期刊文献+
共找到399篇文章
< 1 2 20 >
每页显示 20 50 100
ICPS multi-target constrained comprehensive security control based on DoS attacks energy grading detection and compensation
1
作者 HAN Yinlong HAN Xiaowu 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第4期518-531,共14页
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr... Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions. 展开更多
关键词 industry cyber-physical system(ICPS) denial-of-service(dos)attacks energy grading detection security event triggering mechanism time series analysis methods cone complementary linearization
在线阅读 下载PDF
Research on fixed-time time-varying formation of heterogeneous multi-agent systems based on tracking error observer under DoS attacks
2
作者 Jiqing Luo Husheng Fang +2 位作者 Yue Zhong Jing Zhang Shengli Song 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第12期211-225,共15页
In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy... In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy is used to reconstruct the communication channel for the system that suffers from DoS attacks to prevent the discontinuous transmission information of the communication network from affecting MASs formation.Then,considering that the leader state is not available to each follower under DoS attacks,a fixed-time distributed observer without velocity information is constructed to estimate the tracking error between followers and the leader.Finally,adaptive radial basis function neural network(RBFNN) is used to approximate the unknown ensemble disturbances in the system,and the fixed-time time-varying formation scheme is designed with the constructed observer.The effectiveness of the proposed control algorithm is demonstrated by the numerical simulation. 展开更多
关键词 denial-of-service attacks Dynamic pinning Fixed-time tracking error observer Adaptive RBFNN Fixed-time time-varying formation
在线阅读 下载PDF
基于深度学习的车联网的路网监测系统的DoS和DDoS攻击的入侵检测方法
3
作者 曹磊 温蜜 何蔚 《计算机应用与软件》 北大核心 2025年第1期303-311,共9页
面对日益复杂的交通路况,车联网成为提升智能路网监测系统性能的重要保证,它可以实现车载网、车际网、车辆与移动互联网之间的信息交互共享。然而DoS和DDoS网络攻击的频发,成为车联网可用性的严重威胁之一。针对传统入侵检测算法存在训... 面对日益复杂的交通路况,车联网成为提升智能路网监测系统性能的重要保证,它可以实现车载网、车际网、车辆与移动互联网之间的信息交互共享。然而DoS和DDoS网络攻击的频发,成为车联网可用性的严重威胁之一。针对传统入侵检测算法存在训练困难、分类精度低、泛化能力差的问题,提出一种高效的深度学习模型CNN-BiSRU。实验选择在最新的CICIDS2018数据集中进行验证,结果表明,该模型获得了更高的检测精度,而相比于CNN-BiLSTM,CNN-BiSRU拥有更快的检测速度。 展开更多
关键词 入侵检测 dos攻击 深度学习 车联网 路网监测系统
在线阅读 下载PDF
密码学与DoS碰撞攻击
4
作者 陈泓达 《微型计算机》 2025年第4期16-18,共3页
密码学技术在当今世界中扮演着至关重要的角色,它用于保护我们的通信和数据的安全性。然而,网络安全威胁的范围和复杂性也在不断增加。其中一种威胁是拒绝服务(DoS)攻击,文章将讨论DoS碰撞攻击的概念和原理,以及攻击者的动机和目标。对... 密码学技术在当今世界中扮演着至关重要的角色,它用于保护我们的通信和数据的安全性。然而,网络安全威胁的范围和复杂性也在不断增加。其中一种威胁是拒绝服务(DoS)攻击,文章将讨论DoS碰撞攻击的概念和原理,以及攻击者的动机和目标。对现有的一些范例与应用进行综述。最后,我们会总结当前的研究进展,文章旨在为网络安全领域的研究者提供一个新视角,以应对不断进化的DoS碰撞攻击威胁,并探索其未来的防御方向。 展开更多
关键词 密码学 dos攻击
在线阅读 下载PDF
DoS攻击下的二维离散系统记忆型事件触发控制
5
作者 黄俊华 黄世沛 +3 位作者 韩俊威 吴畏 骆茂森 夏涛 《温州大学学报(自然科学版)》 2025年第1期26-39,共14页
