Efficient Ordered-Transmission Based Distributed Detection Under Data Falsification Attacks
نویسندگان
چکیده
In distributed detection systems, energy-efficient ordered transmission (EEOT) schemes are able to reduce the number of transmissions required make a final decision. this work, we investigate effect data falsification attacks on performance EEOT-based systems. We derive probability error for an system under attack and find upper bound (UB) expected Moreover, tighten UB by solving optimization problem via integer programming (IP). also obtain FC's optimal threshold which guarantees system. Numerical simulation results indicate that it is possible while still ensuring quality decision with appropriately designed threshold.
منابع مشابه
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملEntropy-based Consensus for Distributed Data Clustering
The increasingly larger scale of available data and the more restrictive concerns on their privacy are some of the challenging aspects of data mining today. In this paper, Entropy-based Consensus on Cluster Centers (EC3) is introduced for clustering in distributed systems with a consideration for confidentiality of data; i.e. it is the negotiations among local cluster centers that are used in t...
متن کاملDistributed Data Aggregation Technology for Real-Time DDoS Attacks Detection
The information technology has revolutionized almost every facet of our lives. Government, commercial, and educational organizations depend on computers and Internet to such an extent that day-to-day operations are significantly hindered when the networks are “down” (Gordon, Loeb, Lucyshyn & Richardson, 2005). The prosperity of the Internet also attracted abusers and attackers motivated for per...
متن کاملhf-blocker: detection of distributed denial of service attacks based on botnets
abstract—today, botnets have become a serious threat to enterprise networks. by creation of network of bots, they launch several attacks, distributed denial of service attacks (ddos) on networks is a sample of such attacks. such attacks with the occupation of system resources, have proven to be an effective method of denying network services. botnets that launch http packet flood attacks agains...
متن کاملHost-based Intrusion Detection against Distributed Denial of Service Attacks
350 Abstract One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a distributed denialof-service (DDoS) attack, an attacker may use your computer to attack another computer. An attacker may attempt to: “flood” a network and thus redu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Signal Processing Letters
سال: 2023
ISSN: ['1558-2361', '1070-9908']
DOI: https://doi.org/10.1109/lsp.2023.3244748