期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
Distributed State and Fault Estimation for Cyber-Physical Systems Under DoS Attacks
1
作者 Limei Liang Rong Su Haotian Xu 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期261-263,共3页
Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded... Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded computing, communication and related hardware technologies, CPSs have attracted extensive attention and have been widely used in power system, traffic network, refrigeration system and other fields. 展开更多
关键词 cyber physical systems refrigeration system traffic network dos attacks distributed state fault estimation embedded computing power system distributed state estimation
在线阅读 下载PDF
Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT
2
作者 Prasanalakshmi Balaji Sangita Babu +4 位作者 Maode Ma Zhaoxi Fang Syarifah Bahiyah Rahayu Mariyam Aysha Bivi Mahaveerakannan Renganathan 《Computers, Materials & Continua》 2025年第9期5831-5858,共28页
The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptibl... The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptible to security threats.One significant risk to cloud networks is Distributed Denial-of-Service(DoS)attacks,where attackers aim to overcome a target system with excessive data and requests.Among these,low-rate DoS(LR-DoS)attacks present a particular challenge to detection.By sending bursts of attacks at irregular intervals,LR-DoS significantly degrades the targeted system’s Quality of Service(QoS).The low-rate nature of these attacks confuses their detection,as they frequently trigger congestion control mechanisms,leading to significant instability in IoT systems.Therefore,to detect the LR-DoS attack,an innovative deep-learning model has been developed for this research work.The standard dataset is utilized to collect the required data.Further,the deep feature extraction process is executed using the Residual Autoencoder with Sparse Attention(ResAE-SA),which helps derive the significant feature required for detection.Ultimately,the Adaptive Dense Recurrent Neural Network(ADRNN)is implemented to detect LR-DoS effectively.To enhance the detection process,the parameters present in the ADRNN are optimized using the Renovated Random Attribute-based Fennec Fox Optimization(RRA-FFA).The proposed optimization reduces the False Discovery Rate and False Positive Rate,maximizing the Matthews Correlation Coefficient from 23,70.8,76.2,84.28 in Dataset 1 and 70.28,73.8,74.1,82.6 in Dataset 2 on EPC-ADRNN,DPO-ADRNN,GTO-ADRNN,FFA-ADRNN respectively to 95.8 on Dataset 1 and 91.7 on Dataset 2 in proposed model.At batch size 4,the accuracy of the designed RRA-FFA-ADRNN model progressed by 9.2%to GTO-ADRNN,11.6%to EFC-ADRNN,10.9%to DPO-ADRNN,and 4%to FFA-ADRNN for Dataset 1.The accuracy of the proposed RRA-FFA-ADRNN is boosted by 12.9%,9.09%,11.6%,and 10.9%over FFCNN,SVM,RNN,and DRNN,using Dataset 2,showing a better improvement in accuracy with that of the proposed RRA-FFA-ADRNN model with 95.7%using Dataset 1 and 94.1%with Dataset 2,which is better than the existing baseline models. 展开更多
关键词 Detecting low-rate dos attacks adaptive dense recurrent neural network residual autoencoder with sparse attention renovated random attribute-based fennec fox optimization
在线阅读 下载PDF
Impulsive Consensus of MASs With Input Saturation and DoS Attacks
3
作者 Xuyang Wang Dengxiu Yu Xiaodi Li 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期414-424,共11页
This paper investigates the secure impulsive consensus of Lipschitz-type nonlinear multi-agent systems(MASs) with input saturation. According to the coupling of input saturation and denial of service(DoS) attacks, imp... This paper investigates the secure impulsive consensus of Lipschitz-type nonlinear multi-agent systems(MASs) with input saturation. According to the coupling of input saturation and denial of service(DoS) attacks, impulsive control for MASs becomes extremely challenging. Considering general DoS attacks,this paper provides the sufficient conditions for the almost sure consensus of the MASs with input saturation, where the error system can achieve almost sure local exponential stability.Through linear matrix inequalities(LMIs), the relation between the trajectory boundary and DoS attacks is characterized, and the trajectory boundary is estimated. Furthermore, an optimization method of the domain of attraction is proposed to maximize the size. And a non-conservative and practical boundary is proposed to characterize the effect of DoS attacks on MASs. Finally, considering a multi-agent system with typical Chua's circuit dynamic model, an example is provided to illustrate the theorems' correctness. 展开更多
关键词 Almost sure consensus denial of service(dos)attacks impulsive control input saturation
在线阅读 下载PDF
ICPS multi-target constrained comprehensive security control based on DoS attacks energy grading detection and compensation
4
作者 HAN Yinlong HAN Xiaowu 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第4期518-531,共14页
