SlideShare a Scribd company logo
1 of 27
Download to read offline
Smart Attacks on the integrity
of the Internet of Things
Avoiding detection by employing Game Theory
George Margelis Robert J. Piechocki, Theo Tryfonas, Paul Thomas
IEEE GLOBECOM - 7 December 2016
Presentation Outline
• Problem Statement
• Model
• Assumptions and Definitions
• Game Theory aspects
• Numerical Simulation results
• Conclusions
The Internet of Things
Smart
Metering
Home
Automation
Smart
Agriculture
Transportation
Infrastructure
Monitoring
Smart
Metering
e-Health
Industrial
Enterprise
ζ
V2x
The
Internet
Of Things
The Internet of Things
• The IoT will connect different
domains into one
homogenous network
• Different domains →
different requirements
• However all domains share
one requirement:
Robust
Security
Inherent Uncertainty
Cheap Nodes → Cheap Sensors → Limited Precision
Limited precision → Measurement Uncertainty
“Weird” behaviour: Is a node malicious?
Or simply malfunctioning?
Are a group of nodes whose values deviate
from the mean compromised?
Or simply they are the first to sense
a change in the measured values?
Detecting Malicious Nodes
Traditional approach:
Outlier detection and intrusion detection schemes.
However, modern penetration techniques are smarter:
Infecting but remaining in stealth, without changing node
behaviour.
Also when the majority of the nodes have been infected, the
outliers are the healthy ones.
Attackers are exploiting the characteristics of the IoT with
smarter penetration strategies.
Detecting Malicious Nodes
Detecting Malicious Nodes
Detecting Malicious Nodes
Defining a Smart Attacker
• Can compromise healthy nodes
• Avoids changing node behaviour radically
• Exploits the inherent uncertainty in the
measurements
Defining a Smart Attacker
Assumptions regarding the Attacker:
• The attacker can see the final extracted value.
• Every attack that the attacker attempts is successful,
leading to a compromised node.
• The attacker attempts to change the reported value to
something else, which we name ”Attacker’s Target”.
• The attacker controls the number of compromised
nodes(A) and how much the value of the compromised
nodes differs compared to the measured value (lj ).
Defining a Smart Attacker
Assumptions regarding the network:
• Similar to Low Throughtput Networks like LoRA or Sigfox.
• Nodes communicate a measured value (either in a
scheduled or opportunistic manner).
• The mean of the distribution of the values of the network
is the extracted value.
Attacker’s Dilemma
Distance metrics
Kullback – Leibler Divergence 𝐷 𝐾𝐿(𝑃| 𝑄 =
𝑖
𝑃 𝑖 𝑙𝑜𝑔
𝑃(𝑖)
𝑄(𝑖)
Euclidean Distance 𝐷 𝑃, 𝑄 =
𝑖=1
𝑛
(𝑄 𝑖 − 𝑃 𝑖 2
Hellinger’s Distance 𝐷 𝑃, 𝑄 = −𝑙𝑛 𝑃 𝑖 𝑄(𝑖)
Applying Game Theory
A game in it’s normal form is a tuple 𝐺 = 𝑁, 𝐴, 𝑢 , where:
• 𝑁 = {1,2, … , 𝑛𝑖}a set of n rational players. By rational in this
context we mean that the player chooses the strategy that
maximizes his payoff.
• 𝐴 = 𝐴1 × ⋯ × 𝐴2, where 𝐴𝑖 the finite set of actions available to
player 𝑖
• 𝑢 = 𝑢1, … , 𝑢 𝑛 where 𝑢𝑖: 𝐴 → ℝ, a real-valued payoff function
for player 𝑖
Applying Game Theory
Utility Function
Reported
Value
Attacker’s
Target
Compromised
Nodes Cost of
Attack
Hellinger’s Distance
From model distribution
Hellinger’s Distance
Detection Threshold
Reward
𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷)
Applying Game Theory
Utility Function
𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷)
𝑖=1
N−A
𝑥𝑖 + 𝑗=1
A
(𝑥 𝑗+𝑙𝑗)
𝑖=1
N
𝑥𝑖
𝜇 ≥ 𝐴𝑇 =
1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠
0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 =
1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠
0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Scenarios and results
Scenario 1: Cost of attack remains constant as number of attacks is increased
Scenario 2: Cost of attack rises as number of attacks is increased
Scenario 3: Cost of attack reduces as number of attacks is increased
Scenarios and results
Pay-out for the attacker for the first scenario when the
attacker aims to shift the mean of the distribution 1% higher
Scenarios and results
Pay-out for the attacker for the second scenario when the
attacker aims to shift the mean of the distribution 5% higher
Scenarios and results
Pay-out for the attacker for the third scenario when the
attacker aims to shift the mean of the distribution 1% higher
Scenarios and results
Scenarios and results
Percentage of Nodes needed to be compromised vs.
Threshold for the attacker to win the first scenario.
Scenarios and results
Percentage of Nodes needed to be compromised vs.
Threshold for the discounted game.
False positive Rate
𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒 𝑅𝑎𝑡𝑒 =
𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠
𝑇𝑟𝑢𝑒 𝑁𝑒𝑔𝑎𝑡𝑖𝑣𝑒𝑠+𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠
Conclusions
• The uncertainty inherent in the measurements can
be exploited by smart attackers.
• Outlier detection based IDS might not be enough in
light of smart-deployment strategies of malware.
• Distribution comparison can provide insights for
potential penetrations with low complexity costs.
• However the attackers can still compromise the
integrity of the network if they set modest targets.
Thank you
Questions?

