Traffic networks are vulnerable to disinformation attacks
نویسندگان
چکیده
Abstract Disinformation continues to raise concerns due its increasing threat society. Nevertheless, a of disinformation-based attack on critical infrastructure is often overlooked. Here, we consider urban traffic networks and focus fake information that manipulates drivers’ decisions create congestion at city scale. Specifically, two complementary scenarios, one where drivers are persuaded move towards given location, another they away from it. We study the optimization problem faced by adversary when choosing which streets target maximize disruption. prove finding an optimal solution computationally intractable, implying has no choice but settle for suboptimal heuristics. analyze such heuristic, compare cases targets spread across Chicago vs. concentrated in business district. Surprisingly, latter results more far-reaching disruption, with impact felt as far 2 km closest target. Our findings demonstrate vulnerabilities may arise not only hardware software, also behavioral manipulation.
منابع مشابه
We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous
Clickjacking is an attack that tricks victims into clicking on invisible elements of a web page to perform an unintended action that is advantageous for an attacker. To defend against clickjacking, many techniques have already been proposed, but it is still unclear whether they are effectively deployed in practice. We study how vulnerable Korean websites are to clickjacking attacks by performin...
متن کاملFault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable
After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack [BCG08] based on the public modulus corruption. The difficulty to decompose the ”Left-To-Right” exponentiation into partial multiplications is overcome by modifying the public modul...
متن کاملA Systematic Method to Analyze Transport Networks: Considering Traffic Shifts
Current network modeling practices usually assess the network performance at specified time interval, i.e. every 5 or 10 years time horizon. Furthermore, they are usually based on partially predictable data, which are being generated through various stochastic procedures. In this research, a new quantitative based methodology which combines combinatorial optimization modeling and transportation...
متن کاملDecorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronounced patterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, the base station can be destroyed, rendering the entire sensor network inoperative, since a base station is a central point of data collection and hence failure. This paper investigates a suite of decorrelation counter...
متن کاملOn Countermeasures to Traffic Analysis Attacks
AbsfrucfThis paper makes three contributions. First, we propose Shannon’s perfect secrecy theory as a foundation for developing countermeasures to traffic analysis attacks on information security systems. A system violating the perfect secrecy conditions can leak mission critical information. Second, we suggest statistical pattern recognition as a fundamental technology to test an information s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Reports
سال: 2021
ISSN: ['2045-2322']
DOI: https://doi.org/10.1038/s41598-021-84291-w