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr... Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions. 展开更多
关键词 industry cyber-physical system(ICPS) Denial-of-Service(dos)attacks energy grading detection security event triggering mechanism time series analysis methods cone complementary linearization
在线阅读 下载PDF
A Novel Distributed LDoS Attack Scheme against Internet Routing 被引量:3
5
作者 ZHU Hongliangt XIN Yang +1 位作者 WU Qiuxin YOU Fucheng 《China Communications》 SCIE CSCD 2014年第A01期101-107,共7页
LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is... LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect. 展开更多
关键词 distributed low-rate dos attacks attack efficiency BGP route flapping defense mechanisms
在线阅读 下载PDF
Intelligent DoS Attack Detection with Congestion Control Technique for VANETs 被引量:1
6
作者 R.Gopi Mahantesh Mathapati +4 位作者 B.Prasad Sultan Ahmad Fahd N.Al-Wesabi Manal Abdullah Alohali Anwer Mustafa Hilal 《Computers, Materials & Continua》 SCIE EI 2022年第7期141-156,共16页
VehicularAd hoc Network(VANET)has become an integral part of Intelligent Transportation Systems(ITS)in today’s life.VANET is a network that can be heavily scaled up with a number of vehicles and road side units that ... VehicularAd hoc Network(VANET)has become an integral part of Intelligent Transportation Systems(ITS)in today’s life.VANET is a network that can be heavily scaled up with a number of vehicles and road side units that keep fluctuating in real world.VANET is susceptible to security issues,particularly DoS attacks,owing to maximum unpredictability in location.So,effective identification and the classification of attacks have become the major requirements for secure data transmission in VANET.At the same time,congestion control is also one of the key research problems in VANET which aims at minimizing the time expended on roads and calculating travel time as well as waiting time at intersections,for a traveler.With this motivation,the current research paper presents an intelligent DoS attack detection with Congestion Control(IDoS-CC)technique for VANET.The presented IDoSCC technique involves two-stage processes namely,Teaching and Learning Based Optimization(TLBO)-based Congestion Control(TLBO-CC)and Gated Recurrent Unit(GRU)-based DoS detection(GRU-DoSD).The goal of IDoS-CC technique is to reduce the level of congestion and detect the attacks that exist in the network.TLBO algorithm is also involved in IDoS-CC technique for optimization of the routes taken by vehicles via traffic signals and to minimize the congestion on a particular route instantaneously so as to assure minimal fuel utilization.TLBO is applied to avoid congestion on roadways.Besides,GRU-DoSD model is employed as a classification model to effectively discriminate the compromised and genuine vehicles in the network.The outcomes from a series of simulation analyses highlight the supremacy of the proposed IDoS-CC technique as it reduced the congestion and successfully identified the DoS attacks in network. 展开更多
关键词 VANET intelligent transportation systems congestion control attack detection dos attack deep learning
在线阅读 下载PDF
A Router Based Packet Filtering Scheme for Defending Against DoS Attacks 被引量:1
7
作者 LU Ning SU Sen +1 位作者 JING Maohua HAN Jian 《China Communications》 SCIE CSCD 2014年第10期136-146,共11页
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ... The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage. 展开更多
关键词 Internet security dos attacks filter-based reactive packet filtering
在线阅读 下载PDF
Honeypot Game Theory against DoS Attack in UAV Cyber 被引量:1
8
作者 Shangting Miao Yang Li Quan Pan 《Computers, Materials & Continua》 SCIE EI 2023年第9期2745-2762,共18页
A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especia... A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especially suitable for attacking the UAV cyber.It is a robust security risk for UAV cyber and has recently become an active research area.Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network.In addition,the honeypot,an effective security vulnerability defense mechanism,has not been widely adopted or modeled for defense against DoS attack UAV cyber.With this motivation,the current research paper presents a honeypot game theorymodel that considersGCS andDoS attacks,which is used to study the interaction between attack and defense to optimize defense strategies.The GCS and honeypot act as defenses against DoS attacks in this model,and both players select their appropriate methods and build their benefit function models.On this basis,a hierarchical honeypot and G2A network delay reward strategy are introduced so that the defender and the attacker can adjust their respective strategies dynamically.Finally,by adjusting the degree of camouflage of the honeypot for UAV network services,the overall revenue of the defender can be effectively improved.The proposed method proves the existence of a mixed strategy Nash equilibrium and compares it with the existing research on no delay rewards and no honeypot defense scheme.In addition,this method realizes that the UAV cyber still guarantees a network delay of about ten milliseconds in the presence of a DoS attack.The results demonstrate that our methodology is superior to that of previous studies. 展开更多