More Related Content

Viewers also liked

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart CityDr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 

Viewers also liked (13)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
IOT & Machine Learning
IOT & Machine LearningIOT & Machine Learning
IOT & Machine Learning
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to Detecting Smart Attacks on IoT Integrity Using Game Theory

Jeffrey xu yu large graph processing
Jeffrey xu yu large graph processingJeffrey xu yu large graph processing
Jeffrey xu yu large graph processingjins0618
 
(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_Kim(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_KimSundong Kim
 
Variation on preferential-attachment
Variation  on  preferential-attachmentVariation  on  preferential-attachment
Variation on preferential-attachmentZvi Lotker
 
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...aciijournal
 
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017MLconf
 
Session-Based Recommendations with Recurrent Neural Networks (Balazs Hidasi, ...
Session-Based Recommendations with Recurrent Neural Networks(Balazs Hidasi, ...Session-Based Recommendations with Recurrent Neural Networks(Balazs Hidasi, ...
Session-Based Recommendations with Recurrent Neural Networks (Balazs Hidasi, ...hyunsung lee
 
Research of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkResearch of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkNAVER Engineering
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing basedijasa
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Malachi Jones
 
Prediction of Exchange Rate Using Deep Neural Network
Prediction of Exchange Rate Using Deep Neural Network  Prediction of Exchange Rate Using Deep Neural Network
Prediction of Exchange Rate Using Deep Neural Network Tomoki Hayashi
 
Static characteristics of Instruments
Static characteristics of InstrumentsStatic characteristics of Instruments
Static characteristics of InstrumentsChandan Singh
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Pluribus One
 
HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS
HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONSHOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS
HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONSIJNSA Journal
 
Adversarial Attacks and Defenses in Deep Learning.pdf
Adversarial Attacks and Defenses in Deep Learning.pdfAdversarial Attacks and Defenses in Deep Learning.pdf
Adversarial Attacks and Defenses in Deep Learning.pdfMichelleHoogenhout
 
Getting Started with Machine Learning
Getting Started with Machine LearningGetting Started with Machine Learning
Getting Started with Machine LearningHumberto Marchezi
 
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONSTHE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONSIJNSA Journal
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...ijcsta
 
Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network KratikaNigam3
 
Outsourcing privacy preserving social networks to a cloud
Outsourcing privacy preserving social networks to a cloudOutsourcing privacy preserving social networks to a cloud
Outsourcing privacy preserving social networks to a cloudIEEEFINALYEARPROJECTS
 
Veneseg Prodesp
Veneseg ProdespVeneseg Prodesp
Veneseg Prodespc_herault
 

Similar to Detecting Smart Attacks on IoT Integrity Using Game Theory (20)

