CN114995158A - Adaptive sampling switching control method for complex circuit network system under DoS attack - Google Patents
Adaptive sampling switching control method for complex circuit network system under DoS attack Download PDFInfo
- Publication number
- CN114995158A CN114995158A CN202210759316.3A CN202210759316A CN114995158A CN 114995158 A CN114995158 A CN 114995158A CN 202210759316 A CN202210759316 A CN 202210759316A CN 114995158 A CN114995158 A CN 114995158A
- Authority
- CN
- China
- Prior art keywords
- attack
- controller
- sampling
- dos attack
- dos
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000005070 sampling Methods 0.000 title claims abstract description 73
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000003044 adaptive effect Effects 0.000 title claims abstract description 21
- 238000004891 communication Methods 0.000 claims abstract description 10
- 238000001514 detection method Methods 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 230000001960 triggered effect Effects 0.000 claims description 3
- 230000009897 systematic effect Effects 0.000 claims description 2
- 230000007246 mechanism Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 12
- 238000013461 design Methods 0.000 description 8
- 239000011159 matrix material Substances 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 239000003990 capacitor Substances 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B13/00—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
- G05B13/02—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
- G05B13/04—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
- G05B13/042—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators in which a parameter or coefficient is automatically adjusted to optimise the performance
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明公开了DoS攻击下复杂电路网络系统的自适应采样切换控制方法,传感器对复杂电路网络系统以周期T进行采样,由发送器将误差采样状态和采样点序列构成的数据包发送至通信网络;当数据包到达缓存器,缓存器立即生成第一控制信号,比较器根据数据包和时间点序列捕获DoS攻击关键信息,智能逻辑处理器根据DoS攻击关键信息发送不同的信号给控制器;控制器根据智能逻辑处理器发送的信号控制切换控制增益参数,经零阶保持器、执行器反馈给复杂电路网络系统,从而驱动复杂电路网络系统。本发明结合智能逻辑处理器和自适应采样切换控制机制,针对不同的DoS攻击情形采用不同的控制器,有效增强系统对抗DoS攻击的鲁棒性。
The invention discloses an adaptive sampling switching control method for a complex circuit network system under DoS attack. A sensor samples the complex circuit network system with a period T, and a transmitter sends a data packet composed of an error sampling state and a sampling point sequence to a communication network. ; When the data packet arrives in the buffer, the buffer immediately generates the first control signal, the comparator captures the key information of the DoS attack according to the data packet and the time point sequence, and the intelligent logic processor sends different signals to the controller according to the key information of the DoS attack; control The controller switches the control gain parameters according to the signal sent by the intelligent logic processor, and feeds it back to the complex circuit network system through the zero-order holder and the actuator, thereby driving the complex circuit network system. The invention combines an intelligent logic processor and an adaptive sampling switching control mechanism, adopts different controllers for different DoS attack situations, and effectively enhances the robustness of the system against DoS attacks.
Description
技术领域technical field
本发明涉及电路系统安全控制技术领域,具体的说,是一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法。The invention relates to the technical field of circuit system security control, in particular to an adaptive sampling switching control method of a complex circuit network system under DoS attack.
背景技术Background technique
随着网络化和信息化的迅猛发展,复杂电路网络系统在带给人们财富和便利的同时也日益凸显了其安全问题。由于复杂电路网络系统是由多个电路系统通过网络连接构成的复杂系统。每个电路系统内部是由传感器、控制器、执行器和网络等构成的一个有机整体,电路系统之间是通过网络来进行信息交互的。由于网络的高度开放性和共享性,使得很容易受到网络攻击。近年来,全球网络攻击事件的频发,使得人们越来越认识到网络安全的重要性。由于网络安全控制能有效对抗多种网络攻击,因此复杂电路网络系统的安全控制成为研究重点。针对复杂电路网络系统,目前大多数控制方法主要是基于连续反馈信息设计的。在连续反馈控制中,状态变量的信息需要连续不断的传输到控制器并反馈给系统。这种连续反馈控制模式在一定程度上造成计算和网络通信资源的浪费。对比连续反馈控制方法,采样控制仅需将采样点处的信号传输给控制器,从而能够极大的减少信息传输量,有效的节约网络通信资源。目前,复杂电路网络系统的采样控制成为研究焦点。DoS攻击作为一类常见的网络攻击会严重影响复杂电路网络系统的同步性能与安全。因此,在DoS攻击下探究复杂电路网络系统的安全采样控制是意义深远的,但目前尚缺乏相关研究。此外,为有效对抗DoS攻击对网络系统性能的影响,文献“《在DoS攻击下基于采样模型的一类网络化控制系统的弹性控制设计》,IEEE控制论汇刊,2020年8月”在采样模式下提出了弹性安全采样控制方法。在该方法中,为捕获DoS攻击信息,作者在采样控制器设计中嵌入了逻辑处理器,并且该方法已成功应用于解决DoS攻击下多智能体系统的一致性问题,其逻辑处理器能有效捕获DoS攻击信息且所提出的弹性安全采样控制方法能有效对抗DoS攻击对网络系统性能的影响。但该方法存在三点不足之处:(1)设计的逻辑处理器不能充分捕获DoS攻击关键信息,比如被攻击的采样点总数和攻击发起时刻;(2)忽视了DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系;(3)不管DoS攻击是否发生,所有时刻都采用相同的控制增益,这会在一定程度上造成控制鲁棒性较差。With the rapid development of networking and informatization, the complex circuit network system brings people wealth and convenience, but also increasingly highlights its security issues. Because a complex circuit network system is a complex system composed of multiple circuit systems connected through a network. The interior of each circuit system is an organic whole composed of sensors, controllers, actuators and networks, and the information exchange between circuit systems is carried out through the network. Due to the high degree of openness and sharing of the network, it is very vulnerable to network attacks. In recent years, the frequent occurrence of global network attacks has made people more and more aware of the importance of network security. Because network security control can effectively resist various network attacks, the security control of complex circuit network systems has become the focus of research. For complex circuit network systems, most of the current control methods are mainly designed based on continuous feedback information. In continuous feedback control, the information of state variables needs to be continuously transmitted to the