期刊文献+
共找到664篇文章
< 1 2 34 >
每页显示 20 50 100
A Survey on Security Control and Estimation for Cyber-Physical Systems Under Cyber-Attacks:Advances,Challenges and Future Directions
1
作者 Haoyang YU Zidong WANG +1 位作者 Lei ZOU Yezheng WANG 《Artificial Intelligence Science and Engineering》 2025年第1期1-16,共16页
Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widel... Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widely utilized across various domains,such as smart grids,smart healthcare systems,smart vehicles,and smart manufacturing,among others.Due to their unique spatial distribution,CPSs are highly vulnerable to cyber-attacks,which may result in severe performance degradation and even system instability.Consequently,the security concerns of CPSs have attracted significant attention in recent years.In this paper,a comprehensive survey on the security issues of CPSs under cyber-attacks is provided.Firstly,mathematical descriptions of various types of cyberattacks are introduced in detail.Secondly,two types of secure estimation and control processing schemes,including robust methods and active methods,are reviewed.Thirdly,research findings related to secure control and estimation problems for different types of CPSs are summarized.Finally,the survey is concluded by outlining the challenges and suggesting potential research directions for the future. 展开更多
关键词 cyber-physical systems cyber-attacks robust methods active methods secure estimation secure control
在线阅读 下载PDF
Cyber-Attacks With Resource Constraints on Discrete Event Systems Under Supervisory Control
2
作者 Zhaoyang He Naiqi Wu +1 位作者 Rong Su Zhiwu Li 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期585-595,共11页
With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resourc... With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints(the total resource consumption of the attacks is not greater than a given initial resource of the attacker)to mislead a discrete event system under supervisory control to reach unsafe states.We consider that the attacker can implement two types of attacks:One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor.Each attack has its corresponding resource consumption and remains covert.To solve this problem,we first introduce a notion of combined-attackability to determine whether a closedloop system may reach an unsafe state after receiving attacks with resource constraints.We develop an algorithm to construct a corrupted supervisor under attacks,provide a verification method for combined-attackability in polynomial time based on a plant,a corrupted supervisor,and an attacker's initial resource,and propose a corresponding attack synthesis algorithm.The effectiveness of the proposed method is illustrated by an example. 展开更多
关键词 cyber-attack cyber-physical system discrete event system supervisory control
在线阅读 下载PDF
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
3
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
在线阅读 下载PDF
A Joint Estimation Method of SOC and SOH for Lithium-ion Battery Considering Cyber-Attacks Based on GA-BP
4
作者 Tianqing Yuan Na Li +1 位作者 Hao Sun Sen Tan 《Computers, Materials & Continua》 SCIE EI 2024年第9期4497-4512,共16页
To improve the estimation accuracy of state of charge(SOC)and state of health(SOH)for lithium-ion batteries,in this paper,a joint estimation method of SOC and SOH at charging cut-off voltage based on genetic algorithm... To improve the estimation accuracy of state of charge(SOC)and state of health(SOH)for lithium-ion batteries,in this paper,a joint estimation method of SOC and SOH at charging cut-off voltage based on genetic algorithm(GA)combined with back propagation(BP)neural network is proposed,the research addresses the issue of data manipulation resulting fromcyber-attacks.Firstly,anomalous data stemming fromcyber-attacks are identified and eliminated using the isolated forest algorithm,followed by data restoration.Secondly,the incremental capacity(IC)curve