Asymptotic Learning Requirements for Stealth Attacks

12/22/2021
by   Ke Sun, et al.
0

Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of detection. For Gaussian distributed state variables, attack construction requires knowledge of the second order statistics of the state variables, which is estimated from a finite number of past realizations using a sample covariance matrix. Within this framework, the attack performance is studied for the attack construction with the sample covariance matrix. This results in an analysis of the amount of data required to learn the covariance matrix of the state variables used on the attack construction. The ergodic attack performance is characterized using asymptotic random matrix theory tools, and the variance of the attack performance is bounded. The ergodic performance and the variance bounds are assessed with simulations on IEEE test systems.

READ FULL TEXT
research
02/21/2019

Learning requirements for stealth attacks

The learning data requirements are analyzed for the construction of stea...
research
08/13/2018

Stealth Attacks on the Smart Grid

Random attacks that jointly minimize the amount of information acquired ...
research
09/14/2021

Asymptotic normality for eigenvalue statistics of a general sample covariance matrix when p/n →∞ and applications

The asymptotic normality for a large family of eigenvalue statistics of ...
research
01/24/2021

Testing for subsphericity when n and p are of different asymptotic order

In this short note, we extend a classical test of subsphericity, based o...
research
04/27/2023

Optimal Covariance Cleaning for Heavy-Tailed Distributions: Insights from Information Theory

In optimal covariance cleaning theory, minimizing the Frobenius norm bet...
research
01/26/2018

Graph-Theoretic Framework for Unified Analysis of Observability and Data Injection Attacks in the Smart Grid

In this paper, a novel graph-theoretic framework is proposed to generali...
research
03/07/2018

Mean field repulsive Kuramoto models: Phase locking and spatial signs

The phenomenon of self-synchronization in populations of oscillatory uni...

Please sign up or login with your details

Forgot password? Click here to reset