研究了遭受拒绝服务(DoS)攻击的二维Roesser模型描述的系统镇定问题.通过DoS攻击的间歇性特征限制DoS频率和DoS持续时间,将原来的二维系统转化为一类切换系统;为了解决触发灵敏性较低而使系统动态性能下降和事件触发延长DoS攻击的持续... 研究了遭受拒绝服务(DoS)攻击的二维Roesser模型描述的系统镇定问题.通过DoS攻击的间歇性特征限制DoS频率和DoS持续时间,将原来的二维系统转化为一类切换系统;为了解决触发灵敏性较低而使系统动态性能下降和事件触发延长DoS攻击的持续时间的问题,提出了一种新的记忆型事件触发条件.此外,利用Lyapunov函数法,提出了一种状态反馈控制器的设计方法,并对闭环系统的指数稳定性进行了分析,利用线性矩阵不等式技术导出了控制器增益矩阵存在的充分条件;利用Darboux方程的仿真算例验证了所提出的事件触发控制方案的有效性.仿真结果表明,在所设计的控制方案下,闭环系统的状态是指数收敛的,能够弥补DoS攻击的恶意影响,减少通信资源的浪费. 展开更多
关键词 二维系统 dos攻击 记忆型事件触发 切换系统 指数稳定
在线阅读 下载PDF
Resilient and Safe Platooning Control of Connected Automated Vehicles Against Intermittent Denial-of-Service Attacks 被引量:18
6
作者 Xiaohua Ge Qing-Long Han +1 位作者 Qing Wu Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1234-1251,共18页
Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumpti... Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumption and vehicle emissions.A fundamental issue in CAVs is platooning control that empowers a convoy of CAVs to be cooperatively maneuvered with desired longitudinal spacings and identical velocities on roads.This paper addresses the issue of resilient and safe platooning control of CAVs subject to intermittent denial-of-service(DoS)attacks that disrupt vehicle-to-vehicle communications.First,a heterogeneous and uncertain vehicle longitudinal dynamic model is presented to accommodate a variety of uncertainties,including diverse vehicle masses and engine inertial delays,unknown and nonlinear resistance forces,and a dynamic platoon leader.Then,a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability,attack resilience,platoon safety and scalability.Furthermore,a numerically efficient offline design algorithm for determining the desired platoon control law is developed,under which the platoon resilience against DoS attacks can be maximized but the anticipated stability,safety and scalability requirements remain preserved.Finally,extensive numerical experiments are provided to substantiate the efficacy of the proposed platooning method. 展开更多
关键词 Connected automated vehicles(CAVs) cooperative adaptive cruise control denial-of-service(dos)attacks resilient control vehicle platooning vehicle-to-vehicle communication
在线阅读 下载PDF
Adaptive Memory Event-Triggered Observer-Based Control for Nonlinear Multi-Agent Systems Under DoS Attacks 被引量:7
7
作者 Xianggui Guo Dongyu Zhang +1 位作者 Jianliang Wang Choon Ki Ahn 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第10期1644-1656,共13页
This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-d... This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-disturbance control scheme is presented to improve the observer accuracy by adding a buffer for the system output measurements.Meanwhile,this control scheme can also provide more reasonable control signals when Do S attacks occur.To save network resources,an adaptive memory event-triggered mechanism(AMETM)is also proposed and Zeno behavior is excluded.It is worth mentioning that the AMETM's updates do not require global information.Then,the observer and controller gains are obtained by using the linear matrix inequality(LMI)technique.Finally,simulation examples show the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive memory event-triggered mechanism(AMETM) compensation mechanism denial-of-service(dos)attacks nonlinear multi-agent systems(MASs) observer-based anti-disturbance control