controller and fed back to the system. This continuous feedback control mode results in a waste of computing and network communication resources to a certain extent. Compared with the continuous feedback control method, the sampling control only needs to transmit the signal at the sampling point to the controller, which can greatly reduce the amount of information transmission and effectively save the network communication resources. At present, the sampling control of complex circuit network systems has become the focus of research. As a kind of common network attack, DoS attack will seriously affect the synchronization performance and security of complex circuit network system. Therefore, it is of far-reaching significance to explore the secure sampling control of complex circuit network systems under DoS attacks, but there is still a lack of relevant research. In addition, in order to effectively combat the impact of DoS attacks on the performance of network systems, the paper "Resilient Control Design of a Class of Networked Control Systems Based on Sampling Models under DoS Attacks", IEEE Transactions on Cybernetics, August 2020" in Sampling In this model, an elastic safety sampling control method is proposed. In this method, in order to capture DoS attack information, the author embeds a logic processor in the design of the sampling controller, and the method has been successfully applied to solve the consistency problem of multi-agent systems under DoS attack, and its logic processor can effectively Capturing DoS attack information and the proposed elastic security sampling control method can effectively combat the impact of DoS attack on network system performance. However, this method has three shortcomings: (1) the designed logical processor cannot fully capture the key information of DoS attacks, such as the total number of attacked sampling points and the attack launch time; (2) the frequency of DoS attacks and the duration of DoS attacks are ignored. The relationship between domain, sampling period and maximum dwell time; (3) Regardless of whether a DoS attack occurs, the same control gain is used at all times, which will result in poor control robustness to a certain extent.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于提供一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法,用于解决现有技术中弹性安全采样控制方法对抗DoS攻击对网络系统性能的影响时存在不能充分捕获DoS攻击关键信息、忽视了DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系以及控制鲁棒性差的问题。The purpose of the present invention is to provide an adaptive sampling switching control method of complex circuit network system under DoS attack, which is used to solve the problem of insufficient capture of DoS when the elastic security sampling control method in the prior art resists the impact of DoS attack on network system performance. Attacking key information, ignoring the DoS attack frequency, DoS attack residence area, the relationship between the sampling period and the maximum residence time, and the problem of poor control robustness.
本发明通过下述技术方案解决上述问题:The present invention solves the above-mentioned problems through the following technical solutions:
一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法,包括:An adaptive sampling switching control method for a complex circuit network system under DoS attack, comprising:
步骤S100、传感器对复杂电路网络系统以周期T进行采样,得到电路系统的误差采样状态和采样点序列;Step S100, the sensor samples the complex circuit network system with a period T to obtain the error sampling state and sampling point sequence of the circuit system;
传感器对复杂电路网络系统以周期T进行采样,得到第i个电路系统在采样点sl的误差采样状态ηi(sl)和采样点序列S={s0,s1,…,sl,…,sL},其中s0=0,sl=lT,sl为采样时刻,L为采样次数,l=0,1,2,……,L;i=1,2,3,……,m;m为电路系统个数;The sensor samples the complex circuit network system with a period T, and obtains the error sampling state η i (s l ) of the ith circuit system at the sampling point s l and the sampling point sequence S={s 0 ,s 1 ,...,s l , . _ _ ..., m; m is the number of circuit systems;
步骤S200、由发送器将误差采样状态和采样点序列构成的数据包发送至通信网络;即数据包(sl,ηi(sl))由误差采样状态ηi(sl)和采样点序列S={s0,s1,…,sl,…,sL};Step S200, the data packet formed by the error sampling state and the sampling point sequence is sent to the communication network by the transmitter; that is, the data packet (s1, η i (s 1 ) ) is composed of the error sampling state η i (s 1 ) and the sampling point. sequence S={s 0 ,s 1 ,…,s l ,…,s L };
步骤S300、当数据包到达智能逻辑处理器的缓存器,缓存器的数据被更新时立即生成第一控制信号,第一控制信号用于实现系统安全同步控制;智能逻辑处理器向控制器发送数据包的时间点序列智能逻辑处理器的比较器根据数据包和时间点序列捕获DoS攻击关键信息,智能逻辑处理器根据DoS攻击关键信息发送不同的信号给控制器;Step S300, when the data packet reaches the buffer of the intelligent logic processor, and the data in the buffer is updated, the first control signal is immediately generated, and the first control signal is used to realize the system safety synchronization control; the intelligent logic processor sends the data to the controller time point series of packets The comparator of the intelligent logic processor captures the key information of the DoS attack according to the data packet and time point sequence, and the intelligent logic processor sends different signals to the controller according to the key information of the DoS attack;
步骤S400、控制器根据智能逻辑处理器发送的信号控制切换控制增益参数,并根据智能逻辑处理器发送的信号和控制增益生成第二控制信号,再利用零阶保持器将离散采样第二控制信号被转化为连续信号,经执行器再反馈给复杂电路网络系统,从而驱动复杂电路网络系统。Step S400, the controller controls the switching control gain parameter according to the signal sent by the intelligent logic processor, and generates a second control signal according to the signal sent by the intelligent logic processor and the control gain, and then uses the zero-order holder to discretely sample the second control signal. It is converted into a continuous signal, and then fed back to the complex circuit network system through the actuator, thereby driving the complex circuit network system.
