CN114995158A - Adaptive sampling switching control method for complex circuit network system under DoS attack - Google Patents

Adaptive sampling switching control method for complex circuit network system under DoS attack Download PDF

Info

Publication number
CN114995158A
CN114995158A CN202210759316.3A CN202210759316A CN114995158A CN 114995158 A CN114995158 A CN 114995158A CN 202210759316 A CN202210759316 A CN 202210759316A CN 114995158 A CN114995158 A CN 114995158A
Authority
CN
China
Prior art keywords
attack
controller
sampling
dos attack
dos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210759316.3A
Other languages
Chinese (zh)
Other versions
CN114995158B (en
Inventor
张瑞梅
曾德强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan University
Original Assignee
Sichuan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan University filed Critical Sichuan University
Priority to CN202210759316.3A priority Critical patent/CN114995158B/en
Publication of CN114995158A publication Critical patent/CN114995158A/en
Application granted granted Critical
Publication of CN114995158B publication Critical patent/CN114995158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B13/00Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
    • G05B13/02Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
    • G05B13/04Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
    • G05B13/042Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators in which a parameter or coefficient is automatically adjusted to optimise the performance
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了DoS攻击下复杂电路网络系统的自适应采样切换控制方法,传感器对复杂电路网络系统以周期T进行采样,由发送器将误差采样状态和采样点序列构成的数据包发送至通信网络;当数据包到达缓存器,缓存器立即生成第一控制信号,比较器根据数据包和时间点序列捕获DoS攻击关键信息,智能逻辑处理器根据DoS攻击关键信息发送不同的信号给控制器;控制器根据智能逻辑处理器发送的信号控制切换控制增益参数,经零阶保持器、执行器反馈给复杂电路网络系统,从而驱动复杂电路网络系统。本发明结合智能逻辑处理器和自适应采样切换控制机制,针对不同的DoS攻击情形采用不同的控制器,有效增强系统对抗DoS攻击的鲁棒性。

Figure 202210759316

The invention discloses an adaptive sampling switching control method for a complex circuit network system under DoS attack. A sensor samples the complex circuit network system with a period T, and a transmitter sends a data packet composed of an error sampling state and a sampling point sequence to a communication network. ; When the data packet arrives in the buffer, the buffer immediately generates the first control signal, the comparator captures the key information of the DoS attack according to the data packet and the time point sequence, and the intelligent logic processor sends different signals to the controller according to the key information of the DoS attack; control The controller switches the control gain parameters according to the signal sent by the intelligent logic processor, and feeds it back to the complex circuit network system through the zero-order holder and the actuator, thereby driving the complex circuit network system. The invention combines an intelligent logic processor and an adaptive sampling switching control mechanism, adopts different controllers for different DoS attack situations, and effectively enhances the robustness of the system against DoS attacks.

Figure 202210759316

Description

DoS攻击下复杂电路网络系统的自适应采样切换控制方法Adaptive sampling switching control method for complex circuit network system under DoS attack

技术领域technical field

本发明涉及电路系统安全控制技术领域,具体的说,是一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法。The invention relates to the technical field of circuit system security control, in particular to an adaptive sampling switching control method of a complex circuit network system under DoS attack.

背景技术Background technique

随着网络化和信息化的迅猛发展,复杂电路网络系统在带给人们财富和便利的同时也日益凸显了其安全问题。由于复杂电路网络系统是由多个电路系统通过网络连接构成的复杂系统。每个电路系统内部是由传感器、控制器、执行器和网络等构成的一个有机整体,电路系统之间是通过网络来进行信息交互的。由于网络的高度开放性和共享性,使得很容易受到网络攻击。近年来,全球网络攻击事件的频发,使得人们越来越认识到网络安全的重要性。由于网络安全控制能有效对抗多种网络攻击,因此复杂电路网络系统的安全控制成为研究重点。针对复杂电路网络系统,目前大多数控制方法主要是基于连续反馈信息设计的。在连续反馈控制中,状态变量的信息需要连续不断的传输到控制器并反馈给系统。这种连续反馈控制模式在一定程度上造成计算和网络通信资源的浪费。对比连续反馈控制方法,采样控制仅需将采样点处的信号传输给控制器,从而能够极大的减少信息传输量,有效的节约网络通信资源。目前,复杂电路网络系统的采样控制成为研究焦点。DoS攻击作为一类常见的网络攻击会严重影响复杂电路网络系统的同步性能与安全。因此,在DoS攻击下探究复杂电路网络系统的安全采样控制是意义深远的,但目前尚缺乏相关研究。此外,为有效对抗DoS攻击对网络系统性能的影响,文献“《在DoS攻击下基于采样模型的一类网络化控制系统的弹性控制设计》,IEEE控制论汇刊,2020年8月”在采样模式下提出了弹性安全采样控制方法。在该方法中,为捕获DoS攻击信息,作者在采样控制器设计中嵌入了逻辑处理器,并且该方法已成功应用于解决DoS攻击下多智能体系统的一致性问题,其逻辑处理器能有效捕获DoS攻击信息且所提出的弹性安全采样控制方法能有效对抗DoS攻击对网络系统性能的影响。但该方法存在三点不足之处:(1)设计的逻辑处理器不能充分捕获DoS攻击关键信息,比如被攻击的采样点总数和攻击发起时刻;(2)忽视了DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系;(3)不管DoS攻击是否发生,所有时刻都采用相同的控制增益,这会在一定程度上造成控制鲁棒性较差。With the rapid development of networking and informatization, the complex circuit network system brings people wealth and convenience, but also increasingly highlights its security issues. Because a complex circuit network system is a complex system composed of multiple circuit systems connected through a network. The interior of each circuit system is an organic whole composed of sensors, controllers, actuators and networks, and the information exchange between circuit systems is carried out through the network. Due to the high degree of openness and sharing of the network, it is very vulnerable to network attacks. In recent years, the frequent occurrence of global network attacks has made people more and more aware of the importance of network security. Because network security control can effectively resist various network attacks, the security control of complex circuit network systems has become the focus of research. For complex circuit network systems, most of the current control methods are mainly designed based on continuous feedback information. In continuous feedback control, the information of state variables needs to be continuously transmitted to the controller and fed back to the system. This continuous feedback control mode results in a waste of computing and network communication resources to a certain extent. Compared with the continuous feedback control method, the sampling control only needs to transmit the signal at the sampling point to the controller, which can greatly reduce the amount of information transmission and effectively save the network communication resources. At present, the sampling control of complex circuit network systems has become the focus of research. As a kind of common network attack, DoS attack will seriously affect the synchronization performance and security of complex circuit network system. Therefore, it is of far-reaching significance to explore the secure sampling control of complex circuit network systems under DoS attacks, but there is still a lack of relevant research. In addition, in order to effectively combat the impact of DoS attacks on the performance of network systems, the paper "Resilient Control Design of a Class of Networked Control Systems Based on Sampling Models under DoS Attacks", IEEE Transactions on Cybernetics, August 2020" in Sampling In this model, an elastic safety sampling control method is proposed. In this method, in order to capture DoS attack information, the author embeds a logic processor in the design of the sampling controller, and the method has been successfully applied to solve the consistency problem of multi-agent systems under DoS attack, and its logic processor can effectively Capturing DoS attack information and the proposed elastic security sampling control method can effectively combat the impact of DoS attack on network system performance. However, this method has three shortcomings: (1) the designed logical processor cannot fully capture the key information of DoS attacks, such as the total number of attacked sampling points and the attack launch time; (2) the frequency of DoS attacks and the duration of DoS attacks are ignored. The relationship between domain, sampling period and maximum dwell time; (3) Regardless of whether a DoS attack occurs, the same control gain is used at all times, which will result in poor control robustness to a certain extent.

