期刊文献+
共找到1,162篇文章
< 1 2 59 >
每页显示 20 50 100
Switching-Like Sliding Mode Security Control Against DoS Attacks:A Novel Attack-Related Adaptive Event-Triggered Scheme
1
作者 Jiancun Wu Zhiru Cao +1 位作者 Engang Tian Chen Peng 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期137-148,共12页
In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication r... In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication resources more effectively,a novel adaptive event-triggered(AET) mechanism is introduced,whose triggering coefficient can be adaptively adjusted according to the evolution trend of system states.Differing from existing event-triggered(ET) mechanisms,the proposed one demonstrates exceptional relevance and flexibility.It is closely related to attack probability,and its triggering coefficient dynamically adjusts depending on the presence or absence of an attack.To leverage attacker information more effectively,a switching-like sliding mode security controller is designed,which can autonomously select different controller gains based on the sliding function representing the attack situation.Sufficient conditions for the existence of the switching-like sliding mode secure controller are presented to ensure the stochastic stability of the system and the reachability of the sliding surface.Compared with existing time-invariant control strategies within the triggered interval,more resilient defense performance can be expected since the correlation with attack information is established in both the proposed AET scheme and the control strategy.Finally,a simulation example is conducted to verify the effectiveness and feasibility of the proposed security control method. 展开更多
关键词 Adaptive event-triggered(AET)mechanism denial of service(dos)attacks networked control systems(NCSs) sliding mode control(SMC)
在线阅读 下载PDF
Improved Event-Triggered Adaptive Neural Network Control for Multi-agent Systems Under Denial-of-Service Attacks 被引量:2
2
作者 Huiyan ZHANG Yu HUANG +1 位作者 Ning ZHAO Peng SHI 《Artificial Intelligence Science and Engineering》 2025年第2期122-133,共12页
This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method... This paper addresses the consensus problem of nonlinear multi-agent systems subject to external disturbances and uncertainties under denial-ofservice(DoS)attacks.Firstly,an observer-based state feedback control method is employed to achieve secure control by estimating the system's state in real time.Secondly,by combining a memory-based adaptive eventtriggered mechanism with neural networks,the paper aims to approximate the nonlinear terms in the networked system and efficiently conserve system resources.Finally,based on a two-degree-of-freedom model of a vehicle affected by crosswinds,this paper constructs a multi-unmanned ground vehicle(Multi-UGV)system to validate the effectiveness of the proposed method.Simulation results show that the proposed control strategy can effectively handle external disturbances such as crosswinds in practical applications,ensuring the stability and reliable operation of the Multi-UGV system. 展开更多
关键词 multi-agent systems neural network dos attacks memory-based adaptive event-triggered mechanism
在线阅读 下载PDF
Resilient Nonlinear MPC With a Dynamic Event-Triggered Strategy Under DoS Attacks 被引量:1
3
作者 Shuang Shen Runqi Chai +1 位作者 Yuanqing Xia Senchun Chai 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期642-644,共3页
