Abstract:How does system-level information impact the ability of an adversary to degrade performance in a networked control system? How does the complexity of an adversary's strategy affect its ability to degrade performance? This paper focuses on these questions in the context of graphical coordination games where an adversary can influence a given fraction of the agents in the system. Focusing on the class of ring graphs, we explicitly highlight how both (i) the complexity of the attack strategies and (ii) the knowle… Show more
“…j=1 j , which reduces to (19). One can prove sufficiency in a similar manner as step 1 from the previous section -by allocating the y adversaries with a spacing of 1 kα apart, the potential of y Ly exceeds that of any other a Ly = {y Ly , x Ly }.…”
Section: B Proof Of Theorem 21mentioning
confidence: 99%
“…By dynamic, we mean that the adversary can alter its behavior based on the current network state. That is, we consider stationary policies 1 {S x (a(t)), S y (a(t))} t=1,2,... . A static policy does not allow this flexibility: S x (a(t)) = S x and S y (a(t)) = S y ∀t.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…x = ( x,1 , x,2 , x,3 ), 1 y = ( y,1 , y,2 , y,3 ) and s = (s 1 , s 2 , s 3 ) with s 1 > 0 and s 2 , s 3 < 0. Hence, we can find r 1 such that (r 1 ) s 1 = 0.…”
Section: Proof Of Property (2b)mentioning
confidence: 99%
“…A defensive y strategy is implemented on all y-segments at any given time. In property 2, defensive x strategies are applied only if α < 1 2 , and to segments that are shorter than a threshold length. Furthermore, the strategy does not "activate" until there are at most two consecutive agents playing x in the segment.…”
How does system-level information impact the ability of an adversary to degrade performance in a networked control system? How does the complexity of an adversary's strategy affect its ability to degrade performance? This paper focuses on these questions in the context of graphical coordination games where an adversary can influence a given fraction of the agents in the system, and the agents follow log-linear learning, a well-known distributed learning algorithm. Focusing on a class of homogeneous ring graphs of various connectivity, we begin by demonstrating that minimally connected ring graphs are the most susceptible to adversarial influence. We then proceed to characterize how both (i) the sophistication of the attack strategies (static vs dynamic) and (ii) the informational awareness about the network structure can be leveraged by an adversary to degrade system performance. Focusing on the set of adversarial policies that induce stochastically stable states, our findings demonstrate that the relative importance between sophistication and information changes depending on the the influencing power of the adversary. In particular, sophistication far outweighs informational awareness with regards to degrading system-level damage when the adversary's influence power is relatively weak. However, the opposite is true when an adversary's influence power is more substantial.
“…j=1 j , which reduces to (19). One can prove sufficiency in a similar manner as step 1 from the previous section -by allocating the y adversaries with a spacing of 1 kα apart, the potential of y Ly exceeds that of any other a Ly = {y Ly , x Ly }.…”
Section: B Proof Of Theorem 21mentioning
confidence: 99%
“…By dynamic, we mean that the adversary can alter its behavior based on the current network state. That is, we consider stationary policies 1 {S x (a(t)), S y (a(t))} t=1,2,... . A static policy does not allow this flexibility: S x (a(t)) = S x and S y (a(t)) = S y ∀t.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…x = ( x,1 , x,2 , x,3 ), 1 y = ( y,1 , y,2 , y,3 ) and s = (s 1 , s 2 , s 3 ) with s 1 > 0 and s 2 , s 3 < 0. Hence, we can find r 1 such that (r 1 ) s 1 = 0.…”
Section: Proof Of Property (2b)mentioning
confidence: 99%
“…A defensive y strategy is implemented on all y-segments at any given time. In property 2, defensive x strategies are applied only if α < 1 2 , and to segments that are shorter than a threshold length. Furthermore, the strategy does not "activate" until there are at most two consecutive agents playing x in the segment.…”
How does system-level information impact the ability of an adversary to degrade performance in a networked control system? How does the complexity of an adversary's strategy affect its ability to degrade performance? This paper focuses on these questions in the context of graphical coordination games where an adversary can influence a given fraction of the agents in the system, and the agents follow log-linear learning, a well-known distributed learning algorithm. Focusing on a class of homogeneous ring graphs of various connectivity, we begin by demonstrating that minimally connected ring graphs are the most susceptible to adversarial influence. We then proceed to characterize how both (i) the sophistication of the attack strategies (static vs dynamic) and (ii) the informational awareness about the network structure can be leveraged by an adversary to degrade system performance. Focusing on the set of adversarial policies that induce stochastically stable states, our findings demonstrate that the relative importance between sophistication and information changes depending on the the influencing power of the adversary. In particular, sophistication far outweighs informational awareness with regards to degrading system-level damage when the adversary's influence power is relatively weak. However, the opposite is true when an adversary's influence power is more substantial.
“…The ν i correspond to the worst-case deterministic efficiencies J * b (α i ) = 1 − R * b (α i ) of the M gains and ni di to local efficiencies of selected partitions in the graph. Fact 2 will be used to establish (22), and Fact 3 for (23) (Theorem 3). We now identify a structural property required of worst-case graphs.…”
Section: B Relevant Notations For Analysismentioning
A system relying on the collective behavior of decision-makers can be vulnerable to a variety of adversarial attacks. How well can a system operator protect performance in the face of these risks? We frame this question in the context of graphical coordination games, where the agents in a network choose among two conventions and derive benefits from coordinating neighbors, and system performance is measured in terms of the agents' welfare. In this paper, we assess an operator's ability to mitigate two types of adversarial attacks -1) broad attacks, where the adversary incentivizes all agents in the network and 2) focused attacks, where the adversary can force a selected subset of the agents to commit to a prescribed convention. As a mitigation strategy, the system operator can implement a class of distributed algorithms that govern the agents' decision-making process. Our main contribution characterizes the operator's fundamental trade-off between security against worst-case broad attacks and vulnerability from focused attacks. We show that this tradeoff significantly improves when the operator selects a decision-making process at random. Our work highlights the design challenges a system operator faces in maintaining resilience of networked distributed systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.