发明内容SUMMARY OF THE INVENTION

本发明的目的在于提供一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法,用于解决现有技术中弹性安全采样控制方法对抗DoS攻击对网络系统性能的影响时存在不能充分捕获DoS攻击关键信息、忽视了DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系以及控制鲁棒性差的问题。The purpose of the present invention is to provide an adaptive sampling switching control method of complex circuit network system under DoS attack, which is used to solve the problem of insufficient capture of DoS when the elastic security sampling control method in the prior art resists the impact of DoS attack on network system performance. Attacking key information, ignoring the DoS attack frequency, DoS attack residence area, the relationship between the sampling period and the maximum residence time, and the problem of poor control robustness.

本发明通过下述技术方案解决上述问题:The present invention solves the above-mentioned problems through the following technical solutions:

一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法,包括:An adaptive sampling switching control method for a complex circuit network system under DoS attack, comprising:

步骤S100、传感器对复杂电路网络系统以周期T进行采样,得到电路系统的误差采样状态和采样点序列;Step S100, the sensor samples the complex circuit network system with a period T to obtain the error sampling state and sampling point sequence of the circuit system;

传感器对复杂电路网络系统以周期T进行采样,得到第i个电路系统在采样点sl的误差采样状态ηi(sl)和采样点序列S={s0,s1,…,sl,…,sL},其中s0=0,sl=lT,sl为采样时刻,L为采样次数,l=0,1,2,……,L;i=1,2,3,……,m;m为电路系统个数;The sensor samples the complex circuit network system with a period T, and obtains the error sampling state η i (s l ) of the ith circuit system at the sampling point s l and the sampling point sequence S={s 0 ,s 1 ,...,s l , . _ _ ..., m; m is the number of circuit systems;

步骤S200、由发送器将误差采样状态和采样点序列构成的数据包发送至通信网络;即数据包(sli(sl))由误差采样状态ηi(sl)和采样点序列S={s0,s1,…,sl,…,sL};Step S200, the data packet formed by the error sampling state and the sampling point sequence is sent to the communication network by the transmitter; that is, the data packet (s1, η i (s 1 ) ) is composed of the error sampling state η i (s 1 ) and the sampling point. sequence S={s 0 ,s 1 ,…,s l ,…,s L };

步骤S300、当数据包到达智能逻辑处理器的缓存器,缓存器的数据被更新时立即生成第一控制信号,第一控制信号用于实现系统安全同步控制;智能逻辑处理器向控制器发送数据包的时间点序列

Figure BDA0003723681520000021
智能逻辑处理器的比较器根据数据包和时间点序列捕获DoS攻击关键信息,智能逻辑处理器根据DoS攻击关键信息发送不同的信号给控制器;Step S300, when the data packet reaches the buffer of the intelligent logic processor, and the data in the buffer is updated, the first control signal is immediately generated, and the first control signal is used to realize the system safety synchronization control; the intelligent logic processor sends the data to the controller time point series of packets
Figure BDA0003723681520000021
The comparator of the intelligent logic processor captures the key information of the DoS attack according to the data packet and time point sequence, and the intelligent logic processor sends different signals to the controller according to the key information of the DoS attack;

步骤S400、控制器根据智能逻辑处理器发送的信号控制切换控制增益参数,并根据智能逻辑处理器发送的信号和控制增益生成第二控制信号,再利用零阶保持器将离散采样第二控制信号被转化为连续信号,经执行器再反馈给复杂电路网络系统,从而驱动复杂电路网络系统。Step S400, the controller controls the switching control gain parameter according to the signal sent by the intelligent logic processor, and generates a second control signal according to the signal sent by the intelligent logic processor and the control gain, and then uses the zero-order holder to discretely sample the second control signal. It is converted into a continuous signal, and then fed back to the complex circuit network system through the actuator, thereby driving the complex circuit network system.

捕获DoS攻击关键信息具体包括:The key information for capturing DoS attacks includes:

初始化采样时刻

Figure BDA0003723681520000031
DoS攻击的发生次数N0=0、被检测后的攻击驻留总时长D0=0、最大驻留时间hM=T、第一关键参数σ1=1和第二关键参数σ2=0,其中,
Figure BDA00037236815200000315
,第一关键参数σ1和第二关键参数σ2用于控制器自适应调节控制输入;Initial sampling time
Figure BDA0003723681520000031
The number of occurrences of DoS attacks N 0 =0, the total attack residence time after detection D 0 =0, the maximum residence time h M =T, the first key parameter σ 1 =1 and the second key parameter σ 2 =0 ,in,
Figure BDA00037236815200000315
, the first key parameter σ 1 and the second key parameter σ 2 are used for the controller to adaptively adjust the control input;

令系统误差状态η(t)=[η1 T(t),η2 T(t),…,ηi T(t),…]T,其中,ηi T(t)为第i个电路系统的误差状态;Let the systematic error state η(t)=[η 1 T (t),η 2 T (t),...,η i T (t),...] T , where η i T (t) is the ith circuit the error state of the system;

对于给定的初值和

Figure BDA0003723681520000032
比较器首先判断数据包
Figure BDA0003723681520000033
是否到达缓存器,如果到达,则把
Figure BDA0003723681520000034
赋值给时间点序列的当前时间点tl,发送信号(σ12)=(1,0)和数据包(tl,η(tl))到控制器,并将tl的值赋值给
Figure BDA0003723681520000035
如果未到达,警报器被触发,即数据包
Figure BDA0003723681520000036
遭受了DoS攻击,此时
Figure BDA0003723681520000037
为攻击发起时刻;更新DoS攻击发生次数N0=N0+1,发送信号(σ12)=(0,1)到控制器,并等待采样数据包(tl,η(tl))到达缓存器,如果数据包(tl,η(tl))到达缓存器,则这次攻击结束,更新
Figure BDA0003723681520000038
其中
Figure BDA0003723681520000039
表示该次攻击在被检测后的持续时间,
Figure BDA00037236815200000310
为被检测时间点;for a given initial value and
Figure BDA0003723681520000032
The comparator first judges the packet
Figure BDA0003723681520000033
Whether to reach the buffer, if so, put
Figure BDA0003723681520000034
Assign the current time point t l of the time point sequence, send the signal (σ 12 )=(1,0) and the data packet (t l ,η(t l )) to the controller, and use the value of t l assign to
Figure BDA0003723681520000035
If it doesn't arrive, the siren is triggered, i.e. the packet
Figure BDA0003723681520000036
suffered a DoS attack,
Figure BDA0003723681520000037
is the attack initiation time; update the number of DoS attacks N 0 =N 0 +1, send signals (σ 12 )=(0,1) to the controller, and wait for the sampling data packets (t l ,η(t l ) )) reach the buffer, if the data packet (t l , η(t l )) reaches the buffer, the attack ends, and the update
Figure BDA0003723681520000038
in
Figure BDA0003723681520000039
Indicates the duration of the attack after it was detected,
Figure BDA00037236815200000310
is the detected time point;

比较器判断最大驻留时间hM

Figure BDA00037236815200000311
的大小,如果hM小于
Figure BDA00037236815200000312
则更新
Figure BDA00037236815200000313
发送信号(σ12)=(1,0)和数据包(tl,η(tl))到控制器,并将tl赋值给
Figure BDA00037236815200000314
即获取DoS攻击关键信息:攻击发起时刻
Figure BDA0003723681520000041
攻击总次数N0、攻击驻留总时长D0、被攻击的采样数和最大驻留时间hM。The comparator judges the maximum dwell time h M and
Figure BDA00037236815200000311
size, if h M is less than
Figure BDA00037236815200000312
then update
Figure BDA00037236815200000313
Send the signal (σ 12 )=(1,0) and the data packet (t l ,η(t l )) to the controller and assign t l to
Figure BDA00037236815200000314
That is, to obtain the key information of the DoS attack: the moment when the attack was launched
Figure BDA0003723681520000041
The total number of attacks N 0 , the total attack dwell time D 0 , the number of attacked samples and the maximum dwell time h M .