关键词 UAV cyber security honeypot game-theoretical model dos attack
在线阅读 下载PDF
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
9
作者 Suhail Qadir Uzair Bashir 《Journal of Information Security》 2022年第2期66-75,共10页
Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is... Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is dependent upon the reliability, timeliness and accessibility of the Information System. This paper presents an analytical view of the fact that when Accessibility is degraded during the presence of an ongoing attack, the other factors reliability and timeliness can also get affected, therefore creating a degrading impact on the overall Availability of the system, which eventually leads to the Denial of Service Attack and therefore affecting the security of the System. 展开更多
关键词 Security AVAILABILITY Reliability TIMELINESS ACCESSIBILITY dos attack
在线阅读 下载PDF
Adaptive Memory Event-Triggered Observer-Based Control for Nonlinear Multi-Agent Systems Under DoS Attacks 被引量:8
10
作者 Xianggui Guo Dongyu Zhang +1 位作者 Jianliang Wang Choon Ki Ahn 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第10期1644-1656,共13页
This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-d... This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems(MASs)under denial-of-service(Do S)attacks over an undirected graph.A novel adaptive memory observer-based anti-disturbance control scheme is presented to improve the observer accuracy by adding a buffer for the system output measurements.Meanwhile,this control scheme can also provide more reasonable control signals when Do S attacks occur.To save network resources,an adaptive memory event-triggered mechanism(AMETM)is also proposed and Zeno behavior is excluded.It is worth mentioning that the AMETM's updates do not require global information.Then,the observer and controller gains are obtained by using the linear matrix inequality(LMI)technique.Finally,simulation examples show the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive memory event-triggered mechanism(AMETM) compensation mechanism denial-of-service(dos)attacks nonlinear multi-agent systems(MASs) observer-based anti-disturbance control
在线阅读 下载PDF
Decentralized Resilient H_∞Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks 被引量:3
11
作者 Xin Zhao Suli Zou Zhongjing Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1737-1751,共15页
This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitte... This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitted through the communication networks,which may be attacked by energylimited denial-of-service(DoS)attacks with a characterization of the maximum count of continuous data losses(resilience index).Each area is controlled in a decentralized mode,and the impacts on one area from other areas via their interconnections are regarded as the additional load disturbance of this area.Then,the closed-loop LFC system of each area under DoS attacks is modeled as an aperiodic sampled-data control system with external disturbances.Under this modeling,a decentralized resilient H_(∞)scheme is presented to design the state-feedback controllers with guaranteed H∞performance and resilience index based on a novel transmission interval-dependent loop functional method.When given the controllers,the proposed scheme can obtain a less conservative H_(∞)performance and resilience index that the LFC system can tolerate.The effectiveness of the proposed LFC scheme is evaluated on a one-area CPPS and two three-area CPPSs under DoS attacks. 展开更多
关键词 Cyber-physical power systems(CPPSs) denial-of-service(dos)attacks load frequency control(LFC) sampled-data control
在线阅读 下载PDF
Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks 被引量:2
12
作者 Ya Zhang Lishuang Du Frank L.Lewis 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1225-1234,共10页
In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and minimizing attack energy from the attacker perspective is studied.In the communication channels ... In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and minimizing attack energy from the attacker perspective is studied.In the communication channels between sensors and a remote estimator,the attacker chooses some channels to randomly jam DoS attacks to make their packets randomly dropped.A stochastic power allocation approach composed of three steps is proposed.Firstly,the minimum number of channels and the channel set to be attacked are given.Secondly,a necessary condition and a sufficient condition on the packet loss probabilities of the channels in the attack set are provided for general and special systems,respectively.Finally,by converting the original coupling nonlinear programming problem to a linear programming problem,a method of searching attack probabilities and power to minimize the attack energy is proposed.The effectiveness of the proposed scheme is verified by simulation examples. 展开更多
