Skip to main content

Showing 1–7 of 7 results for author: Kamhoua, C A

.
  1. arXiv:2304.05962  [pdf, other

    cs.GT

    Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach

    Authors: Haoxiang Ma, Shuo Han, Charles A. Kamhoua, Jie Fu

    Abstract: This paper is concerned with the optimal allocation of detection resources (sensors) to mitigate multi-stage attacks, in the presence of the defender's uncertainty in the attacker's intention. We model the attack planning problem using a Markov decision process and characterize the uncertainty in the attacker's intention using a finite set of reward functions -- each reward represents a type of th… ▽ More

    Submitted 22 June, 2023; v1 submitted 12 April, 2023; originally announced April 2023.

    Comments: This is the long version of the work "Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach" accpeted by IEEE L-CSS

  2. arXiv:2204.01584  [pdf, other

    math.OC cs.GT eess.SY

    Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks

    Authors: Sumukha Udupa, Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem for a defender (P1) who can jointly query the sensors and take control actions to reach a set of goal states while being aware of possible sensor attacks by an adversary (P2) who has perfect observations. To synthesize a provably-correct, attack-aware joint control and active sensing strategy for P1, we construct a stochastic game on graph with augmen… ▽ More

    Submitted 29 November, 2022; v1 submitted 28 March, 2022; originally announced April 2022.

    Comments: 7 pages, 3 figure, 1 table, 1 algorithm

    Journal ref: LCSS vol.7(2022)265-270

  3. arXiv:2104.00176  [pdf, ps, other

    cs.CR cs.FL cs.GT

    Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness

    Authors: Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem where the agent (called Player 1, or P1) can jointly plan the control actions and sensor queries in a sensor network and an attacker (called player 2, or P2) can carry out attacks on the sensors. We model such an adversarial interaction using a formal model -- a reachability game with partially controllable observation functions. The main contribution… ▽ More

    Submitted 2 May, 2021; v1 submitted 31 March, 2021; originally announced April 2021.

    Comments: 7 pages, 5 figures, Submitted to CDC2021; Revised Alg. 2 to fix a typo and notation, results unchanged

  4. arXiv:2010.01208  [pdf, ps, other

    cs.GT cs.FL

    Decoy Allocation Games on Graphs with Temporal Logic Objectives

    Authors: Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie

    Abstract: We study a class of games, in which the adversary (attacker) is to satisfy a complex mission specified in linear temporal logic, and the defender is to prevent the adversary from achieving its goal. A deceptive defender can allocate decoys, in addition to defense actions, to create disinformation for the attacker. Thus, we focus on the problem of jointly synthesizing a decoy placement strategy and… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: 20 page, 4 figures, 2 algorithms, Accepted at Conference on Decision and Game Theory for Security (GameSec) 2020

  5. Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

    Authors: Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: With the increasing sophistication of attacks on cyber-physical systems, deception has emerged as an effective tool to improve system security and safety by obfuscating the attacker's perception. In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. The age… ▽ More

    Submitted 9 June, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: 6 page, 3 figures, submitted to CDC 2020/L-CSS

  6. arXiv:2002.07025  [pdf, other

    cs.GT cs.FL cs.LO

    Secure-by-synthesis network with active deception and temporal logic specifications

    Authors: Jie Fu, Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua

    Abstract: This paper is concerned with the synthesis of strategies in network systems with active cyber deception. Active deception in a network employs decoy systems and other defenses to conduct defensive planning against the intrusion of malicious attackers who have been confirmed by sensing systems. In this setting, the defender's objective is to ensure the satisfaction of security properties specified… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 16 pages, 9 figures

  7. arXiv:1908.00324  [pdf, other

    cs.CR cs.CY

    Optimal Deployments of Defense Mechanisms for the Internet of Things

    Authors: Mengmeng Ge, **-Hee Cho, Charles A. Kamhoua, Dong Seong Kim

    Abstract: Internet of Things (IoT) devices can be exploited by the attackers as entry points to break into the IoT networks without early detection. Little work has taken hybrid approaches that combine different defense mechanisms in an optimal way to increase the security of the IoT against sophisticated attacks. In this work, we propose a novel approach to generate the strategic deployment of adaptive dec… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.