首页 > 最新文献

Proceedings of the 3rd international conference on High confidence networked systems最新文献

英文 中文
User interface design and verification for semi-autonomous driving 半自动驾驶用户界面设计与验证
Dorsa Sadigh, K. Driggs-Campbell, R. Bajcsy, S. Sastry, S. Seshia
This paper presents a project in its early stages of development, in which we propose a solution to the problem of human interaction with autonomous vehicles. We have devised a method for design of a user interface that displays sufficient and crucial information to the driver. Our contribution in this work is (i) identifying different modes of driving behavior, (ii) building an expectation model of a driver, and (iii) implementing an interface system.
本文介绍了一个处于早期发展阶段的项目,在这个项目中,我们提出了一个解决人类与自动驾驶汽车互动问题的方案。我们设计了一种用户界面的设计方法,可以向驱动程序显示充分和关键的信息。我们在这项工作中的贡献是(i)识别驾驶行为的不同模式,(ii)建立驾驶员的期望模型,以及(iii)实现接口系统。
{"title":"User interface design and verification for semi-autonomous driving","authors":"Dorsa Sadigh, K. Driggs-Campbell, R. Bajcsy, S. Sastry, S. Seshia","doi":"10.1145/2566468.2576851","DOIUrl":"https://doi.org/10.1145/2566468.2576851","url":null,"abstract":"This paper presents a project in its early stages of development, in which we propose a solution to the problem of human interaction with autonomous vehicles. We have devised a method for design of a user interface that displays sufficient and crucial information to the driver. Our contribution in this work is (i) identifying different modes of driving behavior, (ii) building an expectation model of a driver, and (iii) implementing an interface system.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123758732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A network interdiction model for analyzing the vulnerability of water distribution systems 供水系统脆弱性分析的网络拦截模型
L. Perelman, Saurabh Amin
This article presents a network interdiction model to assess the vulnerabilities of a class of physical flow networks. A flow network is modeled by a potential function defined over the nodes and a flow function defined over arcs (links). In particular, the difference in potential function between two nodes is characterized by a nonlinear flux function of the flow on link between the two nodes. To assess the vulnerability of the network to adversarial attack, the problem is formulated as an attacker-defender network interdiction model. The attacker's objective is to interdict the most valuable links of the network given his resource constraints. The defender's objective is to minimize power loss and the unmet demand in the network. A bi-level approach is explored to identify most critical links for network interdiction. The applicability of the proposed approach is demonstrated on a reference water distribution network, and its utility toward developing mitigation plans is discussed.
本文提出了一个网络拦截模型来评估一类物理流网络的漏洞。流网络由定义在节点上的势函数和定义在弧(链接)上的流函数来建模。特别地,两个节点之间的位势函数的差异可以用两个节点之间的连接流的非线性通量函数来表征。为了评估网络对对抗性攻击的脆弱性,将问题表述为攻击者-防御者网络拦截模型。攻击者的目标是在给定资源限制的情况下阻断网络中最有价值的链接。防御者的目标是最小化网络中的功率损失和未满足的需求。探索了一种双层方法来确定网络拦截的最关键环节。在一个参考配水网络上验证了该方法的适用性,并讨论了其在制定缓解计划方面的实用性。
{"title":"A network interdiction model for analyzing the vulnerability of water distribution systems","authors":"L. Perelman, Saurabh Amin","doi":"10.1145/2566468.2566480","DOIUrl":"https://doi.org/10.1145/2566468.2566480","url":null,"abstract":"This article presents a network interdiction model to assess the vulnerabilities of a class of physical flow networks. A flow network is modeled by a potential function defined over the nodes and a flow function defined over arcs (links). In particular, the difference in potential function between two nodes is characterized by a nonlinear flux function of the flow on link between the two nodes. To assess the vulnerability of the network to adversarial attack, the problem is formulated as an attacker-defender network interdiction model. The attacker's objective is to interdict the most valuable links of the network given his resource constraints. The defender's objective is to minimize power loss and the unmet demand in the network. A bi-level approach is explored to identify most critical links for network interdiction. The applicability of the proposed approach is demonstrated on a reference water distribution network, and its utility toward developing mitigation plans is discussed.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134119426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Cyber-insurance framework for large scale interdependent networks 大规模相互依赖网络的网络保险框架
G. Schwartz, S. Sastry