在线阅读 下载PDF
Sliding Mode Control for Nonlinear Markovian Jump Systems Under Denial-of-Service Attacks 被引量:4
8
作者 Lei Liu Lifeng Ma +1 位作者 Jie Zhang Yuming Bo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1638-1648,共11页
This paper investigates the sliding mode control(SMC) problem for a class of discrete-time nonlinear networked Markovian jump systems(MJSs) in the presence of probabilistic denial-of-service(Do S) attacks. The communi... This paper investigates the sliding mode control(SMC) problem for a class of discrete-time nonlinear networked Markovian jump systems(MJSs) in the presence of probabilistic denial-of-service(Do S) attacks. The communication network via which the data is propagated is unsafe and the malicious adversary can attack the system during state feedback. By considering random Denial-of-Service attacks, a new sliding mode variable is designed, which takes into account the distribution information of the probabilistic attacks. Then, by resorting to Lyapunov theory and stochastic analysis methods, sufficient conditions are established for the existence of the desired sliding mode controller, guaranteeing both reachability of the designed sliding surface and stability of the resulting sliding motion.Finally, a simulation example is given to demonstrate the effectiveness of the proposed sliding mode control algorithm. 展开更多
关键词 denial-of-service(dos)attacks Markovian jump systems(MJSs) networked control systems(NCSs) sliding mode control(SMC)
在线阅读 下载PDF
Decentralized Resilient H_∞Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks 被引量:3
9
作者 Xin Zhao Suli Zou Zhongjing Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1737-1751,共15页
This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitte... This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitted through the communication networks,which may be attacked by energylimited denial-of-service(DoS)attacks with a characterization of the maximum count of continuous data losses(resilience index).Each area is controlled in a decentralized mode,and the impacts on one area from other areas via their interconnections are regarded as the additional load disturbance of this area.Then,the closed-loop LFC system of each area under DoS attacks is modeled as an aperiodic sampled-data control system with external disturbances.Under this modeling,a decentralized resilient H_(∞)scheme is presented to design the state-feedback controllers with guaranteed H∞performance and resilience index based on a novel transmission interval-dependent loop functional method.When given the controllers,the proposed scheme can obtain a less conservative H_(∞)performance and resilience index that the LFC system can tolerate.The effectiveness of the proposed LFC scheme is evaluated on a one-area CPPS and two three-area CPPSs under DoS attacks. 展开更多
