/attack models) altogether.  ...  The digitization and decentralization of the electric power grid are key thrusts for an economically and environmentally sustainable future.  ...  Such distortions can result in under-or over-generation by the inverter, leading to uneconomic operation, and real or reactive power instabilities in the DER connected grid [74] . D.  ... 
arXiv:2205.11171v3 fatcat:37p7yho57jg5jiq3air4t5cze4

Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations [article]

Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia
2023 arXiv   pre-print
Consequently, an established body of literature has emerged that explores adversarial attacks targeting the underlying machine learning models.  ...  EvilEye exploits the camera's optics to induce misclassifications under a variety of illumination conditions.  ...  ,; as well as the IoBT REIGN Collaborative Research Alliance funded by the Army Research Laboratory (ARL) under Cooperative Agreement W911NF1720196.  ... 
arXiv:2307.13131v2 fatcat:t6bmh5tdybbu3iyeagbrmdplmi

Adversarial Attacks and Defenses in Deep Learning: from a Perspective of Cybersecurity

Shuai Zhou, Chi Liu, Dayong Ye, Tianqing Zhu, Wanlei Zhou, Philip S. Yu
2022 ACM Computing Surveys  
The framework is built from the perspective of cybersecurity so as to provide a lifecycle for adversarial attacks and defenses.  ...  Most focus on evasion attacks, where the adversarial examples are found at test time, as opposed to poisoning attacks where poisoned data is inserted into the training data.  ...  [34] proposed a targeted attack focusing on the perturbations under an L 0 distance metric, called Jacobian-based Saliency Map Approach (JSMA).  ... 
doi:10.1145/3547330 fatcat:d3x3oitysvb73ado5kuaqakgtu

A Taxonomy of Data Attacks in Power Systems [article]

Sagnik Basumallik
2020 arXiv   pre-print
In a macro-economic system, all major sectors: agriculture, extraction of natural resources, manufacturing, construction, transport, communication and health services, are dependent on a reliable supply  ...  For each class, a comprehensive review of mathematical attack models is presented.  ...  On the other hand, in energy supply deceiving attack, an attacker claims to provide additional or less energy than under normal circumstances.  ... 
arXiv:2002.11011v1 fatcat:qnh3li5os5b4tn2iadhy7f24ze

SVM Implementation for Ddos Attacks in Software Defined Networks

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
DDOS is an attack that in general leads to exhaust of the network resources in turn stopping the controller.  ...  The more common attacks that corrupt the network and hinders the efficiency are distributed denial-of-service (DDOS) attacks.  ...  Making sure about an application against DDoS attack is more diligently in the light of the fact that the created traffic doesn't appear to be changed both at system and transport levels.  ... 
doi:10.35940/ijitee.a8166.1110120 fatcat:uqgpckoqyrghxmic2cksyhb7di

Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey [article]

Yulong Wang, Tong Sun, Shenghong Li, Xin Yuan, Wei Ni, Ekram Hossain, H. Vincent Poor
2023 arXiv   pre-print
This is based on a rigorous evaluation of the existing works, including an analysis of their strengths and limitations.  ...  Specifically, we conduct a comprehensive classification of recent adversarial attack methods and state-of-the-art adversarial defense techniques based on attack principles, and present them in visually  ...  The defense effect under C&W attack is not optimal. Networks (AMM) are provided by Yan et al.  ... 
arXiv:2303.06302v1 fatcat:7kvsomuc7nghpmkh4krlplhnqu

Smart Grid Cyber-Physical Attack and Defense: A Review

Hang Zhang, Bo Liu, Hongyu Wu
2021 IEEE Access  
an exception that the subscript a denotes the under attack status.  ...  [82] proposed topology attacks in distinguishing from the FDI attack.  ... 
doi:10.1109/access.2021.3058628 fatcat:5p2dbk6dlnbnplungfhv6k55lu