This article presents a framework for managing cyber-risks in large-scale interdependent networks where cyber insurers are strategic players. In our earlier work, we imposed that breach probability of each network node (which we view as a player) is a function of two variables: first, player own security action and second, average security of all players. In this article, we formally derive the expression of breach probability from the standard assumptions. For a homogeneous interdependent network (identical users), we provide a solution for optimal security choice of each node in environments without and with cyber insurers present. Then, we introduce a general heterogeneous network (many user types), and derive the expression for network security. Lastly, we consider the network with two user types (normal and malicious), in which we allow one user type (malicious users) to subvert monitoring of the insurers, even if these insurers are able to perfectly enforce security levels of normal users (at zero cost). Our analysis confirms a discrepancy between informal arguments that favor cyber-insurance as a tool to improve network security, and formal models, which tend to view insurance as an instrument of managing risks only. In particular, our results support the case against cyber-insurance as the means of improving security. Our framework helps to identify the crucial network parameters for improving incentives to provide secure networks.
本文提出了在网络保险公司作为战略参与者的大规模相互依赖网络中管理网络风险的框架。在我们早期的工作中,我们假定每个网络节点(我们将其视为一个玩家)的泄露概率是两个变量的函数:首先,玩家自己的安全行为,其次,所有玩家的平均安全。本文从标准假设出发,正式推导出违约概率的表达式。对于同质相互依赖的网络(相同的用户),我们提供了在没有和有网络保险公司存在的环境中每个节点的最佳安全选择的解决方案。然后,我们介绍了一个一般的异构网络(多用户类型),并推导了网络安全的表达式。最后,我们考虑具有两种用户类型(正常和恶意)的网络,其中我们允许一种用户类型(恶意用户)破坏对保险公司的监控,即使这些保险公司能够完美地执行正常用户的安全级别(零成本)。我们的分析证实了支持网络保险作为提高网络安全工具的非正式论点与倾向于将保险视为管理风险工具的正式模型之间的差异。特别是,我们的研究结果支持了反对将网络保险作为提高安全性手段的观点。我们的框架有助于确定关键的网络参数,以提高提供安全网络的激励。
{"title":"Cyber-insurance framework for large scale interdependent networks","authors":"G. Schwartz, S. Sastry","doi":"10.1145/2566468.2566481","DOIUrl":"https://doi.org/10.1145/2566468.2566481","url":null,"abstract":"This article presents a framework for managing cyber-risks in large-scale interdependent networks where cyber insurers are strategic players. In our earlier work, we imposed that breach probability of each network node (which we view as a player) is a function of two variables: first, player own security action and second, average security of all players. In this article, we formally derive the expression of breach probability from the standard assumptions. For a homogeneous interdependent network (identical users), we provide a solution for optimal security choice of each node in environments without and with cyber insurers present. Then, we introduce a general heterogeneous network (many user types), and derive the expression for network security. Lastly, we consider the network with two user types (normal and malicious), in which we allow one user type (malicious users) to subvert monitoring of the insurers, even if these insurers are able to perfectly enforce security levels of normal users (at zero cost). Our analysis confirms a discrepancy between informal arguments that favor cyber-insurance as a tool to improve network security, and formal models, which tend to view insurance as an instrument of managing risks only. In particular, our results support the case against cyber-insurance as the means of improving security. Our framework helps to identify the crucial network parameters for improving incentives to provide secure networks.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129760780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A formal verification approach to revealing stealth attacks on networked control systems 揭示网络控制系统隐形攻击的形式化验证方法
N. Trcka, M. Moulin, S. D. Bopardikar, A. Speranzon
We develop methods to determine if networked control systems can be compromised by stealth attacks, and derive design strategies to secure these systems. A stealth attack is a form of a cyber-physical attack where the adversary compromises the information between the plant and the controller, with the intention to drive the system into a bad state and at the same time stay undetected. We define the discovery problem as a formal verification problem, where generated counterexamples (if any) correspond to actual attack vectors. The analysis is entirely performed in Simulink, using Simulink Design Verifier as the verification engine. A small case study is presented to illustrate the results, and a branch-and-bound algorithm is proposed to perform optimal system securing.