关键词 Cyber-physical power systems(CPPSs) denial-of-service(dos)attacks load frequency control(LFC) sampled-data control
在线阅读 下载PDF
SGuard:A Lightweight SDN Safe-Guard Architecture for DoS Attacks 被引量:10
10
作者 Tao Wang Hongchang Chen 《China Communications》 SCIE CSCD 2017年第6期113-125,共13页
Software Defined Networking(SDN) is a revolutionary networking paradigm towards the future network,experiencing rapid development nowadays.However,its main characteristic,the separation of control plane and data plane... Software Defined Networking(SDN) is a revolutionary networking paradigm towards the future network,experiencing rapid development nowadays.However,its main characteristic,the separation of control plane and data plane,also brings about new security challenges,i.e.,Denial-of-Service(DoS) attacks specific to Open Flow SDN networks to exhaust the control plane bandwidth and overload the buffer memory of Open Flow switch.To mitigate the DoS attacks in the Open Flow networks,we design and implement SGuard,a security application on top of the NOX controller that mainly contains two modules:Access control module and Classification module.We employ novel six-tuple as feature vector to classify traffic flows,meanwhile optimizing classification by feature ranking and selecting algorithms.All the modules will cooperate with each other to complete a series of tasks such as authorization,classification and so on.At the end of this paper,we experimentally use Mininet to evaluate SGuard in a software environment.The results show that SGuard works efficiently and accurately without adding more overhead to the SDN networks. 展开更多
关键词 sguard software defined networking denial-of-service attack security application
在线阅读 下载PDF
Security Control for Uncertain Networked Control Systems under DoS Attacks and Fading Channels 被引量:1
11
作者 Chengzhen Gao Cheng Tan +1 位作者 Hongtao Sun Mingyue Xiang 《Journal of Beijing Institute of Technology》 EI CAS 2022年第4期422-430,共9页
This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remote... This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remotely controls the plant and the control input is transmitted over a fading channel.Meanwhile,considering the sustained attack cycle and frequency of DoS attacks are random,the packet-loss caused by DoS attacks is modelled by a Markov process.The sampled-data NCS is transformed into a stochastic form with Markov jump and uncertain parameter.Then,based on Lyapunov functional method,linear matrix inequality(LMI)-based sufficient conditions are presented to ensure the stability of uncertain NCSs.The main contribution of this article lies in the construction of NCSs based on DoS attacks into Markov jump system(MJS)and the joint consideration of fading channel and plant uncertainty. 展开更多
关键词 networked control systems denial-of-service(dos)attacks UNCERTAINTY fading channels Markov jump system
在线阅读 下载PDF
