Quickest change detection in the presence of transient adversarial attacks

Thirupathaiah Vasantam, Don Towsley, Venugopal V. Veeravalli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We study a monitoring system in which the distributions of sensors' observations change from a nominal distribution to an abnormal distribution in response to an adversary's presence. The system uses the quickest change detection procedure, the Shewhart rule, to detect the adversary that uses its resources to affect the abnormal distribution, so as to hide its presence. The metric of interest is the probability of missed detection within a predefined number of time-slots after the changepoint. Assuming that the adversary's resource constraints are known to the detector, we find the number of required sensors to make the worst-case probability of missed detection less than an acceptable level. The distributions of observations are assumed to be Gaussian, and the presence of the adversary affects their mean. We also provide simulation results to support our analysis.

Original languageEnglish (US)
Title of host publication2021 55th Annual Conference on Information Sciences and Systems, CISS 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665412681
DOIs
StatePublished - Mar 24 2021
Event55th Annual Conference on Information Sciences and Systems, CISS 2021 - Baltimore, United States
Duration: Mar 24 2021Mar 26 2021

Publication series

Name2021 55th Annual Conference on Information Sciences and Systems, CISS 2021

Conference

Conference55th Annual Conference on Information Sciences and Systems, CISS 2021
Country/TerritoryUnited States
CityBaltimore
Period3/24/213/26/21

Keywords

  • CUSUM test
  • Quick change detection
  • Shewhart test
  • Transient change detection

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Quickest change detection in the presence of transient adversarial attacks'. Together they form a unique fingerprint.

Cite this