Jeffrey xu yu large graph processing
Jeffrey xu yu large graph processingJeffrey xu yu large graph processing
Jeffrey xu yu large graph processing
 
(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_Kim(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_Kim
 
Variation on preferential-attachment
Variation  on  preferential-attachmentVariation  on  preferential-attachment
Variation on preferential-attachment
 
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
 
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
 
Session-Based Recommendations with Recurrent Neural Networks (Balazs Hidasi, ...
Session-Based Recommendations with Recurrent Neural Networks(Balazs Hidasi, ...Session-Based Recommendations with Recurrent Neural Networks(Balazs Hidasi, ...
Session-Based Recommendations with Recurrent Neural Networks (Balazs Hidasi, ...
 
Research of adversarial example on a deep neural network
Research of adversarial example on a deep neural networkResearch of adversarial example on a deep neural network
Research of adversarial example on a deep neural network
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
Prediction of Exchange Rate Using Deep Neural Network
Prediction of Exchange Rate Using Deep Neural Network  Prediction of Exchange Rate Using Deep Neural Network
Prediction of Exchange Rate Using Deep Neural Network
 
Static characteristics of Instruments
Static characteristics of InstrumentsStatic characteristics of Instruments
Static characteristics of Instruments
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS
HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONSHOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS
HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS
 
Adversarial Attacks and Defenses in Deep Learning.pdf
Adversarial Attacks and Defenses in Deep Learning.pdfAdversarial Attacks and Defenses in Deep Learning.pdf
Adversarial Attacks and Defenses in Deep Learning.pdf
 
Getting Started with Machine Learning
Getting Started with Machine LearningGetting Started with Machine Learning
Getting Started with Machine Learning
 
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONSTHE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
 
Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network
 
Outsourcing privacy preserving social networks to a cloud
Outsourcing privacy preserving social networks to a cloudOutsourcing privacy preserving social networks to a cloud
Outsourcing privacy preserving social networks to a cloud
 
Veneseg Prodesp
Veneseg ProdespVeneseg Prodesp
Veneseg Prodesp
 

More from Communication Systems & Networks

In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...Communication Systems & Networks
 
Performance Evaluation of Multicast Video Distribution with User Cooperation ...
Performance Evaluation of Multicast Video Distribution with User Cooperation ...Performance Evaluation of Multicast Video Distribution with User Cooperation ...
Performance Evaluation of Multicast Video Distribution with User Cooperation ...Communication Systems & Networks
 
Measurements and Characterization of Surface Scattering at 60GHz
Measurements and Characterization of Surface Scattering at 60GHzMeasurements and Characterization of Surface Scattering at 60GHz
Measurements and Characterization of Surface Scattering at 60GHzCommunication Systems & Networks
 
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam SteeringMmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam SteeringCommunication Systems & Networks
 
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering TechnologyFeasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering TechnologyCommunication Systems & Networks
 
Analysis of Measured LOS Massive MIMO Channels with Mobility
Analysis of Measured LOS Massive MIMO Channels with Mobility Analysis of Measured LOS Massive MIMO Channels with Mobility
Analysis of Measured LOS Massive MIMO Channels with Mobility Communication Systems & Networks
 
Wireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
Wireless Vehicular Networks in Emergencies: A Single Frequency Network ApproachWireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
Wireless Vehicular Networks in Emergencies: A Single Frequency Network ApproachCommunication Systems & Networks
 
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...Communication Systems & Networks
 
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO TestbedLOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO TestbedCommunication Systems & Networks
 
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO TestbedServing 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO TestbedCommunication Systems & Networks
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...Communication Systems & Networks
 
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...Communication Systems & Networks
 
System Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
System Level 5G Evaluation of GFDM Waveforms in an LTE-A PlatformSystem Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
System Level 5G Evaluation of GFDM Waveforms in an LTE-A PlatformCommunication Systems & Networks
 
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentPacket Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentCommunication Systems & Networks
 
Perfomance Evaluation of FBMC for an Underwater Acoustic Channel
Perfomance Evaluation of FBMC for an Underwater Acoustic ChannelPerfomance Evaluation of FBMC for an Underwater Acoustic Channel
Perfomance Evaluation of FBMC for an Underwater Acoustic ChannelCommunication Systems & Networks
 