is derived fromthe restored data using theKalman filtering algorithm,with the peak of the ICcurve(ICP)and its corresponding voltage serving as the health factor(HF).Thirdly,the GA-BP neural network is applied to map the relationship between HF,constant current charging time,and SOH,facilitating the estimation of SOH based on HF.Finally,SOC estimation at the charging cut-off voltage is calculated by inputting the SOH estimation value into the trained model to determine the constant current charging time,and by updating the maximum available capacity.Experiments show that the root mean squared error of the joint estimation results does not exceed 1%,which proves that the proposed method can estimate the SOC and SOH accurately and stably even in the presence of false data injection attacks. 展开更多
关键词 Lithium-ion batteries state of charge state of health cyber-attacks genetic algorithm back propagation neural network
在线阅读 下载PDF
Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles
5
作者 Changyin Dong Yujia Chen +5 位作者 Hao Wang Leizhen Wang Ye Li Daiheng Ni De Zhao Xuedong Hua 《Digital Communications and Networks》 CSCD 2024年第5期1480-1492,共13页
Connected automated vehicles(CAVs)rely heavily on intelligent algorithms and remote sensors.If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication,... Connected automated vehicles(CAVs)rely heavily on intelligent algorithms and remote sensors.If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication,it can cause significant damage to CAVs or passengers.The primary objective of this study is to model cyberattacked traffic flow and evaluate the impacts of cyber-attack on the traffic system filled with CAVs in a connected environment.Based on the analysis on environmental perception system and possible cyber-attacks on sensors,a novel lane-changing model for CAVs is proposed and multiple traffic scenarios for cyber-attacks are designed.The impact of the proportion of cyber-attacked vehicles and the severity of the cyber-attack on the lanechanging process is then quantitatively analyzed.The evaluation indexes include spatio-temporal evolution of average speed,spatial distribution of selected lane-changing gaps,lane-changing rate distribution,lane-changing preparation search time,efficiency and safety.Finally,the numerical simulation results show that the freeway traffic near an off-ramp is more sensitive to the proportion of cyber-attacked vehicles than to the severity of the cyber-attack.Also,when the traffic system is under cyber-attack,more unsafe back gaps are chosen for lane-changing,especially in the center lane.Therefore,more lane-changing maneuvers are concentrated on approaching the off-ramp,causing severe congestions and potential rear-end collisions.In addition,as the number of cyber-attacked vehicles and the severity of cyber-attacks increase,the road capacity and safety level will rapidly decrease.The results of this study can provide a theoretical basis for accident avoidance and efficiency improvement for the design of CAVs and management of automated highway systems. 展开更多
关键词 cyber-attack Lane change Connected automated vehicle Remote access Traffic flow
在线阅读 下载PDF
Hybrid-triggered consensus for multi-agent systems with time-delays,uncertain switching topologies, and stochastic cyber-attacks 被引量:1
6
作者 Xia Chen Li-Yuan Yin +1 位作者 Yong-Tai Liu Hao Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期131-144,共14页
We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoul... We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoulli variable is used to describe the hybrid-triggered scheme, which is introduced to alleviate the burden of the network.The mathematical model of the closed-loop control system is established by taking the influences of time-varying delayed control inputs,switching topologies, and stochastic cyber-attacks into account under the hybrid-triggered scheme.A theorem as the main result is given to make the system consistent based on the theory of Lyapunov stability and linear matrix inequality.Markov jumps with uncertain rates of transitions are applied to describe the switch of topologies.Finally, a simulation example demonstrates the feasibility of the theory in this paper. 展开更多