我们开发了方法来确定网络控制系统是否可以被隐形攻击所破坏,并推导出保护这些系统的设计策略。隐形攻击是网络物理攻击的一种形式,攻击者破坏设备和控制器之间的信息,意图将系统带入不良状态,同时不被发现。我们将发现问题定义为形式化验证问题,其中生成的反例(如果有的话)对应于实际的攻击向量。分析完全在Simulink中完成,使用Simulink Design Verifier作为验证引擎。通过一个小的实例来说明结果,并提出了一种分支定界算法来实现最优的系统安全。
{"title":"A formal verification approach to revealing stealth attacks on networked control systems","authors":"N. Trcka, M. Moulin, S. D. Bopardikar, A. Speranzon","doi":"10.1145/2566468.2566484","DOIUrl":"https://doi.org/10.1145/2566468.2566484","url":null,"abstract":"We develop methods to determine if networked control systems can be compromised by stealth attacks, and derive design strategies to secure these systems. A stealth attack is a form of a cyber-physical attack where the adversary compromises the information between the plant and the controller, with the intention to drive the system into a bad state and at the same time stay undetected. We define the discovery problem as a formal verification problem, where generated counterexamples (if any) correspond to actual attack vectors. The analysis is entirely performed in Simulink, using Simulink Design Verifier as the verification engine. A small case study is presented to illustrate the results, and a branch-and-bound algorithm is proposed to perform optimal system securing.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115286787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multilateral trades in interconnected power systems: a local public goods approach 互联电力系统中的多边贸易:地方公共产品方法
Erik Miehling, D. Teneketzis
We study the multilateral trade problem in interconnected power systems with asymmetric information and non-strategic regional transmission operators (RTOs). We consider a physical network with finite capacity lines connecting the buses within and between RTOs. Each RTO knows the network topology, bus angle constraints, and cost functions within its own region. Each RTO also knows the topology of the network connecting its own region to its neighboring regions and the bus angle constraints of the buses of neighboring RTOs that are immediately connected to its own region. The transmission system is modeled by a modified DC approximation where the power flow equations are represented as convex functions of the angle difference between buses; such an approximation considers lossy flows. The objective is to determine multilateral trades that satisfy the network's informational and physical constraints and minimize the sum of costs of all RTOs. We formulate the above multilateral trade problem as a local public goods problem. We propose a two-layer optimization algorithm that satisfies the problem's informational and physical constraints and results in a sequence of trades that converges to a trade which achieves a local minimum of the corresponding non-convex centralized information multilateral trade problem.