控制器根据智能逻辑处理器发送的信号控制切换控制增益,并根据智能逻辑处理器发送的信号和控制增益生成第二控制信号具体为:The controller controls the switching control gain according to the signal sent by the intelligent logic processor, and generates the second control signal according to the signal sent by the intelligent logic processor and the control gain. Specifically:

如果区间[tl,tl+1),l=1,2,...未遭受DoS攻击,则有tl+1=tl+T;则控制器为:If the interval [t l , t l+1 ), l=1, 2, ... is not subject to DoS attack, then there is t l+1 =t l +T; then the controller is:

ui(t)=-k1iηi(tl),t∈[tl,tl+T),i=1,2,…mu i (t)=-k 1i η i (t l ),t∈[t l ,t l +T),i=1,2,…m

其中,m为电路系统个数;ui(t)是第i个电路系统的控制输入,k1i是控制器ui(t)的控制增益;ηi(tl)为第i个电路系统在时间tl的误差状态;Among them, m is the number of circuit systems; u i (t) is the control input of the ith circuit system, k 1i is the control gain of the controller u i (t); η i (t l ) is the ith circuit system Error state at time t l ;

如果区间[tl,tl+1),l=1,2,...遭受DoS攻击,则有tl+T<tl+1≤tl+hM;则控制器为:If the interval [t l ,t l+1 ),l=1,2,... suffers from DoS attacks, then t l +T<t l+1 ≤t l +h M ; then the controller is:

ui(t)=-σ1(t)k1iηi(tl)-σ2(t)k2iηi(tl),i=1,2,…mu i (t)=-σ 1 (t)k 1i η i (t l )-σ 2 (t)k 2i η i (t l ),i=1,2,...m

其中

Figure BDA0003723681520000042
σ1(t)、σ2(t)的取值分别是由智能逻辑处理器输出的第一关键参数σ1、第二关键参数σ2的值确定的,k1i、k2i是控制增益。in
Figure BDA0003723681520000042
The values of σ 1 (t) and σ 2 (t) are respectively determined by the values of the first key parameter σ 1 and the second key parameter σ 2 output by the intelligent logic processor, and k 1i and k 2i are control gains.

本发明与现有技术相比,具有以下优点及有益效果:Compared with the prior art, the present invention has the following advantages and beneficial effects:

(1)本发明结合智能逻辑处理器和采样控制机制,采用自适应采样切换控制方法,针对不同的DoS攻击情形采用不同的控制器,在确保复杂电路网络系统安全性能前提下能有效增强系统对抗DoS攻击的鲁棒性。(1) The present invention combines an intelligent logic processor and a sampling control mechanism, adopts an adaptive sampling switching control method, adopts different controllers for different DoS attack situations, and can effectively enhance system resistance under the premise of ensuring the safety performance of complex circuit network systems Robustness to DoS attacks.

(2)本发明在智能逻辑处理器设计了警报器,该警报器可自动检测系统被攻击时刻;通过智能逻辑处理器,得到被攻击采样点总数,并可建立DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系。(2) The present invention designs an alarm device in the intelligent logic processor, which can automatically detect the moment when the system is attacked; through the intelligent logic processor, the total number of sampled points to be attacked can be obtained, and the DoS attack frequency and DoS attack domain can be established. , the relationship between the sampling period and the maximum dwell time.

(3)本发明针对不同攻击情形,自适应选择控制增益,从而能有效增强系统对抗DoS攻击的鲁棒性。(3) The present invention adaptively selects control gains for different attack situations, thereby effectively enhancing the robustness of the system against DoS attacks.

附图说明Description of drawings

图1为蔡电路系统图;Figure 1 is the circuit diagram of Cai;

图2为蔡电路系统轨迹图;Fig. 2 is the track diagram of Cai's circuit system;

图3为电路系统间通信拓扑图结构图;Fig. 3 is a communication topology diagram structure diagram between circuit systems;

图4为DoS攻击下复杂电路网络系统控制流程图;Fig. 4 is the control flow chart of complex circuit network system under DoS attack;

图5为本发明比较器的逻辑操作流程图;Fig. 5 is the logic operation flow chart of the comparator of the present invention;

图6为现有技术中比较器的流程图;6 is a flowchart of a comparator in the prior art;

图7为DoS攻击序列图;Figure 7 is a sequence diagram of a DoS attack;

图8为复杂电路网络系统节点轨迹图;Fig. 8 is a complex circuit network system node trajectory diagram;

图9为同步误差图;Fig. 9 is a synchronization error diagram;

图10为自适应采样切换控制器图。Figure 10 is a diagram of an adaptive sampling switching controller.

具体实施方式Detailed ways

下面结合实施例对本发明作进一步地详细说明,但本发明的实施方式不限于此。The present invention will be further described in detail below with reference to the examples, but the embodiments of the present invention are not limited thereto.

实施例:Example:

一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法,包括:An adaptive sampling switching control method for a complex circuit network system under DoS attack, comprising:

1.系统参数设置:以电路系统为蔡电路为例,蔡电路如图1所示,其中R,R1是电阻,C1,C2是电容,L是电感;V1,V2分别是电容C1,C2两端的电压,i1,iR分别是流经电感L和电阻R的电流;g是非线性电阻;1. System parameter setting: Take the circuit system as the Cai circuit as an example, the Cai circuit is shown in Figure 1 , where R, R1 are resistors, C1 , C2 are capacitors, L is inductance ; V1, V2 are respectively The voltages across the capacitors C 1 and C 2 , i 1 , i R are the currents flowing through the inductor L and the resistor R respectively; g is the nonlinear resistance;

2.根据基尔霍夫电流定律,该电路系统的动态特征为:2. According to Kirchhoff's current law, the dynamic characteristics of the circuit system are:

Figure BDA0003723681520000061
Figure BDA0003723681520000061

其中g(V2)为流经非线性电阻g的电流,定义为:where g(V 2 ) is the current flowing through the nonlinear resistor g, defined as:

Figure BDA0003723681520000062
Figure BDA0003723681520000062

其中Ga,Gb,E为二极管参数。Wherein Ga , Gb , E are diode parameters.

通过变量代换

Figure BDA0003723681520000063
(1)可变为如下形式by variable substitution
Figure BDA0003723681520000063
(1) It can be changed to the following form

Figure BDA0003723681520000064
Figure BDA0003723681520000064

其中

Figure BDA0003723681520000065
m1=RGb,m2=RGa
Figure BDA0003723681520000066
这里取γ1=-1.3018,γ2=-0.0135,γ3=-0.0297,m1=-0.5700,m2=0.1091。在初值[0.9,-1.1,0.05]T下,上述电路系统状态轨迹图如图2所示,从图2可以看出系统展现出混沌行为。in
Figure BDA0003723681520000065
m 1 =RG b , m 2 =RG a ,
Figure BDA0003723681520000066
Here, γ 1 =-1.3018, γ 2 =-0.0135, γ 3 =-0.0297, m 1 =-0.5700, and m 2 =0.1091. Under the initial value [0.9,-1.1,0.05] T , the state trajectory diagram of the above circuit system is shown in Figure 2. From Figure 2, it can be seen that the system exhibits chaotic behavior.

