We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: Design of multiplicative watermarking against covert attacks

Abstract: This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output l2-gain, which characterizes the maximum gain between the residual output of a detection scheme and some performance output. Although optimal, this control problem is non-convex. Hence, we propose an algorithm to design the watermarking filters by solving the problem suboptimally via LMIs. We show that, against covert attacks, the output-to-output l2-gain is unbounded without watermarking, and we provide a sufficient condition for boundedness in the presence of watermarks.
Comments: 6 page conference paper accepted to the 60th IEEE Conference on Decision and Control
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
Journal reference: 2021 60th IEEE Conference on Decision and Control (CDC), profs. of
DOI: 10.1109/CDC45484.2021.9683075
Cite as: arXiv:2110.00555 [cs.CR]
  (or arXiv:2110.00555v1 [cs.CR] for this version)

Submission history

From: Alexander Julian Gallo Dr. [view email]
[v1] Fri, 1 Oct 2021 17:35:24 GMT (205kb,D)

Link back to: arXiv, form interface, contact.