Dear Editor,This letter deals with the stabilization of a resilient model predictive control(MPC)algorithm with a dynamic event-triggered mechanism subject to Denial-of-Service(Do S)attacks.Different from previous wor... Dear Editor,This letter deals with the stabilization of a resilient model predictive control(MPC)algorithm with a dynamic event-triggered mechanism subject to Denial-of-Service(Do S)attacks.Different from previous works,this letter is based on the designed threshold function to dynamically trigger and gives the upper bound conditions for intersampling intervals with attack and attack-free scenarios to converge. 展开更多
关键词 dynamic event triggered threshold function resilient MPC denial service attacks intersampling intervals STABILIZATION upper bound conditions resilient model predictive
在线阅读 下载PDF
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
4
作者 Chunhui Li Xiaoying Wang +2 位作者 Qingjie Zhang Jiaye Liang Aijing Zhang 《Computers, Materials & Continua》 SCIE EI 2025年第1期645-674,共30页
Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convol... Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neural Networks(CNN)combined with LSTM,and so on are built by simple stacking,which has the problems of feature loss,low efficiency,and low accuracy.Therefore,this paper proposes an autonomous detectionmodel for Distributed Denial of Service attacks,Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention(MSCNN-BiGRU-SHA),which is based on a Multistrategy Integrated Zebra Optimization Algorithm(MI-ZOA).The model undergoes training and testing with the CICDDoS2019 dataset,and its performance is evaluated on a new GINKS2023 dataset.The hyperparameters for Conv_filter and GRU_unit are optimized using the Multi-strategy Integrated Zebra Optimization Algorithm(MIZOA).The experimental results show that the test accuracy of the MSCNN-BiGRU-SHA model based on the MIZOA proposed in this paper is as high as 0.9971 in the CICDDoS 2019 dataset.The evaluation accuracy of the new dataset GINKS2023 created in this paper is 0.9386.Compared to the MSCNN-BiGRU-SHA model based on the Zebra Optimization Algorithm(ZOA),the detection accuracy on the GINKS2023 dataset has improved by 5.81%,precisionhas increasedby 1.35%,the recallhas improvedby 9%,and theF1scorehas increasedby 5.55%.Compared to the MSCNN-BiGRU-SHA models developed using Grid Search,Random Search,and Bayesian Optimization,the MSCNN-BiGRU-SHA model optimized with the MI-ZOA exhibits better performance in terms of accuracy,precision,recall,and F1 score. 展开更多
关键词 Distributed denial of service attack intrusion detection deep learning zebra optimization algorithm multi-strategy integrated zebra optimization algorithm
在线阅读 下载PDF
DoS Attack Schedules for Remote State Estimation in CPSs With Two-hop Relay Networks Under Round-Robin Protocol
5
作者 Shuo Zhang Lei Miao Xudong Zhao 《IEEE/CAA Journal of Automatica Sinica》 2025年第7期1513-1515,共3页
