2017
DOI: 10.48550/arxiv.1709.04137
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Models and Framework for Adversarial Attacks on Complex Adaptive Systems

Vahid Behzadan,
Arslan Munir

Abstract: We introduce the paradigm of adversarial attacks that target the dynamics of Complex Adaptive Systems (CAS).To facilitate the analysis of such attacks, we present multiple approaches to the modeling of CAS as dynamical, datadriven, and game-theoretic systems, and develop quantitative definitions of attack, vulnerability, and resilience in the context of CAS security. Furthermore, we propose a comprehensive set of schemes for classification of attacks and attack surfaces in CAS, complemented with examples of pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…Hence, there is a wide range of attacks against the involved devices that can destroy confidentiality. These attacks are man-in-the-middle attacks, eavesdropping attacks, model identification attacks against the used machine learning techniques, and parameter inference attacks against controllers [104]. Moreover, in ITSs, it is crucially important to ensure data integrity regarding communication and computation between different system devices, such as vehicles, traffic controllers, and roadside infrastructures.…”
Section: ) Smart Transportation Systems (Its)mentioning
confidence: 99%
“…Hence, there is a wide range of attacks against the involved devices that can destroy confidentiality. These attacks are man-in-the-middle attacks, eavesdropping attacks, model identification attacks against the used machine learning techniques, and parameter inference attacks against controllers [104]. Moreover, in ITSs, it is crucially important to ensure data integrity regarding communication and computation between different system devices, such as vehicles, traffic controllers, and roadside infrastructures.…”
Section: ) Smart Transportation Systems (Its)mentioning
confidence: 99%
“…This definition does not require the failure to be due to malicious behavior on the part of any agent, nor does it forbid it. Note also that the definition does not require failure of the system, as in Behzadan and Munir's categorization of adversarial attacks [25], nor does it make any assumptions about type of the agents, such as the type of learning or optimization system used. (The multi-agent cases implicitly preclude agents from being either strongly boxed, as Drexler proposed [26], or oracular, as discussed by Armstrong [27].…”
Section: Defining Multi-agent Failuresmentioning
confidence: 99%