期刊文献+
共找到607篇文章
< 1 2 31 >
每页显示 20 50 100
Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System 被引量:5
1
作者 Mayank Agarwal Sanketh Purwar +1 位作者 Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第4期792-808,共17页
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese... Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios. 展开更多
关键词 Fault detection and diagnosis intrusion detection system(IDS) null data frame power save attack PS-Poll frame real time discrete event system(DES)
在线阅读 下载PDF
Real-time trajectory planning for UCAV air-to-surface attack using inverse dynamics optimization method and receding horizon control 被引量:15
2
作者 Zhang Yu Chen Jing Shen Lincheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期1038-1056,共19页
This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits... This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits of inverse dynamics optimization method and receding horizon optimal control technique. Firstly, the ground attack trajectory planning problem is mathematically formulated as a receding horizon optimal control problem (RHC-OCP). In particular, an approximate elliptic launch acceptable region (LAR) model is proposed to model the critical weapon delivery constraints. Secondly, a planning algorithm based on inverse dynamics optimization, which has high computational efficiency and good convergence properties, is developed to solve the RHCOCP in real-time. Thirdly, in order to improve robustness and adaptivity in a dynamic and uncer- tain environment, a two-degree-of-freedom (2-DOF) receding horizon control architecture is introduced and a regular real-time update strategy is proposed as well, and the real-time feedback can be achieved and the not-converged situations can be handled. Finally, numerical simulations demon- strate the efficiency of this framework, and the results also show that the presented technique is well suited for real-time implementation in dynamic and uncertain environment. 展开更多
关键词 Air-to-surface attack Direct method Inverse dynamics Motion planning Real time control Receding horizon control Trajectory planning Unmanned combat aerial vehicles
原文传递
Time delay compensation in lateral-directional flight control systems at high angles of attack 被引量:2
3
作者 Lin SHEN Da HUANG Genxing WU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第4期1-18,共18页
The previous studies of time delay compensation in flight control systems are all based on the conventional aerodynamic derivative model and conducted in longitudinal motions at low angles of attack.In this investigat... The previous studies of time delay compensation in flight control systems are all based on the conventional aerodynamic derivative model and conducted in longitudinal motions at low angles of attack.In this investigation,the effects of time delay on the lateral-directional stability augmentation system in high-a regime are discussed based on theβmodel,which is proposed in our previous work and proved as a more accurate aerodynamic model to reveal the lateraldirectional unsteady aerodynamic characteristics at high angles of attack.Both theβmodel and the quasi-steady model are used for simulating the effects of time delay on the flying qualities in high-a maneuvers.The comparison between the simulation results shows that the flying qualities are much more sensitive to the mismatch of feedback gains than the state errors caused by time delay.Then a typical adaptive controller based on the conventional dynamic derivative model and a gain-prediction compensator based onβmodel are designed to address the time delay in different maneuvers.The simulation results show that the gain-prediction compensator is much simpler and more efficient at high angles of attack.Finally,the gain-prediction compensator is combined with a linearizedβmodel reference adaptive controller to compensate the adverse effects of very large time delay,which exhibits excellent performance when addressing the extreme conditions at high angles of attack. 展开更多
关键词 Adaptive control Flying quality High angles of attack Time delay Yaw-roll coupling
原文传递
Hybrid-triggered consensus for multi-agent systems with time-delays,uncertain switching topologies, and stochastic cyber-attacks 被引量:1
4
作者 Xia Chen Li-Yuan Yin +1 位作者 Yong-Tai Liu Hao Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期131-144,共14页
We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoul... We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoulli variable is used to describe the hybrid-triggered scheme, which is introduced to alleviate the burden of the network.The mathematical model of the closed-loop control system is established by taking the influences of time-varying delayed control inputs,switching topologies, and stochastic cyber-attacks into account under the hybrid-triggered scheme.A theorem as the main result is given to make the system consistent based on the theory of Lyapunov stability and linear matrix inequality.Markov jumps with uncertain rates of transitions are applied to describe the switch of topologies.Finally, a simulation example demonstrates the feasibility of the theory in this paper. 展开更多
关键词 hybrid-triggered CONSENSUS multi-agent system time-delay and cyber-attacks switching TOPOLOGIES
原文传递
Further Analysis of Block Ciphers against Timing Attacks
5
作者 LI Wei GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1629-1632,共4页
Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks an... Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers. 展开更多
关键词 timing attacks block ciphers REDUCTION
在线阅读 下载PDF
Timing Attack Analysis on AA<sub>β</sub>Cryptosystem
6
作者 A. H. A. Ghafar M. R. K. Ariffin 《Journal of Computer and Communications》 2014年第4期1-9,共9页
Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analys... Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack discussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding. 展开更多
关键词 timing attack Side-Channel attack Public-Key CRYPTOSYSTEM AAβ Public Key CRYPTOSYSTEM
在线阅读 下载PDF
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
7
作者 Eloi De Chérisey Sylvain Guilley +1 位作者 Olivier Rioul Darshana Jayasinghe 《Journal of Information Security》 2021年第1期1-33,共33页
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh... In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study t</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">hem thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation. 展开更多
关键词 timing attacks Profiling attacks Dirichlet Priors Success Rates
在线阅读 下载PDF
A Novel Technique for Detection of Time Delay Switch Attack on Load Frequency Control
8
作者 Arman Sargolzaei Kang K. Yen +2 位作者 Mohamed N. Abdelghani Abolfazl Mehbodniya Saman Sargolzaei 《Intelligent Control and Automation》 2015年第4期205-214,共10页
In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a p... In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a power control system, unstable. Therefore, future smart grids will have to use advanced methods to provide better situational awareness of power grid states keeping smart grids reliable and safe from TDS attacks. Here, we introduce a simple method for preventing time delay switch attack on networked control systems. The method relies on an estimator that will estimate and track time delays introduced by an adversary. Knowing the maximum tolerable time delay of the plant’s optimal controller for which the plant remains stable, a time-delay detector issues an alarm signal when the estimated time delay is larger than the minimum one and directs the system to alarm state. In an alarm state, the plant operates under the control of an emergency controller that is local to the plant and remains in this mode until the networked control system state is restored. This method is an inexpensive and simple way to guarantee that an industrial control system remains stable and secure. 展开更多
关键词 Time Delay SWITCH attack Load Frequency Control DETECTION and Estimation EMERGENCY CONTROLLER
暂未订购
Robust first two rounds access driven cache timing attack on AES
9
作者 ZHAO Xin-jie WANG Tao ZHENG Yuan-yuan 《通讯和计算机(中英文版)》 2009年第6期20-25,共6页
关键词 高速缓存 多进程共享 计算机技术 加密方法
在线阅读 下载PDF
ICPS multi-target constrained comprehensive security control based on DoS attacks energy grading detection and compensation
10
作者 HAN Yinlong HAN Xiaowu 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第4期518-531,共14页
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr... Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions. 展开更多
关键词 industry cyber-physical system(ICPS) Denial-of-Service(DoS)attacks energy grading detection security event triggering mechanism time series analysis methods cone complementary linearization
在线阅读 下载PDF
云计算下智能船舶通信网络入侵攻击特征提取
11
作者 潘俊 《舰船科学技术》 北大核心 2025年第11期160-164,共5页
本文提出云计算下智能船舶通信网络入侵攻击特征提取方法。在云计算环境下,分析智能船舶通信网络信号主特征矢量,重构出通信信号的状态空间,分析重构后的输入输出关系,提取出与入侵信号关联性较高的信号,初步获取入侵攻击信号识别结果;... 本文提出云计算下智能船舶通信网络入侵攻击特征提取方法。在云计算环境下,分析智能船舶通信网络信号主特征矢量,重构出通信信号的状态空间,分析重构后的输入输出关系,提取出与入侵信号关联性较高的信号,初步获取入侵攻击信号识别结果;构建智能船舶通信网络的无向图模型,使用连续小波变换对该模型的攻击信号实施经验模态特征分解处理,建立出入侵攻击信号模型,将该信号模型的最大信息增益特征视为搜索起点,提取出入侵攻击信号特征。实验结果表明,所提方法的信号分解时频表示效果好、入侵攻击信号识别能力强,入侵攻击信号特征提取完整性强。 展开更多
关键词 云计算环境 船舶通信网络 入侵攻击信号 信号特征提取 时域状态空间
在线阅读 下载PDF
核电厂时钟系统的网络安全研究
12
作者 李江海 龙振海 李博远 《自动化仪表》 2025年第9期86-90,共5页
时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基... 时钟系统面临的网络安全威胁,不仅影响时钟系统自身,还可能波及与其连接的其他需授时系统,因此该系统是全厂网络风险中的关键节点。结合标准和案例,综述核电厂时钟系统网络安全的实践和研究现状。在时钟系统工作流程和系统架构梳理的基础上,从网络安全防护目标出发,分析列举时钟系统遭受攻击后的可能后果。假想若干典型的攻击方式作为防护的基准,并通过搭建测试平台进行模拟验证。根据试验结果和现有标准,提出网络安全防护建议。研究结果表明,至少有三类可行的入侵时钟系统并波及其他核电厂系统的网络攻击方式,因此应加强对时钟系统的网络安全防护。该研究可提升时钟系统在未来核电智能化发展中的可靠性和安全性。 展开更多
关键词 核电厂 时钟系统 网络安全 时间同步攻击 安全监测
在线阅读 下载PDF
命名数据网络中基于WEASEL算法的协同Interest包泛洪攻击检测方法
13
作者 邢光林 黄英 《中南民族大学学报(自然科学版)》 2025年第5期647-653,共7页
兴趣包泛洪攻击(IFA)是命名数据网络(NDN)中一种典型的分布式拒绝服务攻击,而协同兴趣包泛洪攻击(CIFA)在IFA的基础上改变了攻击模式并且得到了协同生产者的辅助,比IFA更具隐蔽性和危害性.借鉴时间序列分类思想,提出了一种基于WEASEL算... 兴趣包泛洪攻击(IFA)是命名数据网络(NDN)中一种典型的分布式拒绝服务攻击,而协同兴趣包泛洪攻击(CIFA)在IFA的基础上改变了攻击模式并且得到了协同生产者的辅助,比IFA更具隐蔽性和危害性.借鉴时间序列分类思想,提出了一种基于WEASEL算法的CIFA检测方法,通过对网络流量时间序列进行预测分类来检测CIFA.仿真结果表明:所提方法可以有效检测CIFA,并在误报率和漏报率方面具有良好的效果. 展开更多
关键词 命名数据网络 协同兴趣包泛洪攻击 WEASEL算法 时间序列分类
在线阅读 下载PDF
网络控制系统最新研究综述
14
作者 孙欣 刘鑫蕊 《沈阳师范大学学报(自然科学版)》 2025年第4期342-354,共13页
网络控制系统通过通信网络连接传感器、控制器和执行器,实现远程监控和智能控制,具有突破地域限制的优势,但其开放性和网络依赖性也引入了诸多问题。首先,系统分析了网络控制系统中存在的信号量化误差、数据包丢失、网络时延、带宽占用... 网络控制系统通过通信网络连接传感器、控制器和执行器,实现远程监控和智能控制,具有突破地域限制的优势,但其开放性和网络依赖性也引入了诸多问题。首先,系统分析了网络控制系统中存在的信号量化误差、数据包丢失、网络时延、带宽占用和网络安全威胁等问题;其次,在回顾网络控制系统研究成果的基础上,提出了新的控制策略,包括新型量化控制、随机丢包控制、时变时延的自触发控制、变采样周期智能调度控制、动态事件触发控制、DoS(denial of service)攻击的网络控制等;再次,归纳了相关的控制理论方法,包括随机系统法、预测控制法、时延估算与补偿、模糊反馈法、神经网络预测法;最后,提出了网络控制系统研究在未来面临的挑战。 展开更多
关键词 网络控制系统 随机丢包控制 时变时延的自触发控制 变采样周期智能调度策略 DoS攻击的网络控制 随机系统法 预测控制法
在线阅读 下载PDF
基于变幂次滑模的三维固定时间的多导弹打击比例导引律
15
作者 李健 刘鹏 +4 位作者 喻小昊 于航 李长生 史云雷 张合 《兵工学报》 北大核心 2025年第7期282-292,共11页
针对多导弹对重要目标同时攻击的问题,提出一种三维固定时间打击多弹比例导引律。建立三维空间内的导弹-目标动力学模型,为降低在三维空间内控制方法的设计难度,在三维空间内确定基准面,将导弹-目标三维空间状态向量分解平行和垂直于基... 针对多导弹对重要目标同时攻击的问题,提出一种三维固定时间打击多弹比例导引律。建立三维空间内的导弹-目标动力学模型,为降低在三维空间内控制方法的设计难度,在三维空间内确定基准面,将导弹-目标三维空间状态向量分解平行和垂直于基准面两个分量,并在上述基准面内分别设计控制方法。其中,平行于基准面基于比例导引法,设计切向和法向加速度作为控制输入,驱使导弹在期望攻击时刻之前达成剩余飞行时间一致;在垂直基准面,基于变幂次改进传统滑模控制法设计导引律,实现多导弹系统前段控制快速收敛与末段控制稳定的兼容。当两个基准面分量都能在预设攻击时间内实现一致性控制时,在三维空间内多导弹系统可完成同步攻击。通过向所设计的导引律中补偿各导弹发射时延,实现多弹系统在异步发射场景下对目标的同步攻击。仿真验证结果表明,所设计的导引律具备快速收敛、稳定性高等特点,不仅适用于同步发射场景,在异步发射时只需将各发导弹发射时延补充至输入端,即可完成攻击时间一致性控制。 展开更多
关键词 导弹 变幂次滑模控制 比例导引律 固定时间打击 三维攻击场景
在线阅读 下载PDF
一种结冰飞机失速迎角实时估计方法
16
作者 江飞鸿 刘贞报 +2 位作者 薛源 孔满昭 赵甜 《北京航空航天大学学报》 北大核心 2025年第9期2947-2954,共8页
基于某运输机带冰风洞试验数据和结冰升力特性分析,得出结冰对小迎角(AOA)范围内升力系数影响较小的结论。设计一种基于该先验知识增强的升力系数多项式在线主成分估计方法,克服由于激励不足和回归量之间共线性导致的数据矩阵病态问题... 基于某运输机带冰风洞试验数据和结冰升力特性分析,得出结冰对小迎角(AOA)范围内升力系数影响较小的结论。设计一种基于该先验知识增强的升力系数多项式在线主成分估计方法,克服由于激励不足和回归量之间共线性导致的数据矩阵病态问题。利用结冰后升力曲线斜率变化量与最大升力系数呈现的良好线性关系估计了最大升力系数和失速迎角。与现有方法相比,所设计方法具有成熟度高、实时性好、不依赖主动激励的显著优点。仿真结果表明:所设计方法估计精度可以满足迎角保护要求,具有良好的工程应用前景。 展开更多
关键词 结冰飞机 失速迎角 主成分估计 实时估计 迎角保护
原文传递
基于攻击行为链的网络安全态势预测技术
17
作者 李德军 黄金涛 +1 位作者 陈海英 吉庆兵 《信息安全与通信保密》 2025年第8期40-49,共10页
后续网络攻击预测是网络安全态势预测的关键性、典型性环节,同时也是实施难度极高的环节,其预测模型的效能直接决定着能否准确判别后续的潜在攻击行为和复合网络攻击行为,为提前部署网络防御措施和调整安全策略提供有效支撑。针对高级... 后续网络攻击预测是网络安全态势预测的关键性、典型性环节,同时也是实施难度极高的环节,其预测模型的效能直接决定着能否准确判别后续的潜在攻击行为和复合网络攻击行为,为提前部署网络防御措施和调整安全策略提供有效支撑。针对高级持续性威胁(Advanced Persistent Threat,APT)难以被提前发现的问题,提出一种基于攻击行为链的网络安全态势预测技术,构建多步攻击预测模型。采用基于对抗性战术、技术与通用知识框架(Adversarial Tactics,Techniques,and Common Knowledge Framework,ATT&CK)分析矩阵构建攻击序列集合,进一步结合半监督的时序预测和异常识别,对网络安全态势事件序列进行学习,从而提前获得网络攻击预警信息,实现从被动响应转向主动防御,有助于构建更加稳健、反应快速的安全防御体系。 展开更多
关键词 行为链 时间序列分析 攻击预测 马尔可夫决策 序列到序列模型
在线阅读 下载PDF
基于局部增强的时序数据对抗样本生成方法
18
作者 李雪莹 杨琨 +1 位作者 涂国庆 刘树波 《计算机应用》 北大核心 2025年第5期1573-1581,共9页
深度神经网络(DNN)极易遭受对抗攻击,进而引起时序数据分类任务中的安全问题。基于梯度的攻击方法可以快速地生成对抗样本,但需要不断访问模型内部信息;基于生成的攻击方法在模型训练完成之后无须访问模型内部信息,但存在隐蔽性和迁移... 深度神经网络(DNN)极易遭受对抗攻击,进而引起时序数据分类任务中的安全问题。基于梯度的攻击方法可以快速地生成对抗样本,但需要不断访问模型内部信息;基于生成的攻击方法在模型训练完成之后无须访问模型内部信息,但存在隐蔽性和迁移性较差等问题。针对以上问题,基于生成式攻击方法 AdvGAN提出一种基于局部增强的时序数据对抗样本生成方法,其中的局部增强策略将其他类别数据的信息注入原样本中,并利用增强后的数据执行灰盒攻击;而攻击模型不仅可以利用原样本信息,还能利用其他类别样本的分布信息,进而提升模型的攻击能力和迁移能力。在UCR数据集上的实验结果表明,所提方法平均0.027 s即可生成一个对抗样本;在27个数据集中,它的攻击成功率分别在18、25和13个数据集上优于快速梯度符号法(FGSM)、AdvGAN和GATN(Gradient Adversarial Transformation Network)方法;它的生成对抗样本的均方误差(MSE)分别在20和27个数据集上明显小于AdvGAN和GATN方法;在21个数据集中,它的迁移成功率分别在18和11个数据集上优于AdvGAN和FGSM方法,且在9个数据集上的迁移攻击成功率达到25%以上。可见,所提方法在保证对抗样本生成速度的同时,提高了对抗样本的隐蔽性并保持有竞争力的攻击效果。 展开更多
关键词 时序数据 深度学习 对抗样本 数据增强 灰盒攻击
在线阅读 下载PDF
面向TDMA无线传感器网络的攻击构造与入侵检测方法研究
19
作者 温敏初 梁炜 张嘉麟 《计算机工程》 北大核心 2025年第8期203-214,共12页
无线介质的开放性使得信息安全成为其应用中的挑战性问题之一。时分多址(TDMA)协议是面向工业等时延敏感应用的主要协议。针对TDMA无线传感器网络的时隙调度特征,提出空闲时隙攻击模型、重传时隙攻击模型这2种伪装攻击模型,并针对这2种... 无线介质的开放性使得信息安全成为其应用中的挑战性问题之一。时分多址(TDMA)协议是面向工业等时延敏感应用的主要协议。针对TDMA无线传感器网络的时隙调度特征,提出空闲时隙攻击模型、重传时隙攻击模型这2种伪装攻击模型,并针对这2种攻击模型,从TDMA无线传感器网络自身的传输特点出发,考虑网络传输的周期性及传输基本单元为一个时隙的特点,提出一种基于细粒度时间特征提取的高精度入侵检测方法。首先,利用数据包接收时间、超帧开始时间等信息进行时间维度上的细粒度特征提取,计算传输时隙的位置信息;然后,将位置信息输入无监督模型IF(Isolation Forest)进行训练和学习;最后,对在一个超帧周期内收到的同一个节点的序列号相同的2个数据包进行合法性判断。实验结果表明,所提2种伪装攻击能够逃避现有的入侵检测方法,而所提入侵检测方法可以有效检测出这2种伪装攻击,相较于传统方法,该方法在丢包率为30%时检测成功率提升14.5%。 展开更多
关键词 无线传感器网络 时分多址协议 伪装攻击 入侵检测 细粒度时间特征提取
在线阅读 下载PDF
虚假数据注入攻击下多四旋翼飞行器预设时间一致性跟踪控制
20
作者 何星晨 李元新 《控制与决策》 北大核心 2025年第8期2615-2624,共10页
针对遭受虚假数据注入(FDI)攻击的多四旋翼飞行器系统,提出基于命令滤波器的预设时间一致性跟踪控制算法.首先,引入命令滤波器并构建误差补偿机制,在避免“复杂度爆炸”的同时移除滤波误差对系统的影响;其次,基于系统真实状态与受损状... 针对遭受虚假数据注入(FDI)攻击的多四旋翼飞行器系统,提出基于命令滤波器的预设时间一致性跟踪控制算法.首先,引入命令滤波器并构建误差补偿机制,在避免“复杂度爆炸”的同时移除滤波误差对系统的影响;其次,基于系统真实状态与受损状态之间的联系,引入坐标变换并结合Nussbaum函数控制方法和自适应控制技术,解决FDI攻击产生的未知控制增益问题;接着,利用Lyapunov稳定性理论证明系统预设时间稳定、闭环系统中的所有信号有界以及多四旋翼飞行器的一致性跟踪误差在预设时间内收敛到原点附近的邻域内;最后,通过仿真算例验证所提出控制算法的有效性. 展开更多
关键词 多四旋翼飞行器 FDI攻击 预设时间控制 一致性跟踪控制 命令滤波器 NUSSBAUM函数
原文传递
上一页 1 2 31 下一页 到第
使用帮助 返回顶部