关键词 attack allocation denial of service(dos)attack packet loss remote estimation sensor networks
在线阅读 下载PDF
Security Control for Uncertain Networked Control Systems under DoS Attacks and Fading Channels 被引量:1
13
作者 Chengzhen Gao Cheng Tan +1 位作者 Hongtao Sun Mingyue Xiang 《Journal of Beijing Institute of Technology》 EI CAS 2022年第4期422-430,共9页
This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remote... This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remotely controls the plant and the control input is transmitted over a fading channel.Meanwhile,considering the sustained attack cycle and frequency of DoS attacks are random,the packet-loss caused by DoS attacks is modelled by a Markov process.The sampled-data NCS is transformed into a stochastic form with Markov jump and uncertain parameter.Then,based on Lyapunov functional method,linear matrix inequality(LMI)-based sufficient conditions are presented to ensure the stability of uncertain NCSs.The main contribution of this article lies in the construction of NCSs based on DoS attacks into Markov jump system(MJS)and the joint consideration of fading channel and plant uncertainty. 展开更多
关键词 networked control systems Denial-of-Service(dos)attacks UNCERTAINTY fading channels Markov jump system
在线阅读 下载PDF
HEDMGame:Fragmentation-Aware Mitigation of Heterogeneous Edge DoS Attacks
14
作者 Jie Pan Qiang He +2 位作者 Guangming Cui Yiwen Zhang Yun Yang 《Tsinghua Science and Technology》 2025年第4期1724-1743,共20页
Mobile Edge Computing(MEC)is a pivotal technology that provides agile-response services by deploying computation and storage resources in proximity to end-users.However,resource-constrained edge servers fall victim to... Mobile Edge Computing(MEC)is a pivotal technology that provides agile-response services by deploying computation and storage resources in proximity to end-users.However,resource-constrained edge servers fall victim to Denial-of-Service(DoS)attacks easily.Failures to mitigate DoS attacks effectively hinder the delivery of reliable and sustainable edge services.Conventional DoS mitigation solutions in cloud computing environments are not directly applicable in MEC environments because their design did not factor in the unique characteristics of MEC environments,e.g.,constrained resources on edge servers and requirements for low service latency.Existing solutions mitigate edge DoS attacks by transferring user requests from edge servers under attacks to others for processing.Furthermore,the heterogeneity in end-users’resource demands can cause resource fragmentation on edge servers and undermine the ability of these solutions to mitigate DoS attacks effectively.User requests often have to be transferred far away for processing,which increases the service latency.To tackle this challenge,this paper presents a fragmentationaware gaming approach called HEDMGame that attempts to minimize service latency by matching user requests to edge servers’remaining resources while making request-transferring decisions.Through theoretical analysis and experimental evaluation,we validate the effectiveness and efficiency of HEDMGame,and demonstrate its superiority over the state-of-the-art solution. 展开更多
关键词 edge Denial-of-Service(dos)attacks heterogeneous requests dominant resource potential game
原文传递
Whittle’s Index Based Sensor Scheduling for Multiprocess Systems Under DoS Attacks
15
作者 CAI Zai DING Kemi 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第1期329-350,共22页
In this paper,the authors consider how to design defensive countermeasures against DoS attacks for remote state estimation of multiprocess systems.For each system,a sensor will measure its state and transmits the data... In this paper,the authors consider how to design defensive countermeasures against DoS attacks for remote state estimation of multiprocess systems.For each system,a sensor will measure its state and transmits the data packets through an unreliable channel which is vulnerable to be jammed by an attacker.Under limited communication bandwidth,only a subset of sensors are allowed for data transmission,and how to select the optimal one to maximize the accuracy of remote state estimation is the focus of the proposed work.The authors first formulate this problem as a Markov decision process and investigate the existence of optimal policy.Moreover,the authors demonstrate the piecewise monotonicity structure of optimal policy.Given the difficulty of obtaining an optimal policy of large-scale problems,the authors develop a suboptimal heuristic policy based on the aforementioned policy structure and Whittle’s index.Moreover,a closed form of the indices is derived in order to reduce implementation complexity of proposed scheduling policy and numerical examples are provided to illustrate the proposed developed results. 展开更多
关键词 dos attacks Kalman filter remote state estimation Whittle’s index.
