We present a moving target defense strategy to reduce the impact of stealthy sensor attacks on feedback systems. The defender periodically and randomly switches between thresholds from a discrete set to increase the uncertainty for the attacker and make stealthy attacks detectable. However, the defender does not know the exact goal of the attacker but only the prior of the possible attacker goals. Here, we model one period with a constant threshold as a Bayesian game and use the Bayesian Nash equilibrium concept to find the distribution for the choice of the threshold in that period, which takes the defender's uncertainty about the attacker into account. To obtain the equilibrium distribution, the defender minimizes its cost consisting of t...
Sparse stealth attack constructions that minimize the mutual information between the state variables...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
© 2020 IEEE.This paper investigates a moving target defense strategy based on detector threshold swi...
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communicat...
We consider the probabilistic planning problem for a defender (P1) who can jointly query the sensors...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
17 USC 105 interim-entered record; under temporary embargo.For moving target defense (MTD) to shift ...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework ...
This paper considers the problem of security allocation in a networked control system under stealthy...
In a cyber-physical system, there are potential sources of malicious attacks that can damage the est...
Abstract Defender-Attacker Stackelberg games are the foundations of tools deployed for computing opt...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework...
Sparse stealth attack constructions that minimize the mutual information between the state variables...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
© 2020 IEEE.This paper investigates a moving target defense strategy based on detector threshold swi...
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communicat...
We consider the probabilistic planning problem for a defender (P1) who can jointly query the sensors...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
17 USC 105 interim-entered record; under temporary embargo.For moving target defense (MTD) to shift ...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework ...
This paper considers the problem of security allocation in a networked control system under stealthy...
In a cyber-physical system, there are potential sources of malicious attacks that can damage the est...
Abstract Defender-Attacker Stackelberg games are the foundations of tools deployed for computing opt...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework...
Sparse stealth attack constructions that minimize the mutual information between the state variables...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...