US 12,438,893 B2
Method for detecting data stealthy attack on networked system with differential privacy protection
Ming Yang, Shandong (CN); Fazong Wu, Shandong (CN); Xiaoming Wu, Shandong (CN); Xin Wang, Shandong (CN); Chao Mu, Shandong (CN); Zhenya Chen, Shandong (CN); and Yanhan Wang, Shandong (CN)
Assigned to SHANDONG COMPUTER SCIENCE CENTER (NATIONAL SUPERCOMPUTER CENTER IN JINAN), Jinan (CN)
Appl. No. 18/847,213
Filed by SHANDONG COMPUTER SCIENCE CENTER (NATIONAL SUPERCOMPUTER CENTER IN JINAN), Shandong (CN)
PCT Filed Oct. 11, 2023, PCT No. PCT/CN2023/103124
§ 371(c)(1), (2) Date May 27, 2025,
PCT Pub. No. WO2024/098780, PCT Pub. Date May 16, 2024.
Claims priority of application No. 202211388174.0 (CN), filed on Nov. 8, 2022.
Prior Publication US 2025/0280009 A1, Sep. 4, 2025
Int. Cl. H04L 9/40 (2022.01); H04L 41/14 (2022.01)
CPC H04L 63/1416 (2013.01) [H04L 41/145 (2013.01)] 4 Claims
OG exemplary drawing
 
1. A method for detecting a data stealthy attack on a networked system with differential privacy protection, comprising:
(a) modeling a networked system and designing an attack detection scheme based on system noise parameters;
(b) designing an optimal data stealthy attack scheme for an attacker according to known system information; and
(c) determining a moment of adding a privacy noise through a privacy noise scheduling scheme while ensuring privacy of sensitive data on the networked system, wherein in step (b), the designing an optimal data stealthy attack scheme for an attacker comprises:
aggregating measurement data collected by a sensor from time 0 to k into a normal vector;

OG Complex Work Unit Math
in Eq (2), custom character(0)T, custom character(1)T, . . . , custom character(k)T refer to the transpose of the measurement data collected by the sensor from time 0 to k, respectively; the measurement data at each time is independent and subject to a Gaussian distribution with a mean of custom character and a variance of σ2; the attacker aims to find an optimal attack signal distribution f*a, whereby an expectation of a difference between an attack vector Yu and a normal vector Y is maximal:

OG Complex Work Unit Math
a deviation between an attack signal distribution fa and a normal signal distribution fn is maintained within an acceptable threshold γ:
s.t.DKL(fa|fn)<γ  (4);
also, ∫fadx=1  (5);
in Eqs. (3)-(5), |⋅|1 represents a 1 norm of a matrix;

OG Complex Work Unit Math
represents KL divergence between the attack signal distribution fa and the normal signal distribution fn;
the normal signal distribution fn represents a normal system data distribution or a data distribution disturbed by a differential privacy scheme based on a privacy protection demand, and to solve a constrained optimization problem, a Lagrange function of the optimization problem is denoted as:
Γ(x)=∫(x−2μ)xfa(x)dx+σ22+

OG Complex Work Unit Math
in Eq. (6), μ and σ2 refer to the mean and variance of the Gaussian distribution in Eq. (2); x is an integral variable, k1, k2, is a Lagrange multiplier, and a variance relationship between the normal signal distribution and the optimal attack signal distribution is obtained by taking a partial derivative of parameters of the Lagrange function:

OG Complex Work Unit Math
Eq. (7) is solved to derive:

OG Complex Work Unit Math
in Eq. (8), the Lagrange multiplier is obtained by substituting the optimal attack signal distribution into Eqs. (3), (4) and (5) and solving the equations, and a specific value of the Lagrange multiplier is related to a form of adding a differential privacy noise and the acceptable threshold γ of the attacker;
a measurement value is disturbed with a noise of the Gaussian distribution, and a probability density function of a disturbance Gaussian noise is:

OG Complex Work Unit Math
in Eq. (9), μ00 are a mean and standard deviation of the disturbance Gaussian noise, respectively; furthermore a probability density function of a normal signal is:

OG Complex Work Unit Math
the optimal attack signal distribution is finally solved as:

OG Complex Work Unit Math
the optimal data stealthy attack scheme is a method for sampling an attack signal from the optimal attack signal distribution to attack the networked system;
in step (c), the determining a moment of adding a privacy noise through a privacy noise scheduling scheme comprises:
adding a random noise ηk, conforming to the Gaussian distribution into a real-time measurement value custom characterk requiring privacy protection to obtain disturbance data custom characterk, wherein the variance of the random noise ηk is:

OG Complex Work Unit Math
in Eqs. (12) and (13), Δf is global sensitivity; D and D′ are adjacent data sets obtained from statistical characteristics of the real-time measurement value, namely ∥D−D′∥≤1; ϵ is a privacy budget at each time; δ is another privacy parameter of a (ϵ,δ)-differential privacy protection scheme having a value range of 0<δ<1; a disturbed real-time measurement value after adding the disturbance Gaussian noise is:

OG Complex Work Unit Math
in Eq. (14), ηk and custom characterk have the same dimension;
the following state feedback mode is considered:
custom characterk=Lcustom characterk  (15)
in Eq. (15), L is a feedback gain, custom characterk is a system state estimation value at time k, a state residual is ek=custom characterkcustom characterk, and an expanded system state is rewritten as:

OG Complex Work Unit Math
an iteration form of the expanded system state is as follows:

OG Complex Work Unit Math
in Eq. (17), zk+1 represents the expanded system state at time k+1; I is an identity matrix of the same dimension as A, and K represents a Kalman gain matrix;

OG Complex Work Unit Math
in Eq. (18), F is a first auxiliary matrix, G is a second auxiliary matrix, and custom characterk is a third auxiliary matrix;
a covariance matrix of custom characterk is:

OG Complex Work Unit Math
in Eq. (19), E represents the expectation;
if the expectation and covariance of the expanded system state are custom characterk, custom characterk, respectively,
an iteration form of is:

OG Complex Work Unit Math
custom characterk+1=FnkFT+Rcustom characterk  (20)
the covariance matrix of custom characterk after adding the differential privacy noise is rewritten as:

OG Complex Work Unit Math
in Eq. (21), Rηk02·I is the covariance matrix of the added differential privacy noise;
the covariance of the expanded system state is:
nk+1=FnkFT+Rcustom characterk+Rηk  (22)
if the covariance of the expanded system state at a start time is n0,

OG Complex Work Unit Math
when Fk represents a kth power of a Kalman gain matrix F, Fk-i represents a k−ith power of the Kalman gain matrix F, and i is a summation variable, if all eigenvalues of F are less than 1, namely (A+BK)(A−LC)<1, nk win converge to a constant N, and the variance of an added actual noise satisfies:
Rηk>(σ′)2I−NCCT−Rv  (24)
in Eq. (24), (σ′)2 is a total noise scale for achieving differential privacy protection;
the goal is to maximize a detection rate of a stealthy attack at an acceptable control cost:

OG Complex Work Unit Math
in Eq. (25),

OG Complex Work Unit Math
is a sequence of privacy noises added within a time period M, wherein 1 represents noise addition, and 0 represents no noise addition; J represents the control cost; and Ω represents an upper limit of the acceptable control cost.