关键词 hybrid-triggered CONSENSUS multi-agent system time-delay and cyber-attacks switching TOPOLOGIES
原文传递
Group consensus of multi-agent systems subjected to cyber-attacks 被引量:1
7
作者 Hai-Yun Gao Ai-Hua Hu +1 位作者 Wan-Qiang Shen Zheng-Xian Jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第6期91-98,共8页
In this paper, we investigate the group consensus for leaderless multi-agent systems. The group consensus protocol based on the position information from neighboring agents is designed. The network may be subjected to... In this paper, we investigate the group consensus for leaderless multi-agent systems. The group consensus protocol based on the position information from neighboring agents is designed. The network may be subjected to frequent cyberattacks, which is close to an actual case. The cyber-attacks are assumed to be recoverable. By utilizing algebraic graph theory, linear matrix inequality(LMI) and Lyapunov stability theory, the multi-agent systems can achieve group consensus under the proposed control protocol. The sufficient conditions of the group consensus for the multi-agent networks subjected to cyber-attacks are given. Furthermore, the results are extended to the consensus issue of multiple subgroups with cyber-attacks. Numerical simulations are performed to demonstrate the effectiveness of the theoretical results. 展开更多
关键词 MULTI-AGENT systems group CONSENSUS cyber-attacks multiple SUBGROUPS
原文传递
Aperiodic Sampled-Data Control of Distributed Networked Control Systems Under Stochastic Cyber-Attacks 被引量:1
8
作者 Kritika Bansal Pankaj Mukhija 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第4期1064-1073,共10页
This paper examines the stabilization problem of a distributed networked control system under the effect of cyberattacks by employing a hybrid aperiodic triggering mechanism.The cyber-attack considered in the paper is... This paper examines the stabilization problem of a distributed networked control system under the effect of cyberattacks by employing a hybrid aperiodic triggering mechanism.The cyber-attack considered in the paper is a stochastic deception attack at the sensor-controller end. The probability of the occurrence of attack on a subsystem is represented using a random variable. A decentralized hybrid sampled-data strategy is introduced to save energy consumption and reduce the transmission load of the network. In the proposed decentralized strategy, each subsystem can decide independently whether its state should be transmitted to the controller or not. The scheme of the hybrid triggering mechanism for each subsystem composed of two stages: In the first stage, the next sampling instant is computed using a self-triggering strategy. Subsequently, in the second stage, an event-triggering condition is checked at these sampling instants and the control signal is computed only if the event-triggering condition is violated. The self-triggering condition used in the first stage is dependent on the selection of eventtriggering condition of the second stage. Finally, a comparison of the proposed approach with other triggering mechanisms existing in the literature is presented in terms of the sampling instants,transmission frequency and performance measures through simulation examples. 展开更多
关键词 cyber-attack distributed networked control system event-triggered control hybrid aperiodic sampled-data control selftriggered control
在线阅读 下载PDF
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network 被引量:1
9
作者 Akinjide A. Akinola Adeyemi A. Adekoya +1 位作者 Ayoade O. Kuye Abiodun Ayodeji 《Journal of Information Security》 2019年第3期103-116,共14页
This paper presents the attack tree modeling technique of quantifying cyber-attacks on a hypothetical school network system. Attack trees are constructed by decomposing the path in the network system where attacks are... This paper presents the attack tree modeling technique of quantifying cyber-attacks on a hypothetical school network system. Attack trees are constructed by decomposing the path in the network system where attacks are plausible. Considered for the network system are two possible network attack paths. One network path represents an attack through the Internet, and the other represents an attack through the Wireless Access Points (WAPs) in the school network. The probabilities of success of the events, that is, 1) the attack payoff, and 2) the commitment of the attacker to infiltrate the network are estimated for the leaf nodes. These are used to calculate the Returns on Attacks (ROAs) at the Root Nodes. For Phase I, the “As Is” network, the ROA values for both attack paths, are higher than 7 (8.00 and 9.35 respectively), which are high values and unacceptable operationally. In Phase II, countermeasures are implemented, and the two attack trees reevaluated. The probabilities of success of the events, the attack payoff and the commitment of the attacker are then re-estimated. Also, the Returns on Attacks (ROAs) for the Root Nodes are re-assessed after executing the countermeasures. For one attack tree, the ROA value of the Root Node was reduced to 4.83 from 8.0, while, for the other attack tree, the ROA value of the Root Node changed to 3.30 from 9.35. ROA values of 4.83 and 3.30 are acceptable as they fall within the medium value range. The efficacy of this method whereby, attack trees are deployed to mitigate computer network risks, as well as using it to assess the vulnerability of computer networks is quantitatively substantiated. 展开更多
关键词 cyber-attack Quantitative VULNERABILITY Assessment ATTACK Trees RETURN on ATTACK COUNTERMEASURES
暂未订购
Data Mining Based Cyber-Attack Detection
10
作者 TIANFIELD Huaglory 《系统仿真技术》 2017年第2期90-104,共15页
Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber secur... Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber security situational awareness. Then, the process of data mining based cyber-attack detection is discussed. Next,a multi-loop learning architecture is presented for data mining based cyber-attack detection. Finally,common data mining techniques for cyber-attack detection are discussed. 展开更多
关键词 big data analytics cyber-attack detection cyber security cyber situational awareness data mining pattern mining machine learning
在线阅读 下载PDF
Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks
11
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期530-547,共18页
The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vu... The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vulnerabilities in the nation’s infrastructure have become more pronounced. Cyber-attacks on critical infrastructure, such as power grids, transportation networks, and financial systems, pose a significant risk to national security and public safety. These attacks can disrupt essential services, cause economic losses, and potentially have severe consequences for the well-being of individuals and communities. The rise of cyber-terrorism is also a concern. Cyber-terrorists can exploit vulnerabilities in cyberspace to compromise infrastructure systems, causing chaos and panic among the population. The potential for destructive attacks on critical infrastructure is a pressing issue requiring constant attention and proactive measures. 展开更多
关键词 Critical Infrastructure cyber-attacks CYBERSECURITY CYBERSPACE Cyber-Terrorism
在线阅读 下载PDF
An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks 被引量:3
12
作者 Yumei Li Holger Voos +1 位作者 Mohamed Darouach Changchun Hua 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第3期258-266,共9页
In order to compromise a target control system successfully, hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system. However, the problem of detecting ... In order to compromise a target control system successfully, hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system. However, the problem of detecting multiple cyber-attacks has been hardly investigated so far. Therefore, this paper deals with the detection of multiple stochastic cyber-attacks aiming at multiple communication channels of a control system. Our goal is to design a detector for the control system under multiple cyberattacks. Based on frequency-domain transformation technique and auxiliary detection tools, an algebraic detection approach is proposed. By applying the presented approach, residual information caused by different attacks is obtained respectively and anomalies in the control system are detected. Sufficient and necessary conditions guaranteeing the detectability of the multiple stochastic cyber-attacks are obtained. The presented detection approach is simple and straightforward. Finally, two simulation examples are provided, and the simulation results show that the detection approach is effective and feasible. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGEBRA Communication channels (information theory) Control systems CRIME Frequency domain analysis Personal computing Stochastic systems
在线阅读 下载PDF
Adaptive Early Warning Method of Cascading Failures Caused by Coordinated Cyber-Attacks
13
作者 Yufei Wang June Li +1 位作者 Jian Qiu Yangrong Chen 《CSEE Journal of Power and Energy Systems》 2025年第1期406-423,共18页
In order to accurately receive early warning of the cascading failures caused by coordinated cyber-attacks(CFCC)in grid cyber-physical systems(GCPS),an adaptive early warning method of CFCC is proposed.First,the evolu... In order to accurately receive early warning of the cascading failures caused by coordinated cyber-attacks(CFCC)in grid cyber-physical systems(GCPS),an adaptive early warning method of CFCC is proposed.First,the evolutionary mechanism of CFCC is analyzed from the attackers'view,the CFCC mathematical model is established,and the transition processes of GCPS running states under the influence of CFCC staged failures are discussed.Then,the mathematical model of the adaptive early warning method is established.Further,the mathematical model of the adaptive early warning method is mapped as an adaptive control process with tolerating staged failures damage,and the solving process is presented to infer the CFCC and its next evolution trend.A decision-making idea for the optimal active defense scheme is proposed considering the costs and gains of various defense measures.Finally,to verify the effectiveness of the adaptive early warning method,the warning and defense processes of a typical CFCC are simulated in a GCPS experimental system based on CEPRI-36 BUS. 展开更多
关键词 Adaptive control theory cascading failures coordinated cyber-attacks early warning grid cyber-physical systems
原文传递
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
14
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) multi-class Internet of Things(IoT)
在线阅读 下载PDF
基于攻击者视角的综合能源系统网络攻击策略 被引量:1
15
作者 张赟宁 涂迅 +2 位作者 张磊 郭钟仁 肖嵩航 《电网技术》 北大核心 2025年第7期3009-3019,I0103-I0105,共14页
随着大量分布式能源的并网,能源互联网面临严重的网络攻击威胁。攻击者可利用通信层的漏洞,集成庞大的分布式僵尸网络。现有的网络攻击手段难以适配具有随机空间分布特性的僵尸网络,并且多侧重攻击的破坏性而忽视了对攻击隐蔽性的研究... 随着大量分布式能源的并网,能源互联网面临严重的网络攻击威胁。攻击者可利用通信层的漏洞,集成庞大的分布式僵尸网络。现有的网络攻击手段难以适配具有随机空间分布特性的僵尸网络,并且多侧重攻击的破坏性而忽视了对攻击隐蔽性的研究。该文提出了从分布式僵尸网络实现对综合能源系统经济效益破坏的新型攻击方法。首先,建立基于僵尸节点的重要对象拒绝服务(denial of service,DoS)攻击模型,通过信息收集判断邻域中重要程度最高的节点,并推导出在有限攻击资源下影响DoS攻击效果的显式因素。其次,提出僵尸节点间的共谋虚假数据注入(false data injection,FDI)攻击策略,并分析不同的FDI攻击实现形式,旨在寻找对能源系统经济性最具破坏性的攻击模式。考虑典型的恶意节点检测机制,制定了僵尸节点自调节过程,使得攻击的实现对防御措施具有鲁棒性。最后,通过IEEE39-32节点的热电耦合系统拓扑仿真验证了所提攻击策略的有效性。 展开更多
关键词 综合能源系统 经济效益 分布式僵尸网络 网络攻击
原文传递
基于Gossip的综合能源系统分布式异步弹性经济调度策略
16
作者 张赟宁 李鹏飞 +2 位作者 付文龙 张磊 高以恒 《电网技术》 北大核心 2025年第11期4842-4853,I0140-I0142,共15页
在综合能源系统(Integrated energy systems,IESs)经济调度问题的分布式优化框架中,节点协同机制的拓扑设计必然受到信息交互方式的约束。现有研究主要分为两类通信协议、同步通信和异步通信。然而,同步通信需要满足时序一致性,等待各... 在综合能源系统(Integrated energy systems,IESs)经济调度问题的分布式优化框架中,节点协同机制的拓扑设计必然受到信息交互方式的约束。现有研究主要分为两类通信协议、同步通信和异步通信。然而,同步通信需要满足时序一致性,等待各通信者之间达成同步响应或确认后才能执行后续操作,这在大规模网络环境中很难实现。该文首先基于Gossip算法的异步特点,提出了一种基于Gossip的异步通信分布式经济调度算法。利用矩阵扰动理论和特征值定理,严格证明了算法的收敛性。进一步地,考虑了两种典型的网络攻击模型,拒绝服务攻击(denial of service,DoS)和虚假数据攻击(false data injection,FDI),设计了一种弹性安全策略以缓解网络攻击对最优经济调度的影响。最后,基于IEEE39-32节点的IES进行算例分析,结合不同的调度场景、攻击者的表现以及同步通信方式的对比,从多个角度验证了所提策略在通信方式和网络安全方面的有效性和优越性。 展开更多
关键词 综合能源系统 经济调度 一致性算法 分布式优化 异步通信 Gossip算法 网络攻击
原文传递
热网FDI攻击的非侵入式检测方法
17
作者 刘鑫蕊 张修宇 +2 位作者 吴泽群 王睿 孙秋野 《控制理论与应用》 北大核心 2025年第7期1265-1274,共10页
针对热网易受网络攻击影响且惯性大的问题,为提高热网攻击检测的快速性和准确性,本文首次提出了一种能够放大攻击带来的状态量偏差的非侵入式在线检测方法,该方法首先将居住人热行为归纳为黑盒模型,将房屋和散热器归纳为白盒模型,通过... 针对热网易受网络攻击影响且惯性大的问题,为提高热网攻击检测的快速性和准确性,本文首次提出了一种能够放大攻击带来的状态量偏差的非侵入式在线检测方法,该方法首先将居住人热行为归纳为黑盒模型,将房屋和散热器归纳为白盒模型,通过白盒与黑盒组成的灰盒模型来计算室内热平衡状态,其次以室内温度为输入/散失热量计算的中间量,放大攻击带来的系统状态量偏差,最后通过多重匹配状态预测方法进行攻击检测.为验证所提方法的有效性,采用巴厘岛热网模型进行仿真实验,与传统的检测方法相比,本文所提方法可以有效放大攻击带来的状态量偏差,检测速度和检测率均更高. 展开更多
关键词 FDI 网络攻击 非侵入式检测 灰盒模型 热网
在线阅读 下载PDF
Cyber-attack Detection Strategy Based on Distribution System State Estimation 被引量:3
18
作者 Huan Long Zhi Wu +3 位作者 Chen Fang Wei Gu Xinchi Wei Huiyu Zhan 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第4期669-678,共10页
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system.This paper proposes a cyber-attack detection strategy based on distribution system s... Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system.This paper proposes a cyber-attack detection strategy based on distribution system state estimation(DSSE).The uncertainty of the distribution network is represented by the interval of each state variable.A three-phase interval DSSE model is proposed to construct the interval of each state variable.An improved iterative algorithm(IIA)is developed to solve the interval DSSE model and to obtain the lower and upper bounds of the interval.A cyber-attack is detected when the value of the state variable estimated by the traditional DSSE is out of the corresponding interval determined by the interval DSSE.To validate the proposed cyber-attack detection strategy,the basic principle of the cyber-attack is studied,and its general model is formulated.The proposed cyber-attack model and detection strategy are conducted on the IEEE 33-bus and 123-bus systems.Comparative experiments of the proposed IIA,Monte Carlo simulation algorithm,and interval Gauss elimination algorithm prove the validation of the proposed method. 展开更多
关键词 cyber-attack detection distribution network interval state estimation distribution system state estimation cyber-attack model
原文传递
基于多粒度统计特征的僵尸网络流量智能检测方法
19
作者 张海霞 黄克振 +3 位作者 连一峰 赵昌志 袁云静 彭媛媛 《计算机科学》 北大核心 2025年第11期373-381,共9页
随着信息技术的飞速发展,僵尸网络攻击已成为具有高危害程度的网络安全威胁,及时有效的僵尸网络检测和处置可以遏制攻击者利用僵尸网络发起其他衍生攻击。当前已有的僵尸网络检测方法存在因特征选取视角单一而易被攻击者绕过、误报率高... 随着信息技术的飞速发展,僵尸网络攻击已成为具有高危害程度的网络安全威胁,及时有效的僵尸网络检测和处置可以遏制攻击者利用僵尸网络发起其他衍生攻击。当前已有的僵尸网络检测方法存在因特征选取视角单一而易被攻击者绕过、误报率高等局限性。对此,提出一种基于多粒度统计特征的僵尸网络流量智能检测方法,该方法提取待检测网络流量的局部粗粒度统计特征和面向源IP的全局细粒度画像,进而利用具有多头注意力机制的长短期记忆网络挖掘良性网络流量与僵尸网络流量在两类统计特征方面存在的差异性,最终基于这些差异性识别僵尸网络流量。在CTU-13和ISCX僵尸网络数据集上进行了对比实验,该方法在准确率、精确率、召回率和F1分数均可达到99%以上。 展开更多
关键词 网络攻击 僵尸网络 统计特征 注意力机制 长短期记忆网络
在线阅读 下载PDF
具有网络攻击防御力的DG变流器设计及其分布式控制
20
作者 韦永军 覃秋密 《电源学报》 北大核心 2025年第5期112-120,共9页
为了降低控制系统对通信网络的依赖性,直流微电网DC-MG(DC microgrid)通常采用分布式控制架构,然而由于缺乏全局信息,这种控制方式极易受到网络攻击,使得DC-MG存在较大安全隐患。网络攻击的种类较多,其中虚假数据注入攻击FDIA(false dat... 为了降低控制系统对通信网络的依赖性,直流微电网DC-MG(DC microgrid)通常采用分布式控制架构,然而由于缺乏全局信息,这种控制方式极易受到网络攻击,使得DC-MG存在较大安全隐患。网络攻击的种类较多,其中虚假数据注入攻击FDIA(false data injection attack)占比最高,其危害性也最大。基于此,针对FDIA造成DC-MG运行中断等不稳定问题,提出了1种基于前馈神经网络FNN(feedforward neural network)的DC-MG网络攻击检测与控制方法。该方法首先研究了FDIA造成控制系统不稳定的影响机理,建立了FDIA不稳定影响的数学模型;然后,利用FNN构建了智能估计器来监测DC-MG中分布式电源变换器的输出电流,并根据估计器的输出计算出FDIA的错误数据值;接着,针对错误数据的计算值,引入基于PI控制器的参考跟踪方法,以减少被攻击转换器中的错误数据,此外,所提方法还可消除所有高域不平衡攻击;最后,分别在MATLAB/Simulink和OPAL-RT环境下对所提方法进行了仿真和实验验证,仿真实验结果验证了所提方法的有效性。 展开更多
关键词 直流微网 虚假数据注入攻击 前馈神经网络 网络攻击
在线阅读 下载PDF
上一页 1 2 34 下一页 到第
使用帮助 返回顶部