捕获DoS攻击关键信息具体包括:The key information for capturing DoS attacks includes:
初始化采样时刻DoS攻击的发生次数N0=0、被检测后的攻击驻留总时长D0=0、最大驻留时间hM=T、第一关键参数σ1=1和第二关键参数σ2=0,其中,,第一关键参数σ1和第二关键参数σ2用于控制器自适应调节控制输入;Initial sampling time The number of occurrences of DoS attacks N 0 =0, the total attack residence time after detection D 0 =0, the maximum residence time h M =T, the first key parameter σ 1 =1 and the second key parameter σ 2 =0 ,in, , the first key parameter σ 1 and the second key parameter σ 2 are used for the controller to adaptively adjust the control input;
令系统误差状态η(t)=[η1 T(t),η2 T(t),…,ηi T(t),…]T,其中,ηi T(t)为第i个电路系统的误差状态;Let the systematic error state η(t)=[η 1 T (t),η 2 T (t),...,η i T (t),...] T , where η i T (t) is the ith circuit the error state of the system;
对于给定的初值和比较器首先判断数据包是否到达缓存器,如果到达,则把赋值给时间点序列的当前时间点tl,发送信号(σ1,σ2)=(1,0)和数据包(tl,η(tl))到控制器,并将tl的值赋值给如果未到达,警报器被触发,即数据包遭受了DoS攻击,此时为攻击发起时刻;更新DoS攻击发生次数N0=N0+1,发送信号(σ1,σ2)=(0,1)到控制器,并等待采样数据包(tl,η(tl))到达缓存器,如果数据包(tl,η(tl))到达缓存器,则这次攻击结束,更新其中表示该次攻击在被检测后的持续时间,为被检测时间点;for a given initial value and The comparator first judges the packet Whether to reach the buffer, if so, put Assign the current time point t l of the time point sequence, send the signal (σ 1 ,σ 2 )=(1,0) and the data packet (t l ,η(t l )) to the controller, and use the value of t l assign to If it doesn't arrive, the siren is triggered, i.e. the packet suffered a DoS attack, is the attack initiation time; update the number of DoS attacks N 0 =N 0 +1, send signals (σ 1 ,σ 2 )=(0,1) to the controller, and wait for the sampling data packets (t l ,η(t l ) )) reach the buffer, if the data packet (t l , η(t l )) reaches the buffer, the attack ends, and the update in Indicates the duration of the attack after it was detected, is the detected time point;
比较器判断最大驻留时间hM与的大小,如果hM小于则更新发送信号(σ1,σ2)=(1,0)和数据包(tl,η(tl))到控制器,并将tl赋值给即获取DoS攻击关键信息:攻击发起时刻攻击总次数N0、攻击驻留总时长D0、被攻击的采样数和最大驻留时间hM。The comparator judges the maximum dwell time h M and size, if h M is less than then update Send the signal (σ 1 ,σ 2 )=(1,0) and the data packet (t l ,η(t l )) to the controller and assign t l to That is, to obtain the key information of the DoS attack: the moment when the attack was launched The total number of attacks N 0 , the total attack dwell time D 0 , the number of attacked samples and the maximum dwell time h M .
控制器根据智能逻辑处理器发送的信号控制切换控制增益,并根据智能逻辑处理器发送的信号和控制增益生成第二控制信号具体为:The controller controls the switching control gain according to the signal sent by the intelligent logic processor, and generates the second control signal according to the signal sent by the intelligent logic processor and the control gain. Specifically:
如果区间[tl,tl+1),l=1,2,...未遭受DoS攻击,则有tl+1=tl+T;则控制器为:If the interval [t l , t l+1 ), l=1, 2, ... is not subject to DoS attack, then there is t l+1 =t l +T; then the controller is:
ui(t)=-k1iηi(tl),t∈[tl,tl+T),i=1,2,…mu i (t)=-k 1i η i (t l ),t∈[t l ,t l +T),i=1,2,…m
其中,m为电路系统个数;ui(t)是第i个电路系统的控制输入,k1i是控制器ui(t)的控制增益;ηi(tl)为第i个电路系统在时间tl的误差状态;Among them, m is the number of circuit systems; u i (t) is the control input of the ith circuit system, k 1i is the control gain of the controller u i (t); η i (t l ) is the ith circuit system Error state at time t l ;
如果区间[tl,tl+1),l=1,2,...遭受DoS攻击,则有tl+T<tl+1≤tl+hM;则控制器为:If the interval [t l ,t l+1 ),l=1,2,... suffers from DoS attacks, then t l +T<t l+1 ≤t l +h M ; then the controller is:
ui(t)=-σ1(t)k1iηi(tl)-σ2(t)k2iηi(tl),i=1,2,…mu i (t)=-σ 1 (t)k 1i η i (t l )-σ 2 (t)k 2i η i (t l ),i=1,2,...m
其中σ1(t)、σ2(t)的取值分别是由智能逻辑处理器输出的第一关键参数σ1、第二关键参数σ2的值确定的,k1i、k2i是控制增益。in The values of σ 1 (t) and σ 2 (t) are respectively determined by the values of the first key parameter σ 1 and the second key parameter σ 2 output by the intelligent logic processor, and k 1i and k 2i are control gains.
本发明与现有技术相比,具有以下优点及有益效果:Compared with the prior art, the present invention has the following advantages and beneficial effects:
(1)本发明结合智能逻辑处理器和采样控制机制,采用自适应采样切换控制方法,针对不同的DoS攻击情形采用不同的控制器,在确保复杂电路网络系统安全性能前提下能有效增强系统对抗DoS攻击的鲁棒性。(1) The present invention combines an intelligent logic processor and a sampling control mechanism, adopts an adaptive sampling switching control method, adopts different controllers for different DoS attack situations, and can effectively enhance system resistance under the premise of ensuring the safety performance of complex circuit network systems Robustness to DoS attacks.
(2)本发明在智能逻辑处理器设计了警报器,该警报器可自动检测系统被攻击时刻;通过智能逻辑处理器,得到被攻击采样点总数,并可建立DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系。(2) The present invention designs an alarm device in the intelligent logic processor, which can automatically detect the moment when the system is attacked; through the intelligent logic processor, the total number of sampled points to be attacked can be obtained, and the DoS attack frequency and DoS attack domain can be established. , the relationship between the sampling period and the maximum dwell time.
(3)本发明针对不同攻击情形,自适应选择控制增益,从而能有效增强系统对抗DoS攻击的鲁棒性。(3) The present invention adaptively selects control gains for different attack situations, thereby effectively enhancing the robustness of the system against DoS attacks.