Performance evaluation of multicast video distribution using lte a in vehicul...
Performance evaluation of multicast video distribution using lte a in vehicul...Performance evaluation of multicast video distribution using lte a in vehicul...
Performance evaluation of multicast video distribution using lte a in vehicul...Communication Systems & Networks
 

More from Communication Systems & Networks (19)

In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
 
Performance Evaluation of Multicast Video Distribution with User Cooperation ...
Performance Evaluation of Multicast Video Distribution with User Cooperation ...Performance Evaluation of Multicast Video Distribution with User Cooperation ...
Performance Evaluation of Multicast Video Distribution with User Cooperation ...
 
Measurements and Characterization of Surface Scattering at 60GHz
Measurements and Characterization of Surface Scattering at 60GHzMeasurements and Characterization of Surface Scattering at 60GHz
Measurements and Characterization of Surface Scattering at 60GHz
 
Millimetre Wave Channel Measurements in a Railway Depot
Millimetre Wave Channel Measurements in a Railway DepotMillimetre Wave Channel Measurements in a Railway Depot
Millimetre Wave Channel Measurements in a Railway Depot
 
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam SteeringMmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
 
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering TechnologyFeasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
 
LTE-A Virtual Drive Testing for Vehicular Environments
LTE-A Virtual Drive Testing for Vehicular Environments LTE-A Virtual Drive Testing for Vehicular Environments
LTE-A Virtual Drive Testing for Vehicular Environments
 
Analysis of Measured LOS Massive MIMO Channels with Mobility
Analysis of Measured LOS Massive MIMO Channels with Mobility Analysis of Measured LOS Massive MIMO Channels with Mobility
Analysis of Measured LOS Massive MIMO Channels with Mobility
 
Bristol Uni posters Brooklyn 5G Summit April 2017
Bristol Uni posters Brooklyn 5G Summit April 2017Bristol Uni posters Brooklyn 5G Summit April 2017
Bristol Uni posters Brooklyn 5G Summit April 2017
 
Wireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
Wireless Vehicular Networks in Emergencies: A Single Frequency Network ApproachWireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
Wireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
 
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
 
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO TestbedLOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
 
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO TestbedServing 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
 
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
 
System Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
System Level 5G Evaluation of GFDM Waveforms in an LTE-A PlatformSystem Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
System Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
 
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentPacket Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
 
Perfomance Evaluation of FBMC for an Underwater Acoustic Channel
Perfomance Evaluation of FBMC for an Underwater Acoustic ChannelPerfomance Evaluation of FBMC for an Underwater Acoustic Channel
Perfomance Evaluation of FBMC for an Underwater Acoustic Channel
 
Performance evaluation of multicast video distribution using lte a in vehicul...
Performance evaluation of multicast video distribution using lte a in vehicul...Performance evaluation of multicast video distribution using lte a in vehicul...
Performance evaluation of multicast video distribution using lte a in vehicul...
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Detecting Smart Attacks on IoT Integrity Using Game Theory