Variance-Constrained Filtering Fusion for Nonlinear Cyber-Physical Systems With the Denial-of-Service Attacks and Stochastic Communication Protocol 被引量:4
12
作者 Hang Geng Zidong Wang +2 位作者 Yun Chen Xiaojian Yi Yuhua Cheng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期978-989,共12页
In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the st... In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the stochastic communication protocol is adopted in the sensor-to-filter channels to regulate the transmission order of sensors.Each sensor is allowed to enter the network according to the transmission priority decided by a set of independent and identicallydistributed random variables.From the defenders’view,the occurrence of the denial-of-service attack is governed by the randomly Bernoulli-distributed sequence.At the local filtering stage,a set of variance-constrained local filters are designed where the upper bounds(on the filtering error covariances)are first acquired and later minimized by appropriately designing filter parameters.At the fusion stage,all local estimates and error covariances are combined to develop a variance-constrained fusion estimator under the federated fusion rule.Furthermore,the performance of the fusion estimator is examined by studying the boundedness of the fused error covariance.A simulation example is finally presented to demonstrate the effectiveness of the proposed fusion estimator. 展开更多
关键词 Cyber-physical system(CPS) denial-of-service attack stochastic communication protocol(SCP) variance-constrained filtering fusion
在线阅读 下载PDF
A Router Based Packet Filtering Scheme for Defending Against DoS Attacks 被引量:1
13
作者 LU Ning SU Sen +1 位作者 JING Maohua HAN Jian 《China Communications》 SCIE CSCD 2014年第10期136-146,共11页
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ... The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage. 展开更多
关键词 Internet security dos attacks filter-based reactive packet filtering
在线阅读 下载PDF
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks
14
作者 Yu ZHANG Xing She ZHOU +2 位作者 Yi Ming JI Yee Wei LAW Marimuthu PALANISWAMI 《International Journal of Communications, Network and System Sciences》 2009年第1期64-72,共9页
Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemina... Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs. 展开更多
关键词 Sensor Networks Code DISSEMINATION Deluge Security dos attacks
在线阅读 下载PDF
外部干扰和随机DoS攻击下的网联车安全H∞队列控制 被引量:3
15
作者 宋秀兰 李洋阳 何德峰 《自动化学报》 EI CAS CSCD 北大核心 2024年第2期348-355,共8页
针对网联车队列系统易受到干扰和拒绝服务(Denial of service, DoS)攻击问题,提出一种外部干扰和随机DoS攻击作用下的网联车安全H∞队列控制方法.首先,采用马尔科夫随机过程,将网联车随机DoS攻击特性建模为一个随机通信拓扑切换模型,据... 针对网联车队列系统易受到干扰和拒绝服务(Denial of service, DoS)攻击问题,提出一种外部干扰和随机DoS攻击作用下的网联车安全H∞队列控制方法.首先,采用马尔科夫随机过程,将网联车随机DoS攻击特性建模为一个随机通信拓扑切换模型,据此设计网联车安全队列控制协议.然后,采用线性矩阵不等式(Linear matrix inequality, LMI)技术计算安全队列控制器参数,并应用Lyapunov-Krasovskii稳定性理论,建立在外部扰动和随机DoS攻击下队列系统稳定性充分条件.在此基础上,分析得到该队列闭环系统的弦稳定性充分条件.最后,通过7辆车组成的队列系统对比仿真实验,验证该方法的优越性. 展开更多
关键词 网联自主车辆 队列控制 安全控制 随机dos攻击 稳定性
在线阅读 下载PDF
计及DoS攻击和通信时滞的电力系统负荷频率控制 被引量:2
16
作者 刘星月 田永强 +2 位作者 施开波 周坤 唐琳 《工程科学与技术》 EI CAS CSCD 北大核心 2024年第3期249-258,共10页