附图说明Description of drawings
图1为蔡电路系统图;Figure 1 is the circuit diagram of Cai;
图2为蔡电路系统轨迹图;Fig. 2 is the track diagram of Cai's circuit system;
图3为电路系统间通信拓扑图结构图;Fig. 3 is a communication topology diagram structure diagram between circuit systems;
图4为DoS攻击下复杂电路网络系统控制流程图;Fig. 4 is the control flow chart of complex circuit network system under DoS attack;
图5为本发明比较器的逻辑操作流程图;Fig. 5 is the logic operation flow chart of the comparator of the present invention;
图6为现有技术中比较器的流程图;6 is a flowchart of a comparator in the prior art;
图7为DoS攻击序列图;Figure 7 is a sequence diagram of a DoS attack;
图8为复杂电路网络系统节点轨迹图;Fig. 8 is a complex circuit network system node trajectory diagram;
图9为同步误差图;Fig. 9 is a synchronization error diagram;
图10为自适应采样切换控制器图。Figure 10 is a diagram of an adaptive sampling switching controller.
具体实施方式Detailed ways
下面结合实施例对本发明作进一步地详细说明,但本发明的实施方式不限于此。The present invention will be further described in detail below with reference to the examples, but the embodiments of the present invention are not limited thereto.
实施例:Example:
一种DoS攻击下复杂电路网络系统的自适应采样切换控制方法,包括:An adaptive sampling switching control method for a complex circuit network system under DoS attack, comprising:
1.系统参数设置:以电路系统为蔡电路为例,蔡电路如图1所示,其中R,R1是电阻,C1,C2是电容,L是电感;V1,V2分别是电容C1,C2两端的电压,i1,iR分别是流经电感L和电阻R的电流;g是非线性电阻;1. System parameter setting: Take the circuit system as the Cai circuit as an example, the Cai circuit is shown in Figure 1 , where R, R1 are resistors, C1 , C2 are capacitors, L is inductance ; V1, V2 are respectively The voltages across the capacitors C 1 and C 2 , i 1 , i R are the currents flowing through the inductor L and the resistor R respectively; g is the nonlinear resistance;
2.根据基尔霍夫电流定律,该电路系统的动态特征为:2. According to Kirchhoff's current law, the dynamic characteristics of the circuit system are:
其中g(V2)为流经非线性电阻g的电流,定义为:where g(V 2 ) is the current flowing through the nonlinear resistor g, defined as:
其中Ga,Gb,E为二极管参数。Wherein Ga , Gb , E are diode parameters.
通过变量代换(1)可变为如下形式by variable substitution (1) It can be changed to the following form
其中m1=RGb,m2=RGa,这里取γ1=-1.3018,γ2=-0.0135,γ3=-0.0297,m1=-0.5700,m2=0.1091。在初值[0.9,-1.1,0.05]T下,上述电路系统状态轨迹图如图2所示,从图2可以看出系统展现出混沌行为。in m 1 =RG b , m 2 =RG a , Here, γ 1 =-1.3018, γ 2 =-0.0135, γ 3 =-0.0297, m 1 =-0.5700, and m 2 =0.1091. Under the initial value [0.9,-1.1,0.05] T , the state trajectory diagram of the above circuit system is shown in Figure 2. From Figure 2, it can be seen that the system exhibits chaotic behavior.
3.描述多电路系统网络通信连接拓扑结构:以5个电路系统的通信连接拓扑关系为例,如图3所示,每个电路系统及目标系统都是蔡电路系统。设置一个通信连接系数bij,如果第j(j=1,2,…,5)个电路系统的信息能够传递给第i(i=1,2,…,5)个电路系统,则bij>0,否则bij=0。令b12=0.57,b21=6.65,b45=5.5,b54=0.6,则可得该拓扑结构的Laplacian矩阵L、加权邻接矩阵B和入度矩阵D分别为:3. Describe the network communication connection topology of the multi-circuit system: Take the communication connection topology relationship of five circuit systems as an example, as shown in Figure 3, each circuit system and the target system are Cai circuit systems. Set a communication connection coefficient b ij , if the information of the jth (j=1,2,...,5) circuit system can be transmitted to the ith (i=1,2,...,5) circuit system, then b ij >0, otherwise b ij =0. Let b 12 =0.57, b 21 =6.65, b 45 =5.5, b 54 =0.6, then the Laplacian matrix L, weighted adjacency matrix B and in-degree matrix D of the topology can be obtained as:
D=diag{0.57,6.65,0,5.5,0.6}。D=diag{0.57, 6.65, 0, 5.5, 0.6}.