3.描述多电路系统网络通信连接拓扑结构:以5个电路系统的通信连接拓扑关系为例,如图3所示,每个电路系统及目标系统都是蔡电路系统。设置一个通信连接系数bij,如果第j(j=1,2,…,5)个电路系统的信息能够传递给第i(i=1,2,…,5)个电路系统,则bij>0,否则bij=0。令b12=0.57,b21=6.65,b45=5.5,b54=0.6,则可得该拓扑结构的Laplacian矩阵L、加权邻接矩阵B和入度矩阵D分别为:3. Describe the network communication connection topology of the multi-circuit system: Take the communication connection topology relationship of five circuit systems as an example, as shown in Figure 3, each circuit system and the target system are Cai circuit systems. Set a communication connection coefficient b ij , if the information of the jth (j=1,2,...,5) circuit system can be transmitted to the ith (i=1,2,...,5) circuit system, then b ij >0, otherwise b ij =0. Let b 12 =0.57, b 21 =6.65, b 45 =5.5, b 54 =0.6, then the Laplacian matrix L, weighted adjacency matrix B and in-degree matrix D of the topology can be obtained as:

Figure BDA0003723681520000071
Figure BDA0003723681520000071

D=diag{0.57,6.65,0,5.5,0.6}。D=diag{0.57, 6.65, 0, 5.5, 0.6}.

4.设电路系统和目标系统的状态变量分别为θi(t)(i=1,2,…5)和ι(t),则误差状态为ηi(t)=θi(t)-ι(t)(i=1,2,…5)。DoS攻击下,复杂电路网络系统控制流程图如图4所示。在图4中,ηi(t)(i=1,2,…5)首先由传感器以周期T进行采样,采样点序列为S={s0,s1,…,sl,…},其中s0=0,sl=lT。然后由采样点sl和采样状态ηi(sl)(i=1,2,…,5)构成的数据包(sli(sl))被发送器发送至通信网络,经控制器、零阶保持器、执行器再反馈给复杂电路网络系统。如果从传感器到控制器信道遭受DoS攻击,则数据包(sli(sl))不能到达控制器。为了分析DoS攻击的影响,本发明设计了一个新的智能逻辑处理器。该智能逻辑处理器由缓存器和比较器组成。缓存器用以存储最新采样包。当缓存器的数据被更新时,则该更新数据就会立即被用于生成控制信号,用以实现系统安全同步控制性能,并设控制器接收到数据包的时间点序列为

Figure BDA0003723681520000072
比较器通过执行一些逻辑操作来捕获DoS攻击信息,具体逻辑操作如图5所示,设置初始参数,
Figure BDA0003723681520000073
为采样时刻且
Figure BDA0003723681520000074
N0表示DoS攻击的发生次数,D0表示被检测后的攻击驻留总时长,hM表示最大驻留时间。σ12是控制器的关键参数,用以自适应调节控制输入。并赋初值
Figure BDA0003723681520000075
N0=0,D0=0,hM=T,σ1=1,σ2=0。4. Suppose the state variables of the circuit system and the target system are θ i (t) (i=1, 2,...5) and ι(t) respectively, then the error state is η i (t)=θ i (t)- ι(t) (i=1,2,...5). Under the DoS attack, the control flow chart of the complex circuit network system is shown in Figure 4. In Fig. 4, η i (t) (i=1, 2,...5) is first sampled by the sensor with a period T, and the sampling point sequence is S={s 0 ,s 1 ,...,s l ,...}, where s 0 =0 and s l =1T. Then the data packet (s l , η i (s l )) composed of the sampling point s l and the sampling state η i (s l ) (i=1, 2, . . . , 5) is sent by the transmitter to the communication network, via The controller, zero-order retainer, and actuator are then fed back to the complex circuit network system. If the channel from the sensor to the controller suffers a DoS attack, the packets (s l , η i (s l )) cannot reach the controller. In order to analyze the impact of DoS attack, the present invention designs a new intelligent logic processor. The intelligent logic processor consists of a buffer and a comparator. The buffer is used to store the latest sampling packets. When the data in the buffer is updated, the updated data will be used to generate the control signal immediately to realize the security synchronization control performance of the system, and the sequence of time points when the controller receives the data packet is set as
Figure BDA0003723681520000072
The comparator captures DoS attack information by performing some logical operations. The specific logical operations are shown in Figure 5. The initial parameters are set,
Figure BDA0003723681520000073
is the sampling time and
Figure BDA0003723681520000074
N 0 represents the number of occurrences of DoS attacks, D 0 represents the total residence time of the attack after detection, and h M represents the maximum residence time. σ 1 , σ 2 are the key parameters of the controller to adjust the control input adaptively. and assign initial value
Figure BDA0003723681520000075
N 0 =0, D 0 =0, h M =T, σ 1 =1, σ 2 =0.

令η(t)=[η1 T(t),η2 T(t),…,η5 T(t)]T。对于给定的初值和

Figure BDA0003723681520000076
比较器首先会判断数据包
Figure BDA0003723681520000077
是否到达缓存器。如果到达,则把
Figure BDA0003723681520000078
赋值给tl,发送信号(σ12)=(1,0)和数据包(tl,η(tl))到控制器,并将tl的值赋值给
Figure BDA0003723681520000079
如果未到达,警报器被触发,说明数据包
Figure BDA00037236815200000710
遭受了DoS攻击,此时
Figure BDA00037236815200000711
为攻击发起时刻。这时,更新DoS攻击发生次数N0=N0+1,发送信号(σ12)=(0,1)到控制器,并等待采样数据包(tl,η(tl))到达缓存器。如果数据包(tl,η(tl))到达缓存器,则这次攻击结束,更新
Figure BDA0003723681520000081
其中
Figure BDA0003723681520000082
表示该次攻击在被检测后的持续时间,
Figure BDA0003723681520000083
为被检测时间点。然后比较器将进一步判断最大驻留时间hM
Figure BDA0003723681520000084
的大小,如果hM小于
Figure BDA0003723681520000085
则更新
Figure BDA0003723681520000086
发送信号(σ12)=(1,0)和数据包(tl,η(tl))到控制器,并将tl赋值给
Figure BDA0003723681520000087
通过比较器,DoS攻击关键信息包括攻击发起时刻、攻击总次数、攻击驻留总时长、被攻击的采样数和最大驻留时间可被获得。Let η(t) = [η 1 T (t), η 2 T (t), . . . , η 5 T (t)] T . for a given initial value and
Figure BDA0003723681520000076
The comparator first judges the packet
Figure BDA0003723681520000077
whether to reach the buffer. If it arrives, put
Figure BDA0003723681520000078
assign to t l , send the signal (σ 12 )=(1,0) and the data packet (t l ,η(t l )) to the controller, and assign the value of t l to
Figure BDA0003723681520000079
If it doesn't arrive, the alarm is triggered, indicating that the packet
Figure BDA00037236815200000710
suffered a DoS attack,
Figure BDA00037236815200000711
Time for the attack. At this time, update the number of DoS attacks N 0 =N 0 +1, send the signal (σ 12 )=(0,1) to the controller, and wait for the sampling data packet (t l ,η(t l )) reach the buffer. If the data packet (t l , η(t l )) reaches the buffer, the attack ends, and the update
Figure BDA0003723681520000081
in
Figure BDA0003723681520000082
Indicates the duration of the attack after it was detected,
Figure BDA0003723681520000083
is the detected time point. Then the comparator will further judge the maximum dwell time h M and
Figure BDA0003723681520000084
size, if h M is less than
Figure BDA0003723681520000085
then update
Figure BDA0003723681520000086
Send the signal (σ 12 )=(1,0) and the data packet (t l ,η(t l )) to the controller and assign t l to
Figure BDA0003723681520000087
Through the comparator, the key information of the DoS attack, including the attack initiation time, the total number of attacks, the total duration of the attack residence, the number of attacked samples, and the maximum residence time can be obtained.