原文传递
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:1
16
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network dos attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks:A Fuzzy Multi-Criteria Decision-Making Approach
17
作者 Ahmed Abbas Jasim Al-Hchaimi Yousif Raad Muhsen +4 位作者 Wisam Hazim Gwad Entisar Soliman Alkayal Riyadh Rahef Nuiaa Al Ogaili Zaid Abdi Alkareem Alyasseri Alhamzah Alnoor 《Computer Modeling in Engineering & Sciences》 2025年第3期2661-2689,共29页
The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criter... The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an alternative.In this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios.Consequently,an MCDM approach is essential to address these emerging challenges.While the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the ambiguity.The results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of 0.1946.In contrast,the Hop count is identified as the least significant criterion,with a weighted score of 0.1090.The remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring 0.1472.In terms of ranking,SvN-FDOSM has two approaches:individual and group.Both the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under F-DoSA.The sensitivity analysis provides a high stability in ranking among all 10 scenarios.This approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC. 展开更多
关键词 NoC-based MPSoC security flooding dos attack MCDM FdosM FWZIC fuzzy set
在线阅读 下载PDF
Stackelberg game-based optimal secure control against hybrid attacks for networked control systems
18
作者 Wei Xiong Yi Dong Liubin Zhou 《Journal of Automation and Intelligence》 2025年第3期236-241,共6页
This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional m... This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy. 展开更多
关键词 Stackelberg game Networked control systems Hybrid attacks dos attack FDI attack
在线阅读 下载PDF
Observer-based event-triggered control for linear MASs under a directed graph and DoS attacks 被引量:3
19
作者 Shuo-Qiu Zhang Wei-Wei Che Chao Deng 《Journal of Control and Decision》 EI 2022年第3期384-396,共13页
In this paper,we investigate the observer-based event-triggered consensus problem for linear multi-agent systems(MASs)under a directed graph and denial-of-service(DoS)attacks.A type of DoS attacks launched by maliciou... In this paper,we investigate the observer-based event-triggered consensus problem for linear multi-agent systems(MASs)under a directed graph and denial-of-service(DoS)attacks.A type of DoS attacks launched by malicious attackers at irregular intervals is considered,which can cause communication channel disruption.A novel event-triggered secure control scheme based on a closed-loop observer is proposed to determine the scheduling of the controller update,and a separation method with less conservativeness is employed to design the controller and observer gains.Then,the frequency and duration of DoS attacks that can be tolerated are analysed for the observer-based secure consensus problem.In addition,a strictly positive minimal event-triggered time interval for each agent is designed with the help of the proposed eventtriggered condition to eliminate the Zeno behaviour.Finally,a numerical simulation is given to verify the theoretical analysis. 展开更多
关键词 Directed graph dos attacks event-triggered mechanism consensus control multi-agent systems
原文传递
Observer‑Based Resilient Control of CACC Vehicle Platoon Against DoS Attack
20
作者 Xiao Tan Bin Liu +1 位作者 Jingzhao Chen Zheng Jiang 《Automotive Innovation》 EI CSCD 2023年第2期176-189,共14页
Cooperative adaptive cruise control(CACC)is an important technology for improving road utilization and energy efficiency in the automotive industry.In CACC systems,connected vehicles can receive information from adjac... Cooperative adaptive cruise control(CACC)is an important technology for improving road utilization and energy efficiency in the automotive industry.In CACC systems,connected vehicles can receive information from adjacent ones through com-munication networks.However,the networks are vulnerable to cyber-attacks,so the states of vehicles cannot be received promptly and accurately.This paper studies the security resilience control for a CACC system subject to denial of service(DoS)attack.The core of the proposed resilient control strategy is to estimate the delay caused by DoS attack and then compensate for it in the controller.Specifically,a CACC system is modeled by considering the impacts of DoS attack on the transmitted data.Then,a high-gain observer is presented to estimate the vehicle states including the time delay.The conver-gence of the observer is proved in a theorem based on the Lyapunov stability theory,and the high-gain-velocity observer is modified so that the estimation error of the velocity can converge to zero in a finite time.A resilient controller is designed by proposing a time delay compensation algorithm to mitigate the impacts of DoS attack.The effectiveness of the estimation and control methods is illustrated by a ten-vehicle simulation system operating at the FTP75 driving cycle conditions.And the relative estimation errors are less than 6%. 展开更多
关键词 Connected vehicle Resilient control dos attack High-gain observer Time delay compensation
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部