4.设电路系统和目标系统的状态变量分别为θi(t)(i=1,2,…5)和ι(t),则误差状态为ηi(t)=θi(t)-ι(t)(i=1,2,…5)。DoS攻击下,复杂电路网络系统控制流程图如图4所示。在图4中,ηi(t)(i=1,2,…5)首先由传感器以周期T进行采样,采样点序列为S={s0,s1,…,sl,…},其中s0=0,sl=lT。然后由采样点sl和采样状态ηi(sl)(i=1,2,…,5)构成的数据包(sl,ηi(sl))被发送器发送至通信网络,经控制器、零阶保持器、执行器再反馈给复杂电路网络系统。如果从传感器到控制器信道遭受DoS攻击,则数据包(sl,ηi(sl))不能到达控制器。为了分析DoS攻击的影响,本发明设计了一个新的智能逻辑处理器。该智能逻辑处理器由缓存器和比较器组成。缓存器用以存储最新采样包。当缓存器的数据被更新时,则该更新数据就会立即被用于生成控制信号,用以实现系统安全同步控制性能,并设控制器接收到数据包的时间点序列为比较器通过执行一些逻辑操作来捕获DoS攻击信息,具体逻辑操作如图5所示,设置初始参数,为采样时刻且N0表示DoS攻击的发生次数,D0表示被检测后的攻击驻留总时长,hM表示最大驻留时间。σ1,σ2是控制器的关键参数,用以自适应调节控制输入。并赋初值N0=0,D0=0,hM=T,σ1=1,σ2=0。4. Suppose the state variables of the circuit system and the target system are θ i (t) (i=1, 2,...5) and ι(t) respectively, then the error state is η i (t)=θ i (t)- ι(t) (i=1,2,...5). Under the DoS attack, the control flow chart of the complex circuit network system is shown in Figure 4. In Fig. 4, η i (t) (i=1, 2,...5) is first sampled by the sensor with a period T, and the sampling point sequence is S={s 0 ,s 1 ,...,s l ,...}, where s 0 =0 and s l =1T. Then the data packet (s l , η i (s l )) composed of the sampling point s l and the sampling state η i (s l ) (i=1, 2, . . . , 5) is sent by the transmitter to the communication network, via The controller, zero-order retainer, and actuator are then fed back to the complex circuit network system. If the channel from the sensor to the controller suffers a DoS attack, the packets (s l , η i (s l )) cannot reach the controller. In order to analyze the impact of DoS attack, the present invention designs a new intelligent logic processor. The intelligent logic processor consists of a buffer and a comparator. The buffer is used to store the latest sampling packets. When the data in the buffer is updated, the updated data will be used to generate the control signal immediately to realize the security synchronization control performance of the system, and the sequence of time points when the controller receives the data packet is set as The comparator captures DoS attack information by performing some logical operations. The specific logical operations are shown in Figure 5. The initial parameters are set, is the sampling time and N 0 represents the number of occurrences of DoS attacks, D 0 represents the total residence time of the attack after detection, and h M represents the maximum residence time. σ 1 , σ 2 are the key parameters of the controller to adjust the control input adaptively. and assign initial value N 0 =0, D 0 =0, h M =T, σ 1 =1, σ 2 =0.
令η(t)=[η1 T(t),η2 T(t),…,η5 T(t)]T。对于给定的初值和比较器首先会判断数据包是否到达缓存器。如果到达,则把赋值给tl,发送信号(σ1,σ2)=(1,0)和数据包(tl,η(tl))到控制器,并将tl的值赋值给如果未到达,警报器被触发,说明数据包遭受了DoS攻击,此时为攻击发起时刻。这时,更新DoS攻击发生次数N0=N0+1,发送信号(σ1,σ2)=(0,1)到控制器,并等待采样数据包(tl,η(tl))到达缓存器。如果数据包(tl,η(tl))到达缓存器,则这次攻击结束,更新其中表示该次攻击在被检测后的持续时间,为被检测时间点。然后比较器将进一步判断最大驻留时间hM与的大小,如果hM小于则更新发送信号(σ1,σ2)=(1,0)和数据包(tl,η(tl))到控制器,并将tl赋值给通过比较器,DoS攻击关键信息包括攻击发起时刻、攻击总次数、攻击驻留总时长、被攻击的采样数和最大驻留时间可被获得。Let η(t) = [η 1 T (t), η 2 T (t), . . . , η 5 T (t)] T . for a given initial value and The comparator first judges the packet whether to reach the buffer. If it arrives, put assign to t l , send the signal (σ 1 ,σ 2 )=(1,0) and the data packet (t l ,η(t l )) to the controller, and assign the value of t l to If it doesn't arrive, the alarm is triggered, indicating that the packet suffered a DoS attack, Time for the attack. At this time, update the number of DoS attacks N 0 =N 0 +1, send the signal (σ 1 ,σ 2 )=(0,1) to the controller, and wait for the sampling data packet (t l ,η(t l )) reach the buffer. If the data packet (t l , η(t l )) reaches the buffer, the attack ends, and the update in Indicates the duration of the attack after it was detected, is the detected time point. Then the comparator will further judge the maximum dwell time h M and size, if h M is less than then update Send the signal (σ 1 ,σ 2 )=(1,0) and the data packet (t l ,η(t l )) to the controller and assign t l to Through the comparator, the key information of the DoS attack, including the attack initiation time, the total number of attacks, the total duration of the attack residence, the number of attacked samples, and the maximum residence time can be obtained.
由于攻击者的能量通常是有限的,在这种情况下,DoS攻击频率和DoS攻击驻域会满足一定的限制条件。为更好的理解DoS攻击,揭露DoS攻击关键信息内部之间的联系,对于给定时间区间[t0,t),定义D(t)为被检测后的所有DoS攻击驻留总时长,N(t)为发生的攻击总次数,根据智能逻辑处理器的操作原理,可建立如下关于DoS攻击频率、DoS攻击驻域、采样周期和最大驻留时间之间的关系:Since the attacker's energy is usually limited, in this case, the DoS attack frequency and DoS attack domain will meet certain constraints. In order to better understand the DoS attack and expose the internal connection between the key information of the DoS attack, for a given time interval [t 0 , t), define D(t) as the total duration of all detected DoS attacks, N (t) is the total number of attacks that have occurred. According to the operating principle of the intelligent logic processor, the relationship between the frequency of DoS attacks, the DoS attack domain, the sampling period and the maximum dwell time can be established as follows:
其中:t∈[tl,tl+1), where: t∈[t l ,t l+1 ),
则为被攻击的采样点总数,表示向下取整,表示tj的左极限,hl=tl+1-tl∈(T,hM]。but is the total number of sampling points attacked, means round down, represents the left limit of t j , h l =t l+1 -t l ∈(T,h M ].
证明:对t∈[tl,tl+1),l=0,1,2...有Prove: For t∈[t l ,t l+1 ), l=0,1,2...have
注意到,如果则根据该结论则有Note that if but According to this conclusion, there are
由(4)式,可得From (4), we can get
由(4)、(5)式可得(2)、(3)成立。From equations (4) and (5), (2) and (3) can be obtained.