由于攻击者的能量通常是有限的,在这种情况下,DoS攻击频率和DoS攻击驻域会满足一定的限制条件。为更好的理解DoS攻击,揭露DoS攻击关键信息内部之间的联系,对于给定时间区间[t0,t),定义D(t)为被检测后的所有DoS攻击驻留总时长,N(t)为发生的攻击总次数,根据智能逻辑处理器的操作原理,可建立如下关于DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系:Since the attacker's energy is usually limited, in this case, the DoS attack frequency and DoS attack domain will meet certain constraints. In order to better understand the DoS attack and expose the internal connection between the key information of the DoS attack, for a given time interval [t 0 , t), define D(t) as the total duration of all detected DoS attacks, N (t) is the total number of attacks that have occurred. According to the operating principle of the intelligent logic processor, the relationship between the frequency of DoS attacks, the DoS attack domain, the sampling period and the maximum dwell time can be established as follows:

Figure BDA0003723681520000088
Figure BDA0003723681520000088

Figure BDA0003723681520000089
Figure BDA0003723681520000089

其中:t∈[tl,tl+1),

Figure BDA00037236815200000810
Figure BDA00037236815200000811
where: t∈[t l ,t l+1 ),
Figure BDA00037236815200000810
Figure BDA00037236815200000811

Figure BDA00037236815200000812
为被攻击的采样点总数,
Figure BDA00037236815200000813
表示向下取整,
Figure BDA00037236815200000814
表示tj的左极限,hl=tl+1-tl∈(T,hM]。but
Figure BDA00037236815200000812
is the total number of sampling points attacked,
Figure BDA00037236815200000813
means round down,
Figure BDA00037236815200000814
represents the left limit of t j , h l =t l+1 -t l ∈(T,h M ].

证明:对t∈[tl,tl+1),l=0,1,2...有Prove: For t∈[t l ,t l+1 ), l=0,1,2...have

Figure BDA0003723681520000091
Figure BDA0003723681520000091

Figure BDA0003723681520000092
Figure BDA0003723681520000092

注意到,如果

Figure BDA0003723681520000093
Figure BDA0003723681520000094
根据该结论则有Note that if
Figure BDA0003723681520000093
but
Figure BDA0003723681520000094
According to this conclusion, there are

Figure BDA0003723681520000095
Figure BDA0003723681520000095

由(4)式,可得From (4), we can get

Figure BDA0003723681520000096
Figure BDA0003723681520000096

由(4)、(5)式可得(2)、(3)成立。From equations (4) and (5), (2) and (3) can be obtained.

图6为现有技术中比较器流程图,其中,dk、hm、hM、n0、Tm、Δ和

Figure BDA0003723681520000097
分别表示逻辑处理器成功接收到的数据包时刻、最小攻击驻留时间、最大攻击驻留时间、攻击总次数、攻击驻域(攻击驻留时间总和)、两个相邻成功传输数据包之间的时间间隔和特定时间内逻辑处理器成功接收到的数据包时刻。如果两个相邻成功传输数据包之间的时间间隔Δ不大于采样周期T0,则将dk赋值给
Figure BDA0003723681520000098
如果两个相邻成功传输数据包之间的时间间隔Δ大于采样周期T0,则将Tm+Δ-T0赋值给Tm,更新n0=n0+1;并进一步判断当前两个相邻成功传输数据包之间的时间间隔Δ是否大于hM。如果是,则将Δ赋值给hM,如果否,进一步Δ是否小于等于hm,如果是,将Δ-T0赋值给hm,如果否将dk赋值给
Figure BDA0003723681520000099
与现有技术中比较器相比,本发明所设计的比较器有如下优点:①操作流程中安装了警报器,该警报器可自动检测系统被DoS攻击时刻;②可得到被攻击采样点总数
Figure BDA0003723681520000101
③并可建立DoS攻击频率N(t)、DoS攻击驻域D(t)、采样周期T和最大驻留时间hM之间的关系
Figure BDA0003723681520000102
④可根据不同的攻击情形,反馈不同的控制参数。FIG. 6 is a flow chart of a comparator in the prior art, wherein d k , h m , h M , n 0 , T m , Δ and
Figure BDA0003723681520000097
Respectively represent the time of the packet successfully received by the logical processor, the minimum attack dwell time, the maximum attack dwell time, the total number of attacks, the attack dwell domain (the sum of the attack dwell time), and the interval between two adjacent successfully transmitted packets. The time interval and the moment when the logical processor successfully received the packet within the specified time. If the time interval Δ between two adjacent successfully transmitted data packets is not greater than the sampling period T 0 , then assign d k to
Figure BDA0003723681520000098
If the time interval Δ between two adjacent successfully transmitted data packets is greater than the sampling period T 0 , assign T m +Δ-T 0 to T m , update n 0 =n 0 +1; and further judge the current two Whether the time interval Δ between adjacent successfully transmitted data packets is greater than h M . If yes, assign Δ to h M , if no, whether further Δ is less than or equal to h m , if yes, assign Δ-T 0 to h m , if no, assign d k to
Figure BDA0003723681520000099
Compared with the comparator in the prior art, the comparator designed by the present invention has the following advantages: 1. an alarm device is installed in the operation process, and the alarm device can automatically detect the moment when the system is attacked by DoS; 2. the total number of sampling points to be attacked can be obtained
Figure BDA0003723681520000101
③ The relationship between DoS attack frequency N(t), DoS attack resident area D(t), sampling period T and maximum residence time h M can be established
Figure BDA0003723681520000102
④ Different control parameters can be fed back according to different attack situations.

5.自适应采样切换控制器的设计。控制器与智能逻辑处理器紧密合作,当智能逻辑处理器接收到采样数据包时,控制器则立即使用该采样包来生成控制信号,再利用零阶保持器,离散采样控制信号被转化为连续信号,经执行器再反馈给系统,从而驱动复杂电路网络系统。控制器中自适应采样切换控制协议设计如下:5. Design of adaptive sampling switching controller. The controller cooperates closely with the intelligent logic processor. When the intelligent logic processor receives the sampling data packet, the controller immediately uses the sampling packet to generate the control signal, and then uses the zero-order hold, and the discrete sampling control signal is converted into continuous sampling. The signal is fed back to the system through the actuator to drive the complex circuit network system. The adaptive sampling switching control protocol in the controller is designed as follows:

情形i:如果区间[tl,tl+1),l=1,2,...未遭受DoS攻击,则有tl+1=tl+T;Case i: If the interval [t l , t l+1 ), l=1, 2, ... is not subject to DoS attack, then there is t l+1 =t l +T;

情形ii:如果区间[tl,tl+1),l=1,2,...遭受DoS攻击,则有tl+T<tl+1≤tl+hMCase ii: If the interval [t l , t l+1 ), l=1, 2, . . . suffers from a DoS attack, then t l +T<t l+1 ≤t l +h M .

针对情形i,设计如下采样控制器For case i, design the following sampling controller

ui(t)=-k1iηi(tl),t∈[tl,tl+T),i=1,2,…5 (6)u i (t)=-k 1i η i (t l ),t∈[t l ,t l +T),i=1,2,…5 (6)

其中ui(t)是第i个电路系统的控制输入,k1i是控制器ui(t)的控制增益。where u i (t) is the control input of the ith circuit system and k 1i is the control gain of the controller u i (t).