研究了具有非对称信息和非战略性区域输电运营商的互联电力系统中的多边贸易问题。我们考虑一个具有有限容量线路的物理网络,这些线路连接rto内部和之间的总线。每个RTO都知道自己区域内的网络拓扑结构、总线角度约束和成本函数。每个RTO还知道连接自己区域和邻近区域的网络的拓扑结构,以及直接连接到自己区域的邻近RTO的总线的总线角度约束。采用改进的直流近似法对输电系统进行建模,其中潮流方程表示为母线间角度差的凸函数;这种近似考虑了有损流。目标是确定满足网络信息和物理约束的多边贸易,并使所有rto的成本总和最小。我们将上述多边贸易问题表述为地方公共产品问题。我们提出了一种两层优化算法,该算法满足问题的信息约束和物理约束,使一系列交易收敛到达到相应的非凸集中信息多边贸易问题的局部最小值。
{"title":"Multilateral trades in interconnected power systems: a local public goods approach","authors":"Erik Miehling, D. Teneketzis","doi":"10.1145/2566468.2566479","DOIUrl":"https://doi.org/10.1145/2566468.2566479","url":null,"abstract":"We study the multilateral trade problem in interconnected power systems with asymmetric information and non-strategic regional transmission operators (RTOs). We consider a physical network with finite capacity lines connecting the buses within and between RTOs. Each RTO knows the network topology, bus angle constraints, and cost functions within its own region. Each RTO also knows the topology of the network connecting its own region to its neighboring regions and the bus angle constraints of the buses of neighboring RTOs that are immediately connected to its own region. The transmission system is modeled by a modified DC approximation where the power flow equations are represented as convex functions of the angle difference between buses; such an approximation considers lossy flows. The objective is to determine multilateral trades that satisfy the network's informational and physical constraints and minimize the sum of costs of all RTOs. We formulate the above multilateral trade problem as a local public goods problem. We propose a two-layer optimization algorithm that satisfies the problem's informational and physical constraints and results in a sequence of trades that converges to a trade which achieves a local minimum of the corresponding non-convex centralized information multilateral trade problem.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129822555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the security of interoperable medical devices using attack graphs 使用攻击图了解可互操作医疗设备的安全性
Curtis R. Taylor, K. Venkatasubramanian, Craig A. Shue
Medical device interoperability is an increasingly prevalent example of how computing and information technology will revolutionize and streamline medical care. The overarching goal of interoperable medical devices (IMDs) is increased safety, usability, decision support, and a decrease in false alarms and clinician cognitive workload. One aspect that has not been considered thus far is ensuring IMDs do not inadvertently harm patients in the presence of malicious adversaries. Security for medical devices has gained some traction in the recent years following some well-publicized attacks on individual devices, such as pacemakers and insulin pumps. This has resulted in solutions being proposed for securing these devices, usually in stand-alone mode. However, the introduction of interoperability makes medical devices increasingly connected and dependent on each other. Therefore, security attacks on IMDs becomes easier to mount in a stealthy manner with potentially devastating consequences. This work outlines our effort in understanding the threats faced by IMDs, an important first step in eventually designing secure interoperability architectures. In this regard, we present: (1) a detailed attack graph-based analysis of threats on a specific interoperability environment based on providing a patient pain medication (PCA), under various levels of interoperability from simple data aggregation to fully closed-loop control; (2) a description of the mitigation approaches possible for each of class of attack vectors identified; and (3) lessons learned from this experience which can be leveraged for improving existing IMD architectures from a security point-of-view. Our analysis demonstrates that em even if we use provably safe medical systems in an interoperable setting with a safe interoperability engine, the presence of malicious behavior may render the entire setup unsafe for the patients, unless security is explicitly considered}