图6为现有技术中比较器流程图,其中,dk、hm、hM、n0、Tm、Δ和分别表示逻辑处理器成功接收到的数据包时刻、最小攻击驻留时间、最大攻击驻留时间、攻击总次数、攻击驻域(攻击驻留时间总和)、两个相邻成功传输数据包之间的时间间隔和特定时间内逻辑处理器成功接收到的数据包时刻。如果两个相邻成功传输数据包之间的时间间隔Δ不大于采样周期T0,则将dk赋值给如果两个相邻成功传输数据包之间的时间间隔Δ大于采样周期T0,则将Tm+Δ-T0赋值给Tm,更新n0=n0+1;并进一步判断当前两个相邻成功传输数据包之间的时间间隔Δ是否大于hM。如果是,则将Δ赋值给hM,如果否,进一步Δ是否小于等于hm,如果是,将Δ-T0赋值给hm,如果否将dk赋值给与现有技术中比较器相比,本发明所设计的比较器有如下优点:①操作流程中安装了警报器,该警报器可自动检测系统被DoS攻击时刻;②可得到被攻击采样点总数③并可建立DoS攻击频率N(t)、DoS攻击驻域D(t)、采样周期T和最大驻留时间hM之间的关系④可根据不同的攻击情形,反馈不同的控制参数。FIG. 6 is a flow chart of a comparator in the prior art, wherein d k , h m , h M , n 0 , T m , Δ and Respectively represent the time of the packet successfully received by the logical processor, the minimum attack dwell time, the maximum attack dwell time, the total number of attacks, the attack dwell domain (the sum of the attack dwell time), and the interval between two adjacent successfully transmitted packets. The time interval and the moment when the logical processor successfully received the packet within the specified time. If the time interval Δ between two adjacent successfully transmitted data packets is not greater than the sampling period T 0 , then assign d k to If the time interval Δ between two adjacent successfully transmitted data packets is greater than the sampling period T 0 , assign T m +Δ-T 0 to T m , update n 0 =n 0 +1; and further judge the current two Whether the time interval Δ between adjacent successfully transmitted data packets is greater than h M . If yes, assign Δ to h M , if no, whether further Δ is less than or equal to h m , if yes, assign Δ-T 0 to h m , if no, assign d k to Compared with the comparator in the prior art, the comparator designed by the present invention has the following advantages: 1. an alarm device is installed in the operation process, and the alarm device can automatically detect the moment when the system is attacked by DoS; 2. the total number of sampling points to be attacked can be obtained ③ The relationship between DoS attack frequency N(t), DoS attack resident area D(t), sampling period T and maximum residence time h M can be established ④ Different control parameters can be fed back according to different attack situations.
5.自适应采样切换控制器的设计。控制器与智能逻辑处理器紧密合作,当智能逻辑处理器接收到采样数据包时,控制器则立即使用该采样包来生成控制信号,再利用零阶保持器,离散采样控制信号被转化为连续信号,经执行器再反馈给系统,从而驱动复杂电路网络系统。控制器中自适应采样切换控制协议设计如下:5. Design of adaptive sampling switching controller. The controller cooperates closely with the intelligent logic processor. When the intelligent logic processor receives the sampling data packet, the controller immediately uses the sampling packet to generate the control signal, and then uses the zero-order hold, and the discrete sampling control signal is converted into continuous sampling. The signal is fed back to the system through the actuator to drive the complex circuit network system. The adaptive sampling switching control protocol in the controller is designed as follows:
情形i:如果区间[tl,tl+1),l=1,2,...未遭受DoS攻击,则有tl+1=tl+T;Case i: If the interval [t l , t l+1 ), l=1, 2, ... is not subject to DoS attack, then there is t l+1 =t l +T;
情形ii:如果区间[tl,tl+1),l=1,2,...遭受DoS攻击,则有tl+T<tl+1≤tl+hM。Case ii: If the interval [t l , t l+1 ), l=1, 2, . . . suffers from a DoS attack, then t l +T<t l+1 ≤t l +h M .
针对情形i,设计如下采样控制器For case i, design the following sampling controller
ui(t)=-k1iηi(tl),t∈[tl,tl+T),i=1,2,…5 (6)u i (t)=-k 1i η i (t l ),t∈[t l ,t l +T),i=1,2,…5 (6)
其中ui(t)是第i个电路系统的控制输入,k1i是控制器ui(t)的控制增益。where u i (t) is the control input of the ith circuit system and k 1i is the control gain of the controller u i (t).
针对情形ii,设计如下采样控制器For case ii, design the following sampling controller
ui(t)=-σ1(t)k1iηi(tl)-σ2(t)k2iηi(tl),i=1,2,…5 (7)u i (t)=-σ 1 (t)k 1i η i (t l )-σ 2 (t)k 2i η i (t l ),i=1,2,...5 (7)
其中σ1(t)、σ2(t)的取值分别是由逻辑处理器输出的σ1、σ2的值确定的,k1i、k2i(i=1,2,…,5)是控制增益。in The values of σ 1 (t) and σ 2 (t) are determined by the values of σ 1 and σ 2 output by the logic processor, respectively, and k 1i and k 2i (i=1,2,...,5) are control gain.
不管DoS攻击是否发生,现有技术中的控制器都具有固定不变的控制增益。而本发明根据不同的攻击情形设计了自适应采样切换控制协议——公式(6)和(7)。在该协议中,对任意区间[tl,tl+1),根据不同攻击情形,在确保复杂电路网络系统安全同步性能前提下,不同控制增益k1i、k2i(i=1,2,…,5)将会被选取。如果在区间[tl,tl+1)上未发生DoS攻击,则采用控制增益k1i。如果在区间[tl,tl+1)上发生DoS攻击,则数据包(tl+T,ηi(tl+T))将无法到达缓存器,逻辑处理器会立即发出警报。这种情况下,在t∈[tl,tl+T)时,采用控制增益k1i;在t∈[tl+T,tl+1)时,采用控制增益k2i。k1i和k2i的自适应切换选取是由逻辑处理器输出σ1和σ2的值确定的。与现有技术中的控制方法相比较,本发明提出的自适应采样切换控制方法更灵活,且能有效增强系统对抗DoS攻击的鲁棒性。Regardless of whether a DoS attack occurs, the controller in the prior art has a constant control gain. The present invention designs an adaptive sampling switching control protocol—formulas (6) and (7) according to different attack situations. In this protocol, for any interval [t l , t l+1 ), according to different attack situations, under the premise of ensuring the safety and synchronization performance of complex circuit network systems, different control gains k 1i and k 2i (i=1, 2, ...,5) will be selected. If no DoS attack occurs in the interval [t l , t l+1 ), the control gain k 1i is adopted. If a DoS attack occurs on the interval [t l , t l+1 ), the data packet (t l +T, η i (t l +T)) will not reach the buffer, and the logical processor will issue an alarm immediately. In this case, when t∈[t l , t l +T), the control gain k 1i is used; when t∈[t l +T, t l+1 ), the control gain k 2i is used. The adaptive switching selection of k 1i and k 2i is determined by the values of the logic processor outputs σ 1 and σ 2 . Compared with the control methods in the prior art, the adaptive sampling switching control method proposed by the present invention is more flexible, and can effectively enhance the robustness of the system against DoS attacks.