Dear Editor,This letter investigates the optimal denial-of-service(DoS)attack scheduling targeting state estimation in cyber-Physical systems(CPSs)with the two-hop multi-channel network.CPSs are designed to achieve ef... Dear Editor,This letter investigates the optimal denial-of-service(DoS)attack scheduling targeting state estimation in cyber-Physical systems(CPSs)with the two-hop multi-channel network.CPSs are designed to achieve efficient,secure and adaptive operation by embedding intelligent and autonomous decision-making capabilities in the physical world.As a key component of the CPSs,the wireless network is vulnerable to various malicious attacks due to its openness[1].DoS attack is one of the most common attacks,characterized of simple execution and significant destructiveness[2].To mitigate the economic losses and environmental damage caused by DoS attacks,it is crucial to model and investigate data transmissions in CPSs. 展开更多
关键词 round robin protocol malicious attacks denial service attack two hop relay networks state estimation dos attack wireless network cyber physical systems
在线阅读 下载PDF
Event-Based Networked Predictive Control of Cyber-Physical Systems with Delays and DoS Attacks
6
作者 Wencheng Luo Pingli Lu +1 位作者 Changkun Du Haikuo Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第6期1295-1297,共3页
Dear Editor,This letter studies the stabilization control issue of cyber-physical systems with time-varying delays and aperiodic denial-of-service(DoS)attacks.To address the calculation overload issue caused by networ... Dear Editor,This letter studies the stabilization control issue of cyber-physical systems with time-varying delays and aperiodic denial-of-service(DoS)attacks.To address the calculation overload issue caused by networked predictive control(NPC)approach,an event-based NPC method is proposed.Within the proposed method,the negative effects of time-varying delays and DoS attacks on system performance are compensated.Then,sufficient and necessary conditions are derived to ensure the stability of the closed-loop system.In the end,simulation results are provided to demonstrate the validity of presented method. 展开更多
关键词 cyber physical systems dos attacks necessary conditions derived denial service attacks time varying delays event based networked predictive control stabilization control calculation overload
在线阅读 下载PDF
Impulsive Consensus of MASs With Input Saturation and DoS Attacks
7
作者 Xuyang Wang Dengxiu Yu Xiaodi Li 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期414-424,共11页
This paper investigates the secure impulsive consensus of Lipschitz-type nonlinear multi-agent systems(MASs) with input saturation. According to the coupling of input saturation and denial of service(DoS) attacks, imp... This paper investigates the secure impulsive consensus of Lipschitz-type nonlinear multi-agent systems(MASs) with input saturation. According to the coupling of input saturation and denial of service(DoS) attacks, impulsive control for MASs becomes extremely challenging. Considering general DoS attacks,this paper provides the sufficient conditions for the almost sure consensus of the MASs with input saturation, where the error system can achieve almost sure local exponential stability.Through linear matrix inequalities(LMIs), the relation between the trajectory boundary and DoS attacks is characterized, and the trajectory boundary is estimated. Furthermore, an optimization method of the domain of attraction is proposed to maximize the size. And a non-conservative and practical boundary is proposed to characterize the effect of DoS attacks on MASs. Finally, considering a multi-agent system with typical Chua's circuit dynamic model, an example is provided to illustrate the theorems' correctness. 展开更多