医疗设备互操作性是计算和信息技术将如何革新和简化医疗保健的一个日益普遍的例子。可互操作医疗设备(imd)的首要目标是提高安全性、可用性、决策支持,并减少误报和临床医生的认知工作量。到目前为止,还没有考虑到的一个方面是确保imd不会在恶意对手存在的情况下无意中伤害患者。近年来,在一些广为人知的针对起搏器和胰岛素泵等个人设备的攻击之后,医疗设备的安全性得到了一些关注。这导致提出了保护这些设备的解决方案,通常是在独立模式下。然而,互操作性的引入使医疗设备越来越相互连接和依赖。因此,对imd的安全攻击变得更容易以隐蔽的方式进行,并可能造成毁灭性的后果。这项工作概述了我们在理解imd面临的威胁方面所做的努力,这是最终设计安全互操作性体系结构的重要的第一步。在这方面,我们提出:(1)在从简单数据聚合到全闭环控制的各种互操作性水平下,基于提供患者止痛药(PCA)的特定互操作性环境中基于攻击图的详细威胁分析;(2)对已确定的每一类攻击媒介可能采取的缓解方法的描述;(3)从这一经验中吸取的教训,可以从安全的角度来改进现有的IMD架构。我们的分析表明,即使我们在具有安全互操作性引擎的可互操作设置中使用可证明安全的医疗系统,除非明确考虑安全性,否则恶意行为的存在可能会使整个设置对患者不安全。
{"title":"Understanding the security of interoperable medical devices using attack graphs","authors":"Curtis R. Taylor, K. Venkatasubramanian, Craig A. Shue","doi":"10.1145/2566468.2566482","DOIUrl":"https://doi.org/10.1145/2566468.2566482","url":null,"abstract":"Medical device interoperability is an increasingly prevalent example of how computing and information technology will revolutionize and streamline medical care. The overarching goal of interoperable medical devices (IMDs) is increased safety, usability, decision support, and a decrease in false alarms and clinician cognitive workload. One aspect that has not been considered thus far is ensuring IMDs do not inadvertently harm patients in the presence of malicious adversaries. Security for medical devices has gained some traction in the recent years following some well-publicized attacks on individual devices, such as pacemakers and insulin pumps. This has resulted in solutions being proposed for securing these devices, usually in stand-alone mode. However, the introduction of interoperability makes medical devices increasingly connected and dependent on each other. Therefore, security attacks on IMDs becomes easier to mount in a stealthy manner with potentially devastating consequences. This work outlines our effort in understanding the threats faced by IMDs, an important first step in eventually designing secure interoperability architectures. In this regard, we present: (1) a detailed attack graph-based analysis of threats on a specific interoperability environment based on providing a patient pain medication (PCA), under various levels of interoperability from simple data aggregation to fully closed-loop control; (2) a description of the mitigation approaches possible for each of class of attack vectors identified; and (3) lessons learned from this experience which can be leveraged for improving existing IMD architectures from a security point-of-view. Our analysis demonstrates that em even if we use provably safe medical systems in an interoperable setting with a safe interoperability engine, the presence of malicious behavior may render the entire setup unsafe for the patients, unless security is explicitly considered}","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Graph-based verification and misbehavior detection in multi-agent networks 多智能体网络中基于图的验证与错误行为检测
Phillip Lee, Omar S. Saleh, Basel Alomair, L. Bushnell, R. Poovendran
Multi-agent networks consist of autonomous nodes, where each node maintains and updates its state based on exchanged information with its neighboring nodes. Due to the collaborative nature of state updates, if one or more nodes were to misbehave by deviating from the pre-specified update rule, they can bias the states of other nodes and thus drive the network to an undesirable state. In this paper, we present a query-based mechanism for a third-party verifier to detect misbehaving nodes. The proposed mechanism consists of two components. The first component determines whether the state of the queried node is consistent with its ideal value. The second component identifies the set of misbehaving nodes that induced the inconsistency. We prove that our approach detects the set of misbehaving nodes, as well as the times of their misbehaviors, by establishing the equivalence of our approach to a tree-generation algorithm. We evaluate our approach through simulation study which corroborates the theoretical guarantees, and analyzes the performance of our scheme as a function of the number of queried nodes.
多智能体网络由自治节点组成,每个节点根据与其相邻节点交换的信息维护和更新自己的状态。由于状态更新的协作性质,如果一个或多个节点偏离预先指定的更新规则而行为不当,它们可能会使其他节点的状态发生偏差,从而将网络驱动到不希望的状态。在本文中,我们为第三方验证者提供了一种基于查询的机制来检测行为不端的节点。提议的机制由两个部分组成。第一个组件确定被查询节点的状态是否与其理想值一致。第二个组件标识导致不一致的行为不端的节点集。通过建立我们的方法与树生成算法的等价性,我们证明了我们的方法可以检测到行为不端的节点集,以及它们行为不端的次数。我们通过仿真研究验证了我们的方法,验证了理论保证,并分析了我们的方案性能作为查询节点数量的函数。
{"title":"Graph-based verification and misbehavior detection in multi-agent networks","authors":"Phillip Lee, Omar S. Saleh, Basel Alomair, L. Bushnell, R. Poovendran","doi":"10.1145/2566468.2566477","DOIUrl":"https://doi.org/10.1145/2566468.2566477","url":null,"abstract":"Multi-agent networks consist of autonomous nodes, where each node maintains and updates its state based on exchanged information with its neighboring nodes. Due to the collaborative nature of state updates, if one or more nodes were to misbehave by deviating from the pre-specified update rule, they can bias the states of other nodes and thus drive the network to an undesirable state. In this paper, we present a query-based mechanism for a third-party verifier to detect misbehaving nodes. The proposed mechanism consists of two components. The first component determines whether the state of the queried node is consistent with its ideal value. The second component identifies the set of misbehaving nodes that induced the inconsistency. We prove that our approach detects the set of misbehaving nodes, as well as the times of their misbehaviors, by establishing the equivalence of our approach to a tree-generation algorithm. We evaluate our approach through simulation study which corroborates the theoretical guarantees, and analyzes the performance of our scheme as a function of the number of queried nodes.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131775915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Passivity framework for modeling, mitigating, and composing attacks on networked systems 用于对网络系统建模、减轻和组合攻击的被动性框架
R. Poovendran
Cyber-physical systems (CPS) consist of a tight coupling between cyber (sensing and computation) and physical (actuation and control) components. As a result of this coupling, CPS are vulnerable to both known and emerging cyber attacks, which can degrade the safety, availability, and reliability of the system. A key step towards guaranteeing CPS operation in the presence of threats is developing quantitative models of attacks and their impact on the system and express them in the language of CPS. Traditionally, such models have been introduced within the framework of formal methods and verification. In this talk, we present a control-theoretic modeling framework. We demonstrate that the control-theoretic approach can capture the adaptive and time-varying strategic interaction between the adversary and the targeted system. Furthermore, control theory provides a common language in which to describe both the physical dynamics of the system, as well as the impact of the attack and defense. In particular, we provide a passivity-based approach for modeling and mitigating jamming and wormhole attacks. We demonstrate that passivity enables composition of multiple attack and defense mechanisms, allowing characterization of the overall performance of the system under attack. Our view is that the formal methods and the control-based approaches are complementary.
信息物理系统(CPS)由网络(感知和计算)和物理(驱动和控制)组件之间的紧密耦合组成。由于这种耦合,CPS容易受到已知和新出现的网络攻击,从而降低系统的安全性、可用性和可靠性。确保CPS在存在威胁的情况下运行的关键一步是开发攻击的定量模型及其对系统的影响,并用CPS的语言表达它们。传统上,这种模型是在正式方法和验证的框架内引入的。在这次演讲中,我们提出了一个控制理论建模框架。我们证明了控制理论方法可以捕获对手与目标系统之间的自适应和时变策略交互作用。此外,控制理论提供了一种通用语言来描述系统的物理动力学,以及攻击和防御的影响。特别是,我们提供了一种基于被动的方法来建模和减轻干扰和虫洞攻击。我们证明了被动性能够组合多种攻击和防御机制,从而可以表征系统在攻击下的整体性能。我们的观点是,形式化方法和基于控制的方法是互补的。
{"title":"Passivity framework for modeling, mitigating, and composing attacks on networked systems","authors":"R. Poovendran","doi":"10.1145/2566468.2566470","DOIUrl":"https://doi.org/10.1145/2566468.2566470","url":null,"abstract":"Cyber-physical systems (CPS) consist of a tight coupling between cyber (sensing and computation) and physical (actuation and control) components. As a result of this coupling, CPS are vulnerable to both known and emerging cyber attacks, which can degrade the safety, availability, and reliability of the system. A key step towards guaranteeing CPS operation in the presence of threats is developing quantitative models of attacks and their impact on the system and express them in the language of CPS. Traditionally, such models have been introduced within the framework of formal methods and verification. In this talk, we present a control-theoretic modeling framework. We demonstrate that the control-theoretic approach can capture the adaptive and time-varying strategic interaction between the adversary and the targeted system. Furthermore, control theory provides a common language in which to describe both the physical dynamics of the system, as well as the impact of the attack and defense. In particular, we provide a passivity-based approach for modeling and mitigating jamming and wormhole attacks. We demonstrate that passivity enables composition of multiple attack and defense mechanisms, allowing characterization of the overall performance of the system under attack. Our view is that the formal methods and the control-based approaches are complementary.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132800124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient distributed parameter estimation in heterogeneous time-varying networks 异构时变网络的弹性分布参数估计
Heath J. LeBlanc, F. Hassan
In this paper, we study a lightweight algorithm for distributed parameter estimation in a heterogeneous network in the presence of adversary nodes. All nodes interact under a local broadcast model of communication in a time-varying network comprised of many inexpensive normal nodes, along with several more expensive, reliable nodes. Either the normal or reliable nodes may be tampered with and overtaken by an adversary, thus becoming an adversary node. The reliable nodes have an accurate estimate of their true parameters, whereas the inexpensive normal nodes communicate and take difference measurements with neighbors in the network in order to better estimate their parameters. The normal nodes are unsure, a priori, about which of their neighbors are normal, reliable, or adversary nodes. However, by sharing information on their local estimates with neighbors, we prove that the resilient iterative distributed estimation (RIDE) algorithm, which utilizes redundancy by removing extreme information, is able to drive the local estimates to their true parameters as long as each normal node is able to interact with a sufficient number of reliable nodes often enough and is not directly influenced by too many adversary nodes.
在本文中,我们研究了在存在敌对节点的异构网络中分布式参数估计的轻量级算法。在一个时变网络中,所有节点都在本地广播通信模型下进行交互,该网络由许多廉价的正常节点以及几个更昂贵、更可靠的节点组成。正常或可靠的节点都可能被对手篡改和超越,从而成为对手节点。可靠的节点对其真实参数有准确的估计,而便宜的正常节点为了更好地估计其参数,与网络中的邻居进行通信和差分测量。正常节点先验地不确定它们的邻居中哪个是正常的、可靠的或敌对的节点。然而,通过与邻居共享局部估计的信息,我们证明了弹性迭代分布式估计(RIDE)算法能够通过去除极端信息来利用冗余,只要每个正常节点能够与足够数量的可靠节点进行足够频繁的交互,并且不受太多敌对节点的直接影响,就能够将局部估计驱动到它们的真实参数。
{"title":"Resilient distributed parameter estimation in heterogeneous time-varying networks","authors":"Heath J. LeBlanc, F. Hassan","doi":"10.1145/2566468.2566476","DOIUrl":"https://doi.org/10.1145/2566468.2566476","url":null,"abstract":"In this paper, we study a lightweight algorithm for distributed parameter estimation in a heterogeneous network in the presence of adversary nodes. All nodes interact under a local broadcast model of communication in a time-varying network comprised of many inexpensive normal nodes, along with several more expensive, reliable nodes. Either the normal or reliable nodes may be tampered with and overtaken by an adversary, thus becoming an adversary node. The reliable nodes have an accurate estimate of their true parameters, whereas the inexpensive normal nodes communicate and take difference measurements with neighbors in the network in order to better estimate their parameters. The normal nodes are unsure, a priori, about which of their neighbors are normal, reliable, or adversary nodes. However, by sharing information on their local estimates with neighbors, we prove that the resilient iterative distributed estimation (RIDE) algorithm, which utilizes redundancy by removing extreme information, is able to drive the local estimates to their true parameters as long as each normal node is able to interact with a sufficient number of reliable nodes often enough and is not directly influenced by too many adversary nodes.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Resilient distributed consensus for tree topology 树拓扑的弹性分布式一致性
M. Yampolskiy, Yevgeniy Vorobeychik, X. Koutsoukos, P. Horváth, Heath J. LeBlanc, J. Sztipanovits
Distributed consensus protocols are an important class of distributed algorithms. Recently, an Adversarial Resilient Consensus Protocol (ARC-P) has been proposed which is capable to achieve consensus despite false information provided by a limited number of malicious nodes. In order to withstand false information, this algorithm requires a mesh-like topology, so that multiple alternative information flow paths exist. However, these assumptions are not always valid. For instance, in Smart Grid, an emerging distributed CPS, the node connectivity is expected to resemble the scale free network topology. Especially closer to the end customer, in home and building area networks, the connectivity graph resembles a tree structure. In this paper, we propose a Range-based Adversary Resilient Consensus Protocol (R.ARC-P). Three aspects distinguish R.ARC-P from its predecessor: This protocol operates on the tree topology, it distinguishes between trustworthiness of nodes in the immediate neighborhood, and it uses a valid value range in order to reduce the number of nodes considered as outliers. R.ARC-P is capable of reaching global consensus among all genuine nodes in the tree if assumptions about maximal number of malicious nodes in the neighborhood hold. In the case that this assumption is wrong, it is still possible to reach Strong Partial Consensus, i.e., consensus between leafs of at least two different parents.
分布式共识协议是一类重要的分布式算法。最近,人们提出了一种对抗弹性共识协议(ARC-P),该协议能够在有限数量的恶意节点提供虚假信息的情况下达成共识。为了抵御虚假信息,该算法需要一个类似网格的拓扑结构,以便存在多个可供选择的信息流路径。然而,这些假设并不总是有效的。例如,在新兴的分布式CPS智能电网中,节点连接被期望类似于无标度网络拓扑结构。特别是靠近终端用户,在家庭和建筑区域网络中,连接图类似于树形结构。在本文中,我们提出了一种基于范围的对手弹性共识协议(R.ARC-P)。R.ARC-P与它的前身有三个方面的区别:该协议在树拓扑上运行,它区分了近邻节点的可信度,它使用一个有效的值范围来减少被认为是异常值的节点的数量。如果对邻域内恶意节点的最大数量的假设成立,R.ARC-P能够在树中所有真实节点之间达成全局共识。在这种假设是错误的情况下,仍然有可能达到强部分共识,即至少两个不同亲本的叶子之间的共识。
{"title":"Resilient distributed consensus for tree topology","authors":"M. Yampolskiy, Yevgeniy Vorobeychik, X. Koutsoukos, P. Horváth, Heath J. LeBlanc, J. Sztipanovits","doi":"10.1145/2566468.2566485","DOIUrl":"https://doi.org/10.1145/2566468.2566485","url":null,"abstract":"Distributed consensus protocols are an important class of distributed algorithms. Recently, an Adversarial Resilient Consensus Protocol (ARC-P) has been proposed which is capable to achieve consensus despite false information provided by a limited number of malicious nodes. In order to withstand false information, this algorithm requires a mesh-like topology, so that multiple alternative information flow paths exist. However, these assumptions are not always valid. For instance, in Smart Grid, an emerging distributed CPS, the node connectivity is expected to resemble the scale free network topology. Especially closer to the end customer, in home and building area networks, the connectivity graph resembles a tree structure. In this paper, we propose a Range-based Adversary Resilient Consensus Protocol (R.ARC-P). Three aspects distinguish R.ARC-P from its predecessor: This protocol operates on the tree topology, it distinguishes between trustworthiness of nodes in the immediate neighborhood, and it uses a valid value range in order to reduce the number of nodes considered as outliers. R.ARC-P is capable of reaching global consensus among all genuine nodes in the tree if assumptions about maximal number of malicious nodes in the neighborhood hold. In the case that this assumption is wrong, it is still possible to reach Strong Partial Consensus, i.e., consensus between leafs of at least two different parents.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126489588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 3rd international conference on High confidence networked systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1