为验证本发明的有效性和方法的优势,进行了如下仿真实验。考虑上述复杂电路网络系统的传感器到控制器信道遭受DoS攻击,其攻击序列如图7所示。根据图论知识,当牵制节点1,3,5,则图3有一棵生成树。在如图7所示的DoS攻击下,取控制增益In order to verify the effectiveness of the present invention and the advantages of the method, the following simulation experiments are carried out. Considering that the sensor-to-controller channel of the above complex circuit network system suffers from DoS attacks, the attack sequence is shown in Figure 7. According to the knowledge of graph theory, when
k11=10.1742,k12=0,k13=7.9494,k14=0,k15=12.9165,k 11 =10.1742, k 12 =0, k 13 =7.9494, k 14 =0, k 15 =12.9165,
k21=4.9895,k22=0,k23=4.4786,k24=0,k25=5.0785。k 21 =4.9895, k 22 =0, k 23 =4.4786, k 24 =0, k 25 =5.0785.
在自适应采样切换控制协议——公式(6)和(7)的控制下,复杂电路网络系统的节点轨迹图、同步误差轨迹图和自适应采样切换控制器图分别如图8、图9和图10所示。从如图8可以发现所有节点的状态轨迹达到同步,且从图9可以发现同步误差是趋于0的,从而验证了本发明所设计的自适应采样切换控制方法能有效对抗DoS攻击影响,确保复杂电路网络系统的安全同步性能。Under the control of the adaptive sampling switching control protocol - formulas (6) and (7), the node trajectory diagram, synchronization error trajectory diagram and adaptive sampling switching controller diagram of the complex circuit network system are shown in Figure 8, Figure 9 and Figure 9, respectively. shown in Figure 10. From Figure 8, it can be found that the state trajectories of all nodes are synchronized, and from Figure 9, it can be found that the synchronization error tends to 0, thereby verifying that the adaptive sampling switching control method designed in the present invention can effectively resist the impact of DoS attacks and ensure that Safe synchronization performance of complex circuit network systems.
在上述相同系统参数下,由现有技术中的固定控制增益方法可得最大攻击驻留时间hM=0.18,而由本发明所设计的自适应采样切换控制方法可得最大攻击驻留时间hM=0.24。攻击驻留时间上界越大,说明所设计的控制方法鲁棒性越强。因此,本发明控制方法对抗DoS攻击能力越强,从而增强了复杂电路网络系统对抗DoS攻击的鲁棒性。Under the same system parameters above, the maximum attack dwell time h M = 0.18 can be obtained by the fixed control gain method in the prior art, and the maximum attack dwell time h M can be obtained by the adaptive sampling switching control method designed in the present invention = 0.24. The larger the upper bound of the attack residence time, the stronger the robustness of the designed control method. Therefore, the control method of the present invention has a stronger anti-DoS attack capability, thereby enhancing the robustness of the complex circuit network system against DoS attacks.
尽管这里参照本发明的解释性实施例对本发明进行了描述,上述实施例仅为本发明较佳的实施方式,本发明的实施方式并不受上述实施例的限制,应该理解,本领域技术人员可以设计出很多其他的修改和实施方式,这些修改和实施方式将落在本申请公开的原则范围和精神之内。Although the present invention is described herein with reference to the illustrative embodiments of the present invention, the above-mentioned embodiments are only preferred embodiments of the present invention, and the embodiments of the present invention are not limited by the above-mentioned embodiments, and it should be understood that those skilled in the art Numerous other modifications and embodiments can be devised that will fall within the scope and spirit of the principles disclosed herein.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210759316.3A CN114995158B (en) | 2022-06-30 | 2022-06-30 | Self-adaptive sampling switching control method of complex circuit network system under DoS attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210759316.3A CN114995158B (en) | 2022-06-30 | 2022-06-30 | Self-adaptive sampling switching control method of complex circuit network system under DoS attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114995158A true CN114995158A (en) | 2022-09-02 |
CN114995158B CN114995158B (en) | 2023-01-24 |
Family
ID=83020019
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210759316.3A Active CN114995158B (en) | 2022-06-30 | 2022-06-30 | Self-adaptive sampling switching control method of complex circuit network system under DoS attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114995158B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116073982A (en) * | 2023-02-07 | 2023-05-05 | 中国人民解放军陆军工程大学 | A secure communication method and system against DoS attack for a limited time |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108258681A (en) * | 2018-01-11 | 2018-07-06 | 南京邮电大学 | The security incident trigger control method of LOAD FREQUENCY control system under a kind of DoS attack |
CN109672177A (en) * | 2019-01-18 | 2019-04-23 | 南京邮电大学 | LOAD FREQUENCY quantization control method based on event trigger mechanism under a kind of DoS attack |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN112068441A (en) * | 2020-09-18 | 2020-12-11 | 河南农业大学 | Collaborative design method for security event driver and SDOFR controller |
CN112099356A (en) * | 2020-09-18 | 2020-12-18 | 河南农业大学 | Design method of event-driven SDOFQH controller under DoS attack |
CN112859607A (en) * | 2021-01-13 | 2021-05-28 | 河南农业大学 | Collaborative design method for distributed security event driver and SDOFD controller |
US20210243224A1 (en) * | 2020-02-05 | 2021-08-05 | King Fahd University Of Petroleum And Minerals | Control of cyber physical systems subject to cyber and physical attacks |
CN113467332A (en) * | 2021-07-28 | 2021-10-01 | 南京市初仁智能科技有限公司 | Design method of event trigger controller of information physical system under denial of service attack |
CN113625684A (en) * | 2021-07-26 | 2021-11-09 | 云境商务智能研究院南京有限公司 | Tracking controller and method based on event trigger mechanism under hybrid network attack |
CN114326398A (en) * | 2021-12-27 | 2022-04-12 | 华中科技大学 | Control method and control system of linear switching system with unstable mode |