关键词 Almost sure consensus denial of service(dos)attacks impulsive control input saturation
在线阅读 下载PDF
Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks:A Fuzzy Multi-Criteria Decision-Making Approach
8
作者 Ahmed Abbas Jasim Al-Hchaimi Yousif Raad Muhsen +4 位作者 Wisam Hazim Gwad Entisar Soliman Alkayal Riyadh Rahef Nuiaa Al Ogaili Zaid Abdi Alkareem Alyasseri Alhamzah Alnoor 《Computer Modeling in Engineering & Sciences》 2025年第3期2661-2689,共29页
The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criter... The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an alternative.In this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios.Consequently,an MCDM approach is essential to address these emerging challenges.While the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the ambiguity.The results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of 0.1946.In contrast,the Hop count is identified as the least significant criterion,with a weighted score of 0.1090.The remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring 0.1472.In terms of ranking,SvN-FDOSM has two approaches:individual and group.Both the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under F-DoSA.The sensitivity analysis provides a high stability in ranking among all 10 scenarios.This approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC. 展开更多
关键词 NoC-based MPSoC security flooding dos attack MCDM FdosM FWZIC fuzzy set
在线阅读 下载PDF
Distributed State and Fault Estimation for Cyber-Physical Systems Under DoS Attacks
9
作者 Limei Liang Rong Su Haotian Xu 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期261-263,共3页
Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded... Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded computing, communication and related hardware technologies, CPSs have attracted extensive attention and have been widely used in power system, traffic network, refrigeration system and other fields. 展开更多
关键词 cyber physical systems refrigeration system traffic network dos attacks distributed state fault estimation embedded computing power system distributed state estimation
在线阅读 下载PDF
Detecting and Mitigating Distributed Denial of Service Attacks in Software-Defined Networking
10
作者 Abdullah M.Alnajim Faisal Mohammed Alotaibi Sheroz Khan 《Computers, Materials & Continua》 2025年第6期4515-4535,共21页
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late... Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment. 展开更多
关键词 Software-defined networking(SDN) distributed denial of service(Ddos)attack sampling Flow(sFlow) OpenFlow OpenDaylight controller
在线阅读 下载PDF
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System 被引量:1
11
作者 Emmanuel S. Kolawole Penrose S. Cofie +4 位作者 John H. Fuller Cajetan M. Akujuobi Emmanuel A. Dada Justin F. Foreman Pamela H. Obiomon 《Communications and Network》 2024年第3期108-134,共27页
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati... The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene. 展开更多
关键词 Smart Grid System Distributed Denial of service (Ddos) attack Intrusion Detection and Prevention Systems DETECTION Mitigation and Stealthwatch
在线阅读 下载PDF
Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT
12
作者 Prasanalakshmi Balaji Sangita Babu +4 位作者 Maode Ma Zhaoxi Fang Syarifah Bahiyah Rahayu Mariyam Aysha Bivi Mahaveerakannan Renganathan 《Computers, Materials & Continua》 2025年第9期5831-5858,共28页
The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptibl... The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptible to security threats.One significant risk to cloud networks is Distributed Denial-of-Service(DoS)attacks,where attackers aim to overcome a target system with excessive data and requests.Among these,low-rate DoS(LR-DoS)attacks present a particular challenge to detection.By sending bursts of attacks at irregular intervals,LR-DoS significantly degrades the targeted system’s Quality of Service(QoS).The low-rate nature of these attacks confuses their detection,as they frequently trigger congestion control mechanisms,leading to significant instability in IoT systems.Therefore,to detect the LR-DoS attack,an innovative deep-learning model has been developed for this research work.The standard dataset is utilized to collect the required data.Further,the deep feature extraction process is executed using the Residual Autoencoder with Sparse Attention(ResAE-SA),which helps derive the significant feature required for detection.Ultimately,the Adaptive Dense Recurrent Neural Network(ADRNN)is implemented to detect LR-DoS effectively.To enhance the detection process,the parameters present in the ADRNN are optimized using the Renovated Random Attribute-based Fennec Fox Optimization(RRA-FFA).The proposed optimization reduces the False Discovery Rate and False Positive Rate,maximizing the Matthews Correlation Coefficient from 23,70.8,76.2,84.28 in Dataset 1 and 70.28,73.8,74.1,82.6 in Dataset 2 on EPC-ADRNN,DPO-ADRNN,GTO-ADRNN,FFA-ADRNN respectively to 95.8 on Dataset 1 and 91.7 on Dataset 2 in proposed model.At batch size 4,the accuracy of the designed RRA-FFA-ADRNN model progressed by 9.2%to GTO-ADRNN,11.6%to EFC-ADRNN,10.9%to DPO-ADRNN,and 4%to FFA-ADRNN for Dataset 1.The accuracy of the proposed RRA-FFA-ADRNN is boosted by 12.9%,9.09%,11.6%,and 10.9%over FFCNN,SVM,RNN,and DRNN,using Dataset 2,showing a better improvement in accuracy with that of the proposed RRA-FFA-ADRNN model with 95.7%using Dataset 1 and 94.1%with Dataset 2,which is better than the existing baseline models. 展开更多
关键词 Detecting low-rate dos attacks adaptive dense recurrent neural network residual autoencoder with sparse attention renovated random attribute-based fennec fox optimization
在线阅读 下载PDF
面向SDN流表多模态感知与DRL协同防御DDoS方法
13
作者 徐泽鹏 舒兆港 +2 位作者 陈淑武 涂强 庄涛 《计算机应用研究》 北大核心 2026年第2期596-603,共8页
软件定义网络(SDN)的集中化控制架构在提升管理效率的同时,面临分布式拒绝服务(DDoS)攻击风险。针对传统检测方法难以应对大规模动态流量中的隐蔽攻击行为,且易误封短时高并发正常流量的问题,提出一种基于多模态深度强化学习的DDoS防御... 软件定义网络(SDN)的集中化控制架构在提升管理效率的同时,面临分布式拒绝服务(DDoS)攻击风险。针对传统检测方法难以应对大规模动态流量中的隐蔽攻击行为,且易误封短时高并发正常流量的问题,提出一种基于多模态深度强化学习的DDoS防御系统。该系统通过融合时空特征解耦与智能决策优化,实现检测精度与资源效率的动态平衡,在资源充足时最大程度规避对非攻击流量的拒绝服务。实验结果显示,其攻击检测准确率平均达99.61%,误封率最高不超过0.5%,在保证高准确率的前提下降低了合法流量误封,实现了防御过程对网络服务质量的保障。 展开更多
关键词 软件定义网络 分布式拒绝服务攻击 对抗深度强化学习网络 张量分解
在线阅读 下载PDF
基于BiTCN的无人机指挥控制链路DoS攻击检测方法
14
作者 赵长啸 方玉麟 汪克念 《航空学报》 北大核心 2026年第1期249-265,共17页
无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)... 无人机指挥控制(C2)链路的开放性使其易遭受非授信攻击,导致无人机失控、坠毁乃至恶意攻击第三方的风险,针对C2链路中拒绝服务(DoS)攻击风险,考虑实际检测数据集缺失条件,提出了一种基于具有多源特征融合能力的双向时间卷积网络(BiTCN)的攻击检测方法,基于网络数据与物理数据的信息特征融合构建检测数据集,通过时间戳对齐与前向填充,解决网络与物理数据的异步问题;实验基于完整数据集和数据缺失率为5%、15%、30%、40%、50%的数据集展开,利用BiTCN模型通过双向机制捕捉数据的前后文信息,完成特征提取和分类,实现对DoS攻击的检测。将所提方法在真实无人机攻击数据集上进行验证,结果表明:与纯网络数据和纯物理数据检测模型相比,该方法准确率(97.8%)、召回率(95.9%)、F1分数(97.8%)和AUC(0.997)均优于单一维度数据检测模型;与传统FNN、1D-CNN、LSTM、GRU检测模型相比,即使在40%的数据缺失情况下,所提方法仍能保持较高检测精度。 展开更多
