Distributed Detection and Mitigation of Biasing Attacks over Multi-Agent Networks

This paper proposes a distributed attack detection and mitigation technique based on distributed estimation over a multi-agent network, where the agents take partial system measurements susceptible to (possible) biasing attacks. In particular, we assume that the system is not locally observable via the measurements in the direct neighborhood of any agent. First, for performance analysis in the attack-free case, we show that the proposed distributed estimation is unbiased with bounded mean-square deviation in steady-state. Then, we propose a residual-based strategy to locally detect possible attacks at agents. In contrast to the deterministic thresholds in the literature assuming an upper bound on the noise support, we define the thresholds on the residuals in a probabilistic sense. After detecting and isolating the attacked agent, a system-digraph-based mitigation strategy is proposed to replace the attacked measurement with a new observationally-equivalent one to recover potential observability loss. We adopt a graph-theoretic method to classify the agents based on their measurements, to distinguish between the agents recovering the system rank-deficiency and the ones recovering output-connectivity of the system digraph. The attack detection/mitigation strategy is specifically described for each type, which is of polynomial-order complexity for large-scale applications. Illustrative simulations support our theoretical results.

READ FULL TEXT

page 3

page 5

page 6

page 7

page 8

page 9

page 10

page 11

research
04/01/2021

Delay-Tolerant Consensus-based Distributed Estimation: Full-Rank Systems with Potentially Unstable Dynamics

Classical distributed estimation scenarios typically assume timely and r...
research
12/22/2020

Distributed Q-Learning with State Tracking for Multi-agent Networked Control

This paper studies distributed Q-learning for Linear Quadratic Regulator...
research
02/09/2023

SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots

In this paper, we revisit the use of honeypots for detecting reflective ...
research
10/19/2019

Resilient Distributed Recovery of Large Fields

This paper studies the resilient distributed recovery of large fields un...
research
11/06/2019

Asymptotic Analysis for Greedy Initialization of Threshold-Based Distributed Optimization of Persistent Monitoring on Graphs

We consider the optimal multi-agent persistent monitoring problem define...
research
03/23/2020

Resilient Distributed Diffusion in Networks with Adversaries

In this paper, we study resilient distributed diffusion for multi-task e...

Please sign up or login with your details

Forgot password? Click here to reset