  • 1. Smart Attacks on the integrity of the Internet of Things Avoiding detection by employing Game Theory George Margelis Robert J. Piechocki, Theo Tryfonas, Paul Thomas IEEE GLOBECOM - 7 December 2016
  • 2. Presentation Outline • Problem Statement • Model • Assumptions and Definitions • Game Theory aspects • Numerical Simulation results • Conclusions
  • 3. The Internet of Things Smart Metering Home Automation Smart Agriculture Transportation Infrastructure Monitoring Smart Metering e-Health Industrial Enterprise ζ V2x The Internet Of Things
  • 4. The Internet of Things • The IoT will connect different domains into one homogenous network • Different domains → different requirements • However all domains share one requirement: Robust Security
  • 5. Inherent Uncertainty Cheap Nodes → Cheap Sensors → Limited Precision Limited precision → Measurement Uncertainty “Weird” behaviour: Is a node malicious? Or simply malfunctioning? Are a group of nodes whose values deviate from the mean compromised? Or simply they are the first to sense a change in the measured values?
  • 6. Detecting Malicious Nodes Traditional approach: Outlier detection and intrusion detection schemes. However, modern penetration techniques are smarter: Infecting but remaining in stealth, without changing node behaviour. Also when the majority of the nodes have been infected, the outliers are the healthy ones. Attackers are exploiting the characteristics of the IoT with smarter penetration strategies.
  • 10. Defining a Smart Attacker • Can compromise healthy nodes • Avoids changing node behaviour radically • Exploits the inherent uncertainty in the measurements
  • 11. Defining a Smart Attacker Assumptions regarding the Attacker: • The attacker can see the final extracted value. • Every attack that the attacker attempts is successful, leading to a compromised node. • The attacker attempts to change the reported value to something else, which we name ”Attacker’s Target”. • The attacker controls the number of compromised nodes(A) and how much the value of the compromised nodes differs compared to the measured value (lj ).
  • 12. Defining a Smart Attacker Assumptions regarding the network: • Similar to Low Throughtput Networks like LoRA or Sigfox. • Nodes communicate a measured value (either in a scheduled or opportunistic manner). • The mean of the distribution of the values of the network is the extracted value.
  • 14. Distance metrics Kullback – Leibler Divergence 𝐷 𝐾𝐿(𝑃| 𝑄 = 𝑖 𝑃 𝑖 𝑙𝑜𝑔 𝑃(𝑖) 𝑄(𝑖) Euclidean Distance 𝐷 𝑃, 𝑄 = 𝑖=1 𝑛 (𝑄 𝑖 − 𝑃 𝑖 2 Hellinger’s Distance 𝐷 𝑃, 𝑄 = −𝑙𝑛 𝑃 𝑖 𝑄(𝑖)
  • 15. Applying Game Theory A game in it’s normal form is a tuple 𝐺 = 𝑁, 𝐴, 𝑢 , where: • 𝑁 = {1,2, … , 𝑛𝑖}a set of n rational players. By rational in this context we mean that the player chooses the strategy that maximizes his payoff. • 𝐴 = 𝐴1 × ⋯ × 𝐴2, where 𝐴𝑖 the finite set of actions available to player 𝑖 • 𝑢 = 𝑢1, … , 𝑢 𝑛 where 𝑢𝑖: 𝐴 → ℝ, a real-valued payoff function for player 𝑖
  • 16. Applying Game Theory Utility Function Reported Value Attacker’s Target Compromised Nodes Cost of Attack Hellinger’s Distance From model distribution Hellinger’s Distance Detection Threshold Reward 𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷)
  • 17. Applying Game Theory Utility Function 𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷) 𝑖=1 N−A 𝑥𝑖 + 𝑗=1 A (𝑥 𝑗+𝑙𝑗) 𝑖=1 N 𝑥𝑖 𝜇 ≥ 𝐴𝑇 = 1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠 0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠 0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
  • 18. Scenarios and results Scenario 1: Cost of attack remains constant as number of attacks is increased Scenario 2: Cost of attack rises as number of attacks is increased Scenario 3: Cost of attack reduces as number of attacks is increased
  • 19. Scenarios and results Pay-out for the attacker for the first scenario when the attacker aims to shift the mean of the distribution 1% higher
  • 20. Scenarios and results Pay-out for the attacker for the second scenario when the attacker aims to shift the mean of the distribution 5% higher
  • 21. Scenarios and results Pay-out for the attacker for the third scenario when the attacker aims to shift the mean of the distribution 1% higher
  • 23. Scenarios and results Percentage of Nodes needed to be compromised vs. Threshold for the attacker to win the first scenario.
  • 24. Scenarios and results Percentage of Nodes needed to be compromised vs. Threshold for the discounted game.
  • 25. False positive Rate 𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒 𝑅𝑎𝑡𝑒 = 𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠 𝑇𝑟𝑢𝑒 𝑁𝑒𝑔𝑎𝑡𝑖𝑣𝑒𝑠+𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠
  • 26. Conclusions • The uncertainty inherent in the measurements can be exploited by smart attackers. • Outlier detection based IDS might not be enough in light of smart-deployment strategies of malware. • Distribution comparison can provide insights for potential penetrations with low complexity costs. • However the attackers can still compromise the integrity of the network if they set modest targets.