关键词 无人机C2链路 dos攻击检测 双向时间卷积网络 网络数据与物理数据融合 攻击检测方法
原文传递
DoS攻击下无人水面艇的动态记忆型事件触发航向控制
15
作者 王国蘅 艾自东 《控制工程》 北大核心 2026年第3期496-503,528,共9页
针对无人水面艇(unmanned surface vehicle, USV)系统遭受拒绝服务(denial-ofservice, DoS)攻击和通信资源受限等问题,提出了一种动态记忆型事件触发航向控制方法。首先,为了改善系统的动态性能,设计了一种自适应的动态记忆型事件触发机... 针对无人水面艇(unmanned surface vehicle, USV)系统遭受拒绝服务(denial-ofservice, DoS)攻击和通信资源受限等问题,提出了一种动态记忆型事件触发航向控制方法。首先,为了改善系统的动态性能,设计了一种自适应的动态记忆型事件触发机制(adaptive dynamic memory event-triggered mechanism, ADMETM);其次,将最后一次成功触发时刻的控制信号作为DoS攻击活跃时的系统输入,用于保证USV航向控制系统的稳定,并通过综合考虑事件触发机制和DoS攻击的影响,建立了新的闭环切换系统模型;然后,使用分段李雅普诺夫泛函(piecewise Lyapunov functional, PLF)法,推导出线性矩阵不等式形式的指数稳定判据,并对事件触发参数和控制器增益进行协同设计。仿真结果表明,所提方法可以有效消除DoS攻击对系统性能的影响,使得USV能够快速地跟踪期望航向。 展开更多
关键词 无人水面艇 dos攻击 动态记忆型事件触发 输入补偿
原文传递
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
16
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(Ddos) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
决策树算法下的能源互联网DoS攻击流量辨识
17
作者 华梁 张涵艺 《信息技术》 2026年第3期47-52,共6页
洪水攻击、放大攻击、协议攻击等DoS攻击在流量生成和传播上呈现非线性特性,在非线性关系中,DoS攻击流量的不同部分具有不同的敏感性和变化率,未进行动态调整的学习率不能适应高敏感的流量变动,对此,提出决策树算法下的能源互联网DoS攻... 洪水攻击、放大攻击、协议攻击等DoS攻击在流量生成和传播上呈现非线性特性,在非线性关系中,DoS攻击流量的不同部分具有不同的敏感性和变化率,未进行动态调整的学习率不能适应高敏感的流量变动,对此,提出决策树算法下的能源互联网DoS攻击流量辨识方法。通过条件熵和Packet-in报文速率判断能源互联网是否受到DoS攻击;然后,从不同方面提取多尺度DoS攻击流量特征;最后,采用GBDT算法建立强分离器,引入果蝇优化算法优化分类器学习率,并将多尺度特征与优化后的学习率输入强分类器中,实现能源互联网DoS攻击流量的辨识。实验结果表明,所提方法的网络状态监测精度高、辨识性能好。 展开更多
关键词 能源互联网 dos攻击 GBDT算法 果蝇优化算法 流量辨识
在线阅读 下载PDF
基于重引力搜索的大规模网络DoS入侵检测
18
作者 杨云帆 黄浩 +2 位作者 古振威 马腾腾 王依云 《电子设计工程》 2026年第4期151-154,共4页
针对大规模网络流量数据特征提取性能差、无界DoS入侵检测覆盖率低等问题,提出基于重引力搜索的大规模网络DoS入侵检测方法。提取大规模网络流量数据特征——流量统计特征、流量速率特征、流量分布特征与时间序列特征,以深度学习模型为... 针对大规模网络流量数据特征提取性能差、无界DoS入侵检测覆盖率低等问题,提出基于重引力搜索的大规模网络DoS入侵检测方法。提取大规模网络流量数据特征——流量统计特征、流量速率特征、流量分布特征与时间序列特征,以深度学习模型为工具,构建无界DoS入侵检测模型,通过重引力搜索算法对典型特征自相关参数进行寻优,进而提升无界DoS入侵检测的精准度。实验结果表明,应用该方法后,流量速率曲线与实际流量速率曲线几乎一致,无界DoS入侵检测覆盖率最大值达到95%。大规模网络无界DoS入侵检测效果优异,性能良好。 展开更多
关键词 大规模网络 入侵检测 无界dos攻击 重引力搜索算法
在线阅读 下载PDF
抗DDoS攻击下的鲁棒负荷频率控制
19
作者 钱正浩 刘冯政 +4 位作者 何明东 李波 李雪武 傅格话 胡一凡 《西安邮电大学学报》 2026年第2期46-55,共10页
针对网络化电力系统在分布式拒绝服务(Distributed Denial of Service,DDoS)攻击与控制器增益偏差并存导致的频率调节退化问题,提出一种将非脆弱比例积分(Non-fragile Proportional Integral,NFPI)与Q-learning自适应采样结合的采样数... 针对网络化电力系统在分布式拒绝服务(Distributed Denial of Service,DDoS)攻击与控制器增益偏差并存导致的频率调节退化问题,提出一种将非脆弱比例积分(Non-fragile Proportional Integral,NFPI)与Q-learning自适应采样结合的采样数据负荷频率控制(Load Frequency Control,LFC)框架。采用伯努利随机门控刻画由DDoS引发的指令丢失与阻塞,构建含状态、采样保持与能量积分项的Lyapunov-Krasovskii泛函,并配合线性矩阵不等式(Linear Matrix Inequalities,LMIs)给出H_(∞)稳定性判据与控制器综合。同时以频差和攻击指示等构成学习状态,将候选采样间隔离散为动作空间并设计兼顾误差与通信代价的回报函数以在线优化采样策略。仿真表明,在较高攻击概率下该方案仍能实现频率快速且近乎无过冲的收敛,并在保持可比稳态精度的前提下显著减少采样与控制更新,从而在增益不确定与对抗性丢包并存时兼顾鲁棒性与通信效率,适于现代网络化电力系统部署。 展开更多
关键词 电力系统 分布式拒绝服务攻击 负荷频率控制 LYAPUNOV-KRASOVSKII泛函 H_(∞)稳定性判据 Q学习自适应采样
在线阅读 下载PDF
DoS攻击下微能源网事件触发一致性协同控制 被引量:1
20
作者 吴丽珍 魏建平 +1 位作者 陈伟 杨珩 《太阳能学报》 北大核心 2025年第2期200-208,共9页
微能源网是一种典型的信息物理系统,通过稀疏网络传递控制信息,易受网络攻击,影响系统的稳定性,甚至造成系统失稳。该文将拒绝服务攻击考虑到微能源网信息物理系统(CPS)控制中,分析拒绝服务攻击机理以及攻击频率对系统的影响。并设计基... 微能源网是一种典型的信息物理系统,通过稀疏网络传递控制信息,易受网络攻击,影响系统的稳定性,甚至造成系统失稳。该文将拒绝服务攻击考虑到微能源网信息物理系统(CPS)控制中,分析拒绝服务攻击机理以及攻击频率对系统的影响。并设计基于事件触发一致性算法的弹性控制器,通过Lyapunov理论证明该控制系统的稳定性,能够避免Zeno现象的发生。该控制器能够在拒绝服务攻击下实现控制目标,并具有较好的动态性能。最后,在Matlab/Simulink仿真平台验证该控制方法的可行性和有效性。 展开更多
关键词 信息物理系统 拒绝服务攻击 LYAPUNOV函数 微能源网 事件触发一致性 弹性控制
原文传递
上一页 1 2 59 下一页 到第
使用帮助 返回顶部