针对情形ii,设计如下采样控制器For case ii, design the following sampling controller

ui(t)=-σ1(t)k1iηi(tl)-σ2(t)k2iηi(tl),i=1,2,…5 (7)u i (t)=-σ 1 (t)k 1i η i (t l )-σ 2 (t)k 2i η i (t l ),i=1,2,...5 (7)

其中

Figure BDA0003723681520000103
σ1(t)、σ2(t)的取值分别是由逻辑处理器输出的σ1、σ2的值确定的,k1i、k2i(i=1,2,…,5)是控制增益。in
Figure BDA0003723681520000103
The values of σ 1 (t) and σ 2 (t) are determined by the values of σ 1 and σ 2 output by the logic processor, respectively, and k 1i and k 2i (i=1,2,...,5) are control gain.

不管DoS攻击是否发生,现有技术中的控制器都具有固定不变的控制增益。而本发明根据不同的攻击情形设计了自适应采样切换控制协议——公式(6)和(7)。在该协议中,对任意区间[tl,tl+1),根据不同攻击情形,在确保复杂电路网络系统安全同步性能前提下,不同控制增益k1i、k2i(i=1,2,…,5)将会被选取。如果在区间[tl,tl+1)上未发生DoS攻击,则采用控制增益k1i。如果在区间[tl,tl+1)上发生DoS攻击,则数据包(tl+T,ηi(tl+T))将无法到达缓存器,逻辑处理器会立即发出警报。这种情况下,在t∈[tl,tl+T)时,采用控制增益k1i;在t∈[tl+T,tl+1)时,采用控制增益k2i。k1i和k2i的自适应切换选取是由逻辑处理器输出σ1和σ2的值确定的。与现有技术中的控制方法相比较,本发明提出的自适应采样切换控制方法更灵活,且能有效增强系统对抗DoS攻击的鲁棒性。Regardless of whether a DoS attack occurs, the controller in the prior art has a constant control gain. The present invention designs an adaptive sampling switching control protocol—formulas (6) and (7) according to different attack situations. In this protocol, for any interval [t l , t l+1 ), according to different attack situations, under the premise of ensuring the safety and synchronization performance of complex circuit network systems, different control gains k 1i and k 2i (i=1, 2, ...,5) will be selected. If no DoS attack occurs in the interval [t l , t l+1 ), the control gain k 1i is adopted. If a DoS attack occurs on the interval [t l , t l+1 ), the data packet (t l +T, η i (t l +T)) will not reach the buffer, and the logical processor will issue an alarm immediately. In this case, when t∈[t l , t l +T), the control gain k 1i is used; when t∈[t l +T, t l+1 ), the control gain k 2i is used. The adaptive switching selection of k 1i and k 2i is determined by the values of the logic processor outputs σ 1 and σ 2 . Compared with the control methods in the prior art, the adaptive sampling switching control method proposed by the present invention is more flexible, and can effectively enhance the robustness of the system against DoS attacks.

为验证本发明的有效性和方法的优势,进行了如下仿真实验。考虑上述复杂电路网络系统的传感器到控制器信道遭受DoS攻击,其攻击序列如图7所示。根据图论知识,当牵制节点1,3,5,则图3有一棵生成树。在如图7所示的DoS攻击下,取控制增益In order to verify the effectiveness of the present invention and the advantages of the method, the following simulation experiments are carried out. Considering that the sensor-to-controller channel of the above complex circuit network system suffers from DoS attacks, the attack sequence is shown in Figure 7. According to the knowledge of graph theory, when nodes 1, 3, and 5 are pinned down, then Figure 3 has a spanning tree. Under the DoS attack shown in Figure 7, take the control gain

k11=10.1742,k12=0,k13=7.9494,k14=0,k15=12.9165,k 11 =10.1742, k 12 =0, k 13 =7.9494, k 14 =0, k 15 =12.9165,

k21=4.9895,k22=0,k23=4.4786,k24=0,k25=5.0785。k 21 =4.9895, k 22 =0, k 23 =4.4786, k 24 =0, k 25 =5.0785.

在自适应采样切换控制协议——公式(6)和(7)的控制下,复杂电路网络系统的节点轨迹图、同步误差轨迹图和自适应采样切换控制器图分别如图8、图9和图10所示。从如图8可以发现所有节点的状态轨迹达到同步,且从图9可以发现同步误差是趋于0的,从而验证了本发明所设计的自适应采样切换控制方法能有效对抗DoS攻击影响,确保复杂电路网络系统的安全同步性能。Under the control of the adaptive sampling switching control protocol - formulas (6) and (7), the node trajectory diagram, synchronization error trajectory diagram and adaptive sampling switching controller diagram of the complex circuit network system are shown in Figure 8, Figure 9 and Figure 9, respectively. shown in Figure 10. From Figure 8, it can be found that the state trajectories of all nodes are synchronized, and from Figure 9, it can be found that the synchronization error tends to 0, thereby verifying that the adaptive sampling switching control method designed in the present invention can effectively resist the impact of DoS attacks and ensure that Safe synchronization performance of complex circuit network systems.

在上述相同系统参数下,由现有技术中的固定控制增益方法可得最大攻击驻留时间hM=0.18,而由本发明所设计的自适应采样切换控制方法可得最大攻击驻留时间hM=0.24。攻击驻留时间上界越大,说明所设计的控制方法鲁棒性越强。因此,本发明控制方法对抗DoS攻击能力越强,从而增强了复杂电路网络系统对抗DoS攻击的鲁棒性。Under the same system parameters above, the maximum attack dwell time h M = 0.18 can be obtained by the fixed control gain method in the prior art, and the maximum attack dwell time h M can be obtained by the adaptive sampling switching control method designed in the present invention = 0.24. The larger the upper bound of the attack residence time, the stronger the robustness of the designed control method. Therefore, the control method of the present invention has a stronger anti-DoS attack capability, thereby enhancing the robustness of the complex circuit network system against DoS attacks.

尽管这里参照本发明的解释性实施例对本发明进行了描述,上述实施例仅为本发明较佳的实施方式,本发明的实施方式并不受上述实施例的限制,应该理解,本领域技术人员可以设计出很多其他的修改和实施方式,这些修改和实施方式将落在本申请公开的原则范围和精神之内。Although the present invention is described herein with reference to the illustrative embodiments of the present invention, the above-mentioned embodiments are only preferred embodiments of the present invention, and the embodiments of the present invention are not limited by the above-mentioned embodiments, and it should be understood that those skilled in the art Numerous other modifications and embodiments can be devised that will fall within the scope and spirit of the principles disclosed herein.