Attacks classification and security mechanisms in Wireless Sensor Networks

Amine Kardi, Rachid Zagrouba
2019 Advances in Science, Technology and Engineering Systems  
This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker,  ...  Simulations implemented under the NS3 simulator prove that the network lifetime can decrease by more than 45% in the presence of attacks.  ...  Using a powerful signal, Hello flood attack broadcast the information of an optimal imaginary route according to which the sensors update their local tables.  ... 
doi:10.25046/aj040630 fatcat:vzooaabzxzdbfh5hkvvuyey36q

Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

Ismail Butun, Patrik Osterberg, Houbing Song
2019 IEEE Communications Surveys and Tutorials  
In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: "Passive Attacks" and "Active Attacks".  ...  Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper.  ...  The receiver cannot distinguish legitimate fragments from spoofed duplicates.  ... 
doi:10.1109/comst.2019.2953364 fatcat:wi7zt3goknciplqc2nhgqdfdei

A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions [article]

Ozlem Ceviz, Pinar Sadioglu, Sevil Sen
2023 arXiv   pre-print
Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations.  ...  This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and FANETs.  ...  An attack surface diagram offers a comprehensive perspective on all possible flaws within a system.  ... 
arXiv:2306.14281v3 fatcat:7md47g72hna7rkkguvs4z6jmgu

Anonymity with Tor: A Survey on Tor Attacks [article]

Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay Jha
2020 arXiv   pre-print
In this paper, we survey known Tor attacks and identify currently available techniques that lead to improved de-anonymisation of users and hidden services.  ...  As a result, various parties, including governments and law enforcement agencies, are interested in attacks that assist in de-anonymising the Tor network, disrupting its operations, and bypassing its censorship  ...  Traffic management -Tor's congestion control, quality of service, etc. are discussed in this category under application layer and transport layer approaches. 2.  ... 
arXiv:2009.13018v2 fatcat:eaijzylajvfxxluoueu3yf66mu

A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures [article]

Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar
2022 arXiv   pre-print
Furthermore, our survey has enabled us to: (i) propose a taxonomy for security vulnerabilities, attack vectors and countermeasures; (ii) interrelate attack vectors with security vulnerabilities and countermeasures  ...  Consequently, cyber adversaries leverage highly sophisticated attack vectors to exploit security vulnerabilities in C3I systems.  ...  ACKNOWLEDGMENTS The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government's Cooperative Research Centres Programme.  ... 
arXiv:2104.11906v2 fatcat:nvz3bssy55fwlcwqzkd7n3zism

Machine Learning-Enabled Cyber Attack Prediction and Mitigation for EV Charging Stations [article]

Mansi Girdhar, Junho Hong, Yongsik Yoo, Tai-Jin Song
2022 arXiv   pre-print
Safe and reliable electric vehicle charging stations (EVCSs) have become imperative in an intelligent transportation infrastructure.  ...  ) algorithms for modeling the security attacks.  ...  Moreover, the effectiveness of the proposed mitigations can be studied under realistic and sophisticated cyber attack scenarios. Fig. 1 . 1 Fig. 1. High-level overview of an EVCS.  ... 
arXiv:2208.10644v1 fatcat:phpjwuirnrgo5nhu2mwwtqadwq

The Security Margin: A measure of source distinguishability under adversarial conditions

Mauro Barni, Benedetta Tondi
2013 2013 IEEE Global Conference on Signal and Information Processing  
attacker for which the two sources can be reliably distinguished.  ...  We analyze the distinguishability of two sources under adversarial conditions, when the error exponents of type I and type II error probabilities are allowed to take an arbitrarily small, yet positive,  ...  By adopting a slightly different perspective, given two sources X and Y , one may wonder which is the maximum attacking distortion for which D can distinguish X and Y despite the presence of the adversary  ... 
doi:10.1109/globalsip.2013.6736856 dblp:conf/globalsip/BarniT13 fatcat:6wreptp2argnxcxiv57cp2rx6m
« Previous Showing results 1 — 15 out of 15,280 results