Skip to main content

Showing 1–7 of 7 results for author: Leslie, N O

.
  1. arXiv:2204.01584  [pdf, other

    math.OC cs.GT eess.SY

    Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks

    Authors: Sumukha Udupa, Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem for a defender (P1) who can jointly query the sensors and take control actions to reach a set of goal states while being aware of possible sensor attacks by an adversary (P2) who has perfect observations. To synthesize a provably-correct, attack-aware joint control and active sensing strategy for P1, we construct a stochastic game on graph with augmen… ▽ More

    Submitted 29 November, 2022; v1 submitted 28 March, 2022; originally announced April 2022.

    Comments: 7 pages, 3 figure, 1 table, 1 algorithm

    Journal ref: LCSS vol.7(2022)265-270

  2. arXiv:2104.00176  [pdf, ps, other

    cs.CR cs.FL cs.GT

    Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness

    Authors: Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem where the agent (called Player 1, or P1) can jointly plan the control actions and sensor queries in a sensor network and an attacker (called player 2, or P2) can carry out attacks on the sensors. We model such an adversarial interaction using a formal model -- a reachability game with partially controllable observation functions. The main contribution… ▽ More

    Submitted 2 May, 2021; v1 submitted 31 March, 2021; originally announced April 2021.

    Comments: 7 pages, 5 figures, Submitted to CDC2021; Revised Alg. 2 to fix a typo and notation, results unchanged

  3. arXiv:2010.01208  [pdf, ps, other

    cs.GT cs.FL

    Decoy Allocation Games on Graphs with Temporal Logic Objectives

    Authors: Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie

    Abstract: We study a class of games, in which the adversary (attacker) is to satisfy a complex mission specified in linear temporal logic, and the defender is to prevent the adversary from achieving its goal. A deceptive defender can allocate decoys, in addition to defense actions, to create disinformation for the attacker. Thus, we focus on the problem of jointly synthesizing a decoy placement strategy and… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: 20 page, 4 figures, 2 algorithms, Accepted at Conference on Decision and Game Theory for Security (GameSec) 2020

  4. Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

    Authors: Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: With the increasing sophistication of attacks on cyber-physical systems, deception has emerged as an effective tool to improve system security and safety by obfuscating the attacker's perception. In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. The age… ▽ More

    Submitted 9 June, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: 6 page, 3 figures, submitted to CDC 2020/L-CSS

  5. arXiv:2002.07025  [pdf, other

    cs.GT cs.FL cs.LO

    Secure-by-synthesis network with active deception and temporal logic specifications

    Authors: Jie Fu, Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua

    Abstract: This paper is concerned with the synthesis of strategies in network systems with active cyber deception. Active deception in a network employs decoy systems and other defenses to conduct defensive planning against the intrusion of malicious attackers who have been confirmed by sensing systems. In this setting, the defender's objective is to ensure the satisfaction of security properties specified… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 16 pages, 9 figures

  6. arXiv:1905.04833  [pdf, other

    cs.AI cs.CR cs.GT cs.LG

    Learning and Planning in the Feature Deception Problem

    Authors: Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles Kamhoua, Fei Fang

    Abstract: Today's high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender's loss by misleading the attacker to make suboptimal decisions. In order to formally reason about deception, we introduce the feature deception problem (FDP), a domain-independent model and present a learning and planning framework for finding… ▽ More

    Submitted 8 June, 2020; v1 submitted 12 May, 2019; originally announced May 2019.

  7. Statistical Models for the Number of Successful Cyber Intrusions

    Authors: Nandi O. Leslie, Richard E. Harang, Lawrence P. Knachel, Alexander Kott

    Abstract: We propose several generalized linear models (GLMs) to predict the number of successful cyber intrusions (or "intrusions") into an organization's computer network, where the rate at which intrusions occur is a function of the following observable characteristics of the organization: (i) domain name server (DNS) traffic classified by their top-level domains (TLDs); (ii) the number of network securi… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Journal ref: The Journal of Defense Modeling and Simulation, 15(1), 49-63