针对电力系统通信网络中存在的时滞和DoS攻击现象,本文提出了基于采样特性的电力系统离散负荷频率控制方案。首先,计及电力系统负荷波动的情况,在多区域电力系统负荷频率控制系统(LFC)模型的基础上,将通信网络中DoS攻击的危害量化为采... 针对电力系统通信网络中存在的时滞和DoS攻击现象,本文提出了基于采样特性的电力系统离散负荷频率控制方案。首先,计及电力系统负荷波动的情况,在多区域电力系统负荷频率控制系统(LFC)模型的基础上,将通信网络中DoS攻击的危害量化为采样信号连续丢失数,并分别考虑通信网络中通信时滞和输出信号采样特性,建立包含输出状态反馈控制器的电力系统LFC模型。其次,基于此模型,利用含有控制命令更新周期、DoS攻击导致的最大采样信号连续丢失数、通信时滞、H_(∞)稳定指标的双边闭环Lyapunov泛函、LMI技术,提出LFC系统满足一定H_(∞)指标的稳定准则,并给出离散状态输出反馈LFC控制器的设计及求解方法。最后,本文以单区域和双区域LFC系统为例进行了仿真验证。结果表明:与已有文献方法相比,本文方法在保持系统H_(∞)渐近稳定前提下,能够容忍更大的通信时滞,且结果的保守性更低;同时可以看出本文所设计的控制器在保证H_(∞)稳定性能的基础上,对一定能量限制的DoS攻击具有弹性的防御性能。因此本文方案的有效性和优越性得到了验证。 展开更多
关键词 时滞 dos攻击 负荷频率控制方案 采样特性 LYAPUNOV泛函
在线阅读 下载PDF
DoS攻击下抛物型多智能体系统的输出反馈领导-跟随一致性 被引量:1
17
作者 刘艳军 昝文广 唐丽 《沈阳工业大学学报》 CAS 北大核心 2024年第5期685-692,共8页
为了解决抛物型多智能体系统(MASs)在拒绝服务(DoS)攻击下的一致性问题,提出了一种基于输出反馈方法的MASs领导-跟随一致性控制协议来应对恶意攻击者发起的DoS攻击,从而实现智能体在无向通信拓扑图上的领导-跟随一致性。对DoS攻击的频... 为了解决抛物型多智能体系统(MASs)在拒绝服务(DoS)攻击下的一致性问题,提出了一种基于输出反馈方法的MASs领导-跟随一致性控制协议来应对恶意攻击者发起的DoS攻击,从而实现智能体在无向通信拓扑图上的领导-跟随一致性。对DoS攻击的频率和持续时间进行了分析,利用Lyapunov稳定性定理推导了抛物型偏微分系统的稳定条件,证明了触发时间间隔不为零,避免了芝诺行为的发生,并通过仿真算例验证了理论结果的有效性。 展开更多
关键词 多智能体系统 拒绝服务攻击 输出反馈方法 偏微分系统 攻击频率 攻击持续时间 LYAPUNOV稳定性定理
在线阅读 下载PDF
DoS攻击下多智能体ICPS的最优一致控制
18
作者 孙子文 翟润华 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2024年第12期62-70,共9页
为解决由多个被控对象组成的工业信息物理系统(ICPS)在拒绝服务(DoS)攻击和不确定外界扰动下的一致性控制问题,将多智能体和ICPS相结合,并基于状态观测器和零和博弈方法,设计最优H_(∞)一致控制器。首先,针对多个被控对象组成的ICPS,根... 为解决由多个被控对象组成的工业信息物理系统(ICPS)在拒绝服务(DoS)攻击和不确定外界扰动下的一致性控制问题,将多智能体和ICPS相结合,并基于状态观测器和零和博弈方法,设计最优H_(∞)一致控制器。首先,针对多个被控对象组成的ICPS,根据智能体的信息交互特性,构建固定拓扑结构的多智能体ICPS模型。其次,考虑DoS攻击作用在传感器通道和执行器通道时系统通信信道堵塞的影响,采用状态观测器重构被堵塞的状态信息,并构建DoS攻击下基于状态观测器的多智能体ICPS模型。然后,引入干扰抑制水平,并将控制器和干扰者视为零和博弈中的参与者,根据干扰抑制水平的优化目标和H_(∞)性能条件,构建基于零和博弈的最优H_(∞)设计框架。最后,通过对干扰抑制水平的约束,并求解满足H_(∞)一致性的线性矩阵不等式,设计最优一致性控制器。采用4个不间断电源的控制问题作为仿真对象,Matlab仿真结果表明,相比于未对状态重构和未对参数约束的设计方法,本设计方案可使得多智能体ICPS在双通道DoS攻击下达到一致的时间更短,且具有良好的相对稳定性。 展开更多
关键词 工业信息物理系统 多智能体 dos攻击 零和博弈 干扰抑制水平 H_(∞)一致性
在线阅读 下载PDF
基于联邦学习的无线通信网络DoS攻击检测方法 被引量:1
19
作者 马玉梅 张东阳 《现代电子技术》 北大核心 2024年第18期47-51,共5页
无线通信网络受到DoS攻击,会使得网络的负载增加,导致延迟增加。而在无线通信网络中,数据通常分散在多个节点上,这会造成数据泄露和被攻击。为此,提出一种基于联邦学习的无线通信网络DoS攻击检测方法。对初始无线通信网络数据进行预处... 无线通信网络受到DoS攻击,会使得网络的负载增加,导致延迟增加。而在无线通信网络中,数据通常分散在多个节点上,这会造成数据泄露和被攻击。为此,提出一种基于联邦学习的无线通信网络DoS攻击检测方法。对初始无线通信网络数据进行预处理和归一化,并采用随机森林算法进行降维处理,去除冗余特征,获得最佳网络数据特征集。将特征集输入到以深度卷积神经网络为通用模型的联邦学习训练模型中,独立训练本地模型并进行模型修正,传输至中心服务器进行聚合,收敛后完成训练。利用训练得到的联邦学习模型检测无线通信网络DoS攻击速率,再与接收者接收的容量最大值进行比较,判断是否有DoS攻击。实验结果表明,所提方法在处理大量数据时具有较高的稳定性和可靠性,能够在短时间内准确地检测出DoS攻击。 展开更多
关键词 联邦学习 无线通信网络 dos攻击检测 深度卷积神经网络 随机森林算法 通用模型
在线阅读 下载PDF
带DoS攻击补偿的线性离散系统分布式融合滤波器
20
作者 何光耀 孙书利 《黑龙江大学自然科学学报》 CAS 2024年第3期347-354,共8页
多传感器网络化线性离散系统的每个传感器基于自己的观测数据可进行局部状态估计。当局部估值被传输给融合中心时,可能遭受DoS(Denial of service)攻击。为了补偿DoS攻击引起的数据丢失,采用丢失数据的预报器进行补偿。应用线性无偏最... 多传感器网络化线性离散系统的每个传感器基于自己的观测数据可进行局部状态估计。当局部估值被传输给融合中心时,可能遭受DoS(Denial of service)攻击。为了补偿DoS攻击引起的数据丢失,采用丢失数据的预报器进行补偿。应用线性无偏最小方差矩阵加权融合算法获得分布式融合状态滤波器。所提出的分布式融合滤波器改善了局部估计的精度,且比协方差交叉融合算法具有更高的估计精度。仿真例子验证了算法的有效性。 展开更多
关键词 分布式融合滤波器 dos攻击 预报补偿 多传感器系统
在线阅读 下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部