Claims (3)

1.一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法,其特征在于,包括:1. the adaptive sampling switching control method of complex circuit network system under a DoS attack, is characterized in that, comprises: 步骤S100、传感器对复杂电路网络系统以周期T进行采样,得到电路系统的误差采样状态和采样点序列;Step S100, the sensor samples the complex circuit network system with a period T to obtain the error sampling state and sampling point sequence of the circuit system; 步骤S200、由发送器将误差采样状态和采样点序列构成的数据包发送至通信网络;Step S200, the transmitter sends the data packet composed of the error sampling state and the sampling point sequence to the communication network; 步骤S300、当数据包到达智能逻辑处理器的缓存器,缓存器的数据被更新时立即生成第一控制信号,第一控制信号用于实现系统安全同步控制;智能逻辑处理器向控制器发送数据包的时间点序列,时间点序列
Figure FDA0003723681510000011
采样点序列;智能逻辑处理器的比较器根据数据包和时间点序列捕获DoS攻击关键信息,智能逻辑处理器根据DoS攻击关键信息发送不同的信号给控制器;
Step S300, when the data packet reaches the buffer of the intelligent logic processor, and the data in the buffer is updated, the first control signal is immediately generated, and the first control signal is used to realize the system safety synchronization control; the intelligent logic processor sends the data to the controller time point sequence of packets, time point sequence
Figure FDA0003723681510000011
Sampling point sequence; the comparator of the intelligent logic processor captures the key information of the DoS attack according to the data packet and time point sequence, and the intelligent logic processor sends different signals to the controller according to the key information of the DoS attack;
步骤S400、控制器根据智能逻辑处理器发送的信号确定切换控制增益关键参数,并根据智能逻辑处理器发送的信号和控制增益生成第二控制信号,再利用零阶保持器将离散采样第二控制信号被转化为连续信号,经执行器再反馈给复杂电路网络系统,从而驱动复杂电路网络系统。Step S400, the controller determines the key parameters of the switching control gain according to the signal sent by the intelligent logic processor, and generates a second control signal according to the signal sent by the intelligent logic processor and the control gain, and then uses the zero-order holder to discretely sample the second control signal. The signal is converted into a continuous signal, and then fed back to the complex circuit network system through the actuator, thereby driving the complex circuit network system.
2.根据权利要求1所述的DoS攻击下复杂电路网络系统的自适应采样切换控制方法,其特征在于,捕获DoS攻击关键信息具体包括:2. the adaptive sampling switching control method of complex circuit network system under the DoS attack according to claim 1, is characterized in that, capturing the DoS attack key information specifically comprises: 初始化采样时刻
Figure FDA0003723681510000012
DoS攻击的发生次数N0=0、被检测后的攻击驻留总时长D0=0、最大驻留时间hM=T、第一关键参数σ1=1和第二关键参数σ2=0,其中,
Figure FDA0003723681510000013
第一关键参数σ1和第二关键参数σ2用于控制器自适应调节控制输入;
Initial sampling time
Figure FDA0003723681510000012
The number of occurrences of DoS attacks N 0 =0, the total attack residence time after detection D 0 =0, the maximum residence time h M =T, the first key parameter σ 1 =1 and the second key parameter σ 2 =0 ,in,
Figure FDA0003723681510000013
The first key parameter σ 1 and the second key parameter σ 2 are used for the controller to adaptively adjust the control input;
令系统误差状态η(t)=[η1 T(t),η2 T(t),…,ηi T(t),…]T,其中,ηi T(t)为第i个电路系统的误差状态;Let the systematic error state η(t)=[η 1 T (t),η 2 T (t),...,η i T (t),...] T , where η i T (t) is the ith circuit the error state of the system; 对于给定的初值和
Figure FDA0003723681510000021
比较器首先判断数据包
Figure FDA0003723681510000022
是否到达缓存器,如果到达,则把
Figure FDA0003723681510000023
赋值给时间点序列的当前时间点tl,发送信号(σ12)=(1,0)和数据包(tl,η(tl))到控制器,并将tl的值赋值给
Figure FDA0003723681510000024
如果未到达,警报器被触发,即数据包
Figure FDA0003723681510000025
遭受了DoS攻击,此时
Figure FDA0003723681510000026
为攻击发起时刻;更新DoS攻击发生次数N0=N0+1,发送信号(σ12)=(0,1)到控制器,并等待采样数据包(tl,η(tl))到达缓存器,如果数据包(tl,η(tl))到达缓存器,则这次攻击结束,更新
Figure FDA0003723681510000027
其中
Figure FDA0003723681510000028
表示该次攻击在被检测后的持续时间,
Figure FDA0003723681510000029
为被检测时间点;
for a given initial value and
Figure FDA0003723681510000021
The comparator first judges the packet
Figure FDA0003723681510000022
Whether to reach the buffer, if so, put
Figure FDA0003723681510000023
Assign the current time point t l of the time point sequence, send the signal (σ 12 )=(1,0) and the data packet (t l ,η(t l )) to the controller, and use the value of t l assign to
Figure FDA0003723681510000024
If it doesn't arrive, the siren is triggered, i.e. the packet
Figure FDA0003723681510000025
suffered a DoS attack,
Figure FDA0003723681510000026
is the attack initiation time; update the number of DoS attacks N 0 =N 0 +1, send signals (σ 12 )=(0,1) to the controller, and wait for the sampling data packets (t l ,η(t l ) )) reach the buffer, if the data packet (t l , η(t l )) reaches the buffer, the attack ends, and the update
Figure FDA0003723681510000027
in
Figure FDA0003723681510000028
Indicates the duration of the attack after it was detected,
Figure FDA0003723681510000029
is the detected time point;
比较器判断最大驻留时间hM
Figure FDA00037236815100000210
的大小,如果hM小于
Figure FDA00037236815100000211
则更新
Figure FDA00037236815100000212
发送信号(σ12)=(1,0)和数据包(tl,η(tl))到控制器,并将tl赋值给
Figure FDA00037236815100000213
即获取DoS攻击关键信息:攻击发起时刻
Figure FDA00037236815100000214
攻击总次数N0、攻击驻留总时长D0、被攻击的采样数和最大驻留时间hM
The comparator judges the maximum dwell time h M and
Figure FDA00037236815100000210
size, if h M is less than
Figure FDA00037236815100000211
then update
Figure FDA00037236815100000212
Send the signal (σ 12 )=(1,0) and the data packet (t l ,η(t l )) to the controller and assign t l to
Figure FDA00037236815100000213
That is, to obtain the key information of the DoS attack: the moment when the attack was launched
Figure FDA00037236815100000214
The total number of attacks N 0 , the total attack dwell time D 0 , the number of attacked samples and the maximum dwell time h M .
3.根据权利要求2所述的DoS攻击下复杂电路网络系统的自适应采样切换控制方法,其特征在于,控制器根据智能逻辑处理器发送的信号控制切换控制增益参数,并根据智能逻辑处理器发送的信号和控制增益生成第二控制信号具体为:3. the adaptive sampling switching control method of the complex circuit network system under the DoS attack according to claim 2, is characterized in that, the controller switches the control gain parameter according to the signal sent by the intelligent logic processor, and according to the intelligent logic processor The transmitted signal and the control gain to generate the second control signal are specifically: 如果区间[tl,tl+1),l=1,2,...未遭受DoS攻击,则有tl+1=tl+T;则控制器为:If the interval [t l , t l+1 ), l=1, 2, ... is not subject to DoS attack, then there is t l+1 =t l +T; then the controller is: ui(t)=-k1iηi(tl),t∈[tl,tl+T),i=1,2,…mu i (t)=-k 1i η i (t l ),t∈[t l ,t l +T),i=1,2,…m 其中,m为电路系统个数;ui(t)是第i个电路系统的控制输入,k1i是控制器ui(t)的控制增益;ηi(tl)为第i个电路系统在时间tl的误差状态;Among them, m is the number of circuit systems; u i (t) is the control input of the ith circuit system, k 1i is the control gain of the controller u i (t); η i (t l ) is the ith circuit system Error state at time t l ; 如果区间[tl,tl+1),l=1,2,...遭受DoS攻击,则有tl+T<tl+1≤tl+hM;则控制器为:If the interval [t l ,t l+1 ),l=1,2,... suffers from DoS attacks, then t l +T<t l+1 ≤t l +h M ; then the controller is: ui(t)=-σ1(t)k1iηi(tl)-σ2(t)k2iηi(tl),i=1,2,…mu i (t)=-σ 1 (t)k 1i η i (t l )-σ 2 (t)k 2i η i (t l ),i=1,2,...m 其中
Figure FDA0003723681510000031
σ1(t)、σ2(t)的取值分别是由智能逻辑处理器输出的第一关键参数σ1、第二关键参数σ2的值确定的,k1i、k2i是控制增益。
in
Figure FDA0003723681510000031
The values of σ 1 (t) and σ 2 (t) are respectively determined by the values of the first key parameter σ 1 and the second key parameter σ 2 output by the intelligent logic processor, and k 1i and k 2i are control gains.
CN202210759316.3A 2022-06-30 2022-06-30 Self-adaptive sampling switching control method of complex circuit network system under DoS attack Active CN114995158B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210759316.3A CN114995158B (en) 2022-06-30 2022-06-30 Self-adaptive sampling switching control method of complex circuit network system under DoS attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210759316.3A CN114995158B (en) 2022-06-30 2022-06-30 Self-adaptive sampling switching control method of complex circuit network system under DoS attack