CN114489025A (en) * | 2022-02-14 | 2022-05-13 | 上海交通大学宁波人工智能研究院 | Model-driven industrial control system safety protection method |
-
2022
- 2022-06-30 CN CN202210759316.3A patent/CN114995158B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108258681A (en) * | 2018-01-11 | 2018-07-06 | 南京邮电大学 | The security incident trigger control method of LOAD FREQUENCY control system under a kind of DoS attack |
CN109672177A (en) * | 2019-01-18 | 2019-04-23 | 南京邮电大学 | LOAD FREQUENCY quantization control method based on event trigger mechanism under a kind of DoS attack |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
US20210243224A1 (en) * | 2020-02-05 | 2021-08-05 | King Fahd University Of Petroleum And Minerals | Control of cyber physical systems subject to cyber and physical attacks |
CN112068441A (en) * | 2020-09-18 | 2020-12-11 | 河南农业大学 | Collaborative design method for security event driver and SDOFR controller |
CN112099356A (en) * | 2020-09-18 | 2020-12-18 | 河南农业大学 | Design method of event-driven SDOFQH controller under DoS attack |
CN112859607A (en) * | 2021-01-13 | 2021-05-28 | 河南农业大学 | Collaborative design method for distributed security event driver and SDOFD controller |
CN113625684A (en) * | 2021-07-26 | 2021-11-09 | 云境商务智能研究院南京有限公司 | Tracking controller and method based on event trigger mechanism under hybrid network attack |
CN113467332A (en) * | 2021-07-28 | 2021-10-01 | 南京市初仁智能科技有限公司 | Design method of event trigger controller of information physical system under denial of service attack |
CN114326398A (en) * | 2021-12-27 | 2022-04-12 | 华中科技大学 | Control method and control system of linear switching system with unstable mode |
CN114489025A (en) * | 2022-02-14 | 2022-05-13 | 上海交通大学宁波人工智能研究院 | Model-driven industrial control system safety protection method |
Non-Patent Citations (2)
Title |
---|
ZHANG RUIMEI,ET AL.: "Fuzzy Secure Control for Nonlinear N-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks", 《IEEE》 * |
ZHANG XIANMING,ET AL.: "Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks", 《IEEE TRANSACTIONS ON CYBERNETICS》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116073982A (en) * | 2023-02-07 | 2023-05-05 | 中国人民解放军陆军工程大学 | A secure communication method and system against DoS attack for a limited time |
CN116073982B (en) * | 2023-02-07 | 2024-01-19 | 中国人民解放军陆军工程大学 | Secret communication method and system for resisting DoS attack in limited time |
Also Published As
Publication number | Publication date |
---|---|
CN114995158B (en) | 2023-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN | |
Liu et al. | Software-defined DDoS detection with information entropy analysis and optimized deep learning | |
Tang et al. | Performance and features: Mitigating the low-rate TCP-targeted DoS attack via SDN | |
TWI729320B (en) | Suspicious packet detection device and suspicious packet detection method thereof | |
CN108429753A (en) | A Fast Feature Matching Method for DDoS Intrusion Detection in Industrial Networks | |
CN107370732A (en) | System is found based on neutral net and the industrial control system abnormal behaviour of optimal recommendation | |
CN108683686B (en) | A DDoS attack detection method for random subdomains | |
CN108259498B (en) | An Intrusion Detection Method and System Based on BP Algorithm Based on Artificial Bee Colony Optimization | |
CN109768981B (en) | A network attack defense method and system based on machine learning under SDN architecture | |
CN108696453B (en) | Lightweight power communication network SDN service flow perception method and system | |
CN112698573A (en) | Networked system non-fragile event trigger control method based on positive switching system modeling | |
CN108880909B (en) | Network energy saving method and device based on reinforcement learning | |
CN110011983B (en) | A Denial of Service Attack Detection Method Based on Flow Table Features | |
CN111131199B (en) | Business attack traffic cleaning control method, device, server and storage medium | |
Li et al. | DDoS detection in SDN switches using support vector machine classifier | |
CN114531273A (en) | Method for defending distributed denial of service attack of industrial network system | |
CN114995158B (en) | Self-adaptive sampling switching control method of complex circuit network system under DoS attack | |
Zhao et al. | Resilient adaptive event‐triggered synchronization control of piecewise‐homogeneous Markov jump delayed neural networks under aperiodic DoS attacks | |
Wang et al. | Secure consensus for switched multiagent systems under DoS attacks: Hybrid event-triggered and impulsive control approach | |
Wang et al. | USAGE: Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method | |
CN117040828A (en) | Observer-based periodic event triggering synchronous control method for complex network with attack | |
Zhang et al. | Event-triggered random delayed impulsive consensus of multi-agent systems with time-varying delay | |
CN115119209A (en) | A real-time intelligent attack method based on integrated strategy for RPL network | |
CN115766081A (en) | A method and device for detecting abnormal traffic on an electric power industrial control cloud platform | |
Guo et al. | Observer‐based event‐triggered consensus control of nonlinear cyber‐physical systems under backlash‐like hysteresis and denial‐of‐service attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |