论文标题

隐形数据注射攻击具有稀疏性约束

Stealth Data Injection Attacks with Sparsity Constraints

论文作者

Ye, Xiuzhen, Esnaola, Iñaki, Perlaza, Samir M., Harrison, Robert F.

论文摘要

提出了稀疏的隐形攻击结构,以最大程度地减少状态变量和观察结果之间的相互信息。攻击构建被制定为多元高斯分布的设计,该设计旨在最大程度地减少互信息,同时限制攻击下观测值的分布与无攻击的观测值分布之间的kullback-leibler差异。稀疏性约束被合并为攻击分布的支持约束。提出了两种攻击结构的启发式贪婪算法。第一种算法假定攻击向量由独立条目组成,因此,不同的攻击位置不需要通信。第二种算法考虑了攻击矢量入口之间的相关性,这会导致更好的攻击性能,但以不同位置之间的协调为代价。我们从数值上评估了对IEEE测试系统的拟议攻击结构的性能,并表明构建隐形攻击以造成严重破坏而使用较少损坏的传感器是可行的。

Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution that aims to minimize the mutual information while limiting the Kullback-Leibler divergence between the distribution of the observations under attack and the distribution of the observations without attack. The sparsity constraint is incorporated as a support constraint of the attack distribution. Two heuristic greedy algorithms for the attack construction are proposed. The first algorithm assumes that the attack vector consists of independent entries, and therefore, requires no communication between different attacked locations. The second algorithm considers correlation between the attack vector entries which results in better attack performance at the expense of coordination between different locations. We numerically evaluate the performance of the proposed attack constructions on IEEE test systems and show that it is feasible to construct stealth attacks that generate significant disruption with a low number of compromised sensors.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源