Publications (2)

Publication Number Publication Date
CN114995158A true CN114995158A (en) 2022-09-02
CN114995158B CN114995158B (en) 2023-01-24

Family

ID=83020019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210759316.3A Active CN114995158B (en) 2022-06-30 2022-06-30 Self-adaptive sampling switching control method of complex circuit network system under DoS attack

Country Status (1)

Country Link
CN (1) CN114995158B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116073982A (en) * 2023-02-07 2023-05-05 中国人民解放军陆军工程大学 A secure communication method and system against DoS attack for a limited time

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108258681A (en) * 2018-01-11 2018-07-06 南京邮电大学 The security incident trigger control method of LOAD FREQUENCY control system under a kind of DoS attack
CN109672177A (en) * 2019-01-18 2019-04-23 南京邮电大学 LOAD FREQUENCY quantization control method based on event trigger mechanism under a kind of DoS attack
CN110213115A (en) * 2019-06-25 2019-09-06 南京财经大学 A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system
CN112068441A (en) * 2020-09-18 2020-12-11 河南农业大学 Collaborative design method for security event driver and SDOFR controller
CN112099356A (en) * 2020-09-18 2020-12-18 河南农业大学 Design method of event-driven SDOFQH controller under DoS attack
CN112859607A (en) * 2021-01-13 2021-05-28 河南农业大学 Collaborative design method for distributed security event driver and SDOFD controller
US20210243224A1 (en) * 2020-02-05 2021-08-05 King Fahd University Of Petroleum And Minerals Control of cyber physical systems subject to cyber and physical attacks
CN113467332A (en) * 2021-07-28 2021-10-01 南京市初仁智能科技有限公司 Design method of event trigger controller of information physical system under denial of service attack
CN113625684A (en) * 2021-07-26 2021-11-09 云境商务智能研究院南京有限公司 Tracking controller and method based on event trigger mechanism under hybrid network attack
CN114326398A (en) * 2021-12-27 2022-04-12 华中科技大学 Control method and control system of linear switching system with unstable mode
CN114489025A (en) * 2022-02-14 2022-05-13 上海交通大学宁波人工智能研究院 Model-driven industrial control system safety protection method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108258681A (en) * 2018-01-11 2018-07-06 南京邮电大学 The security incident trigger control method of LOAD FREQUENCY control system under a kind of DoS attack
CN109672177A (en) * 2019-01-18 2019-04-23 南京邮电大学 LOAD FREQUENCY quantization control method based on event trigger mechanism under a kind of DoS attack
CN110213115A (en) * 2019-06-25 2019-09-06 南京财经大学 A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system
US20210243224A1 (en) * 2020-02-05 2021-08-05 King Fahd University Of Petroleum And Minerals Control of cyber physical systems subject to cyber and physical attacks
CN112068441A (en) * 2020-09-18 2020-12-11 河南农业大学 Collaborative design method for security event driver and SDOFR controller
CN112099356A (en) * 2020-09-18 2020-12-18 河南农业大学 Design method of event-driven SDOFQH controller under DoS attack
CN112859607A (en) * 2021-01-13 2021-05-28 河南农业大学 Collaborative design method for distributed security event driver and SDOFD controller
CN113625684A (en) * 2021-07-26 2021-11-09 云境商务智能研究院南京有限公司 Tracking controller and method based on event trigger mechanism under hybrid network attack
CN113467332A (en) * 2021-07-28 2021-10-01 南京市初仁智能科技有限公司 Design method of event trigger controller of information physical system under denial of service attack
CN114326398A (en) * 2021-12-27 2022-04-12 华中科技大学 Control method and control system of linear switching system with unstable mode
CN114489025A (en) * 2022-02-14 2022-05-13 上海交通大学宁波人工智能研究院 Model-driven industrial control system safety protection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHANG RUIMEI,ET AL.: "Fuzzy Secure Control for Nonlinear N-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks", 《IEEE》 *
ZHANG XIANMING,ET AL.: "Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks", 《IEEE TRANSACTIONS ON CYBERNETICS》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116073982A (en) * 2023-02-07 2023-05-05 中国人民解放军陆军工程大学 A secure communication method and system against DoS attack for a limited time
CN116073982B (en) * 2023-02-07 2024-01-19 中国人民解放军陆军工程大学 Secret communication method and system for resisting DoS attack in limited time

Also Published As

Publication number Publication date
CN114995158B (en) 2023-01-24

Similar Documents

Publication Publication Date Title
Li et al. Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN
Liu et al. Software-defined DDoS detection with information entropy analysis and optimized deep learning
Tang et al. Performance and features: Mitigating the low-rate TCP-targeted DoS attack via SDN
TWI729320B (en) Suspicious packet detection device and suspicious packet detection method thereof
CN108429753A (en) A Fast Feature Matching Method for DDoS Intrusion Detection in Industrial Networks
CN107370732A (en) System is found based on neutral net and the industrial control system abnormal behaviour of optimal recommendation
CN108683686B (en) A DDoS attack detection method for random subdomains
CN108259498B (en) An Intrusion Detection Method and System Based on BP Algorithm Based on Artificial Bee Colony Optimization
CN109768981B (en) A network attack defense method and system based on machine learning under SDN architecture
CN108696453B (en) Lightweight power communication network SDN service flow perception method and system
CN112698573A (en) Networked system non-fragile event trigger control method based on positive switching system modeling
CN108880909B (en) Network energy saving method and device based on reinforcement learning
CN110011983B (en) A Denial of Service Attack Detection Method Based on Flow Table Features
CN111131199B (en) Business attack traffic cleaning control method, device, server and storage medium
Li et al. DDoS detection in SDN switches using support vector machine classifier
CN114531273A (en) Method for defending distributed denial of service attack of industrial network system
CN114995158B (en) Self-adaptive sampling switching control method of complex circuit network system under DoS attack
Zhao et al. Resilient adaptive event‐triggered synchronization control of piecewise‐homogeneous Markov jump delayed neural networks under aperiodic DoS attacks
Wang et al. Secure consensus for switched multiagent systems under DoS attacks: Hybrid event-triggered and impulsive control approach
Wang et al. USAGE: Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method
CN117040828A (en) Observer-based periodic event triggering synchronous control method for complex network with attack
Zhang et al. Event-triggered random delayed impulsive consensus of multi-agent systems with time-varying delay
CN115119209A (en) A real-time intelligent attack method based on integrated strategy for RPL network
CN115766081A (en) A method and device for detecting abnormal traffic on an electric power industrial control cloud platform
Guo et al. Observer‐based event‐triggered consensus control of nonlinear cyber‐physical systems under backlash‐like hysteresis and denial‐of‐service attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant