首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 593 毫秒
1.
基于免疫的对等网络DoS攻击防御系统   总被引:2,自引:1,他引:1  
通过学习自然免疫系统和研究对等网络DoS问题与传统网络中的区别,提出了一种基于免疫的对等网络DoS攻击防御系统。在系统中,对等网每个节点都有一个可根据环境学习和动态改变的免疫智能体,它能够自动检测网络并对具有DoS攻击特征的数据进行控制,从而把攻击扼杀在萌芽状态。系统具有分布性、自适应性、可扩展性等特点。  相似文献   

2.
均值趋同是一种广泛应用于分布式计算和控制的算法, 旨在系统通过相邻节点间信息交互、更新, 最终促使系统中所有节点以它们初始值的均值达成一致. 研究拒绝服务(Denial-of-service, DoS)攻击下的分布式离散时间多智能体系统均值趋同问题. 首先, 给出一种基于状态分解思想的分布式网络节点状态信息处理机制, 可保证系统中所有节点输出值的隐私. 然后, 利用分解后的节点状态值及分析给出的网络通信拓扑条件, 提出一种适用于无向通信拓扑的多智能体系统均值趋同控制方法. 理论分析表明, 该方法能够有效抵御DoS攻击的影响, 且实现系统输出值均值趋同. 最后, 通过仿真实例验证了该方法的有效性.  相似文献   

3.
针对一类网络化控制系统,当考虑网络控制系统遭受PWM (Pulsewidth-Modulated)型DoS (Denial-of-Service, DoS)攻击时,提出一种基于缓存机制的记忆型事件触发机制策略.本文考虑的DoS攻击可检测,并且攻击的周期时长以及每周期内的最短休眠时间已知.为了减少网络控制系统中数据包的发送频次,本文设计了基于相对误差的新型事件触发策略,与传统事件触发策略相比,通过增加缓存器来有效利用已经发送的历史采样数据,最终达到改善系统动态过程的目的.接下来,综合考虑网络攻击和事件触发方案,建立了网络化切换系统模型,构造分段李雅普诺夫泛函,推导出系统指数稳定的结论并且对控制器增益及事件触发参数进行协同设计.最后,通过仿真案例,验证了所提出方法的有效性.  相似文献   

4.
基于主机资源耗损分析防御DoS攻击的算法及实现   总被引:2,自引:0,他引:2  
王雅超  袁津生  马丽 《计算机工程与设计》2007,28(5):1043-1044,1157
随着计算机技术的迅速发展,DoS攻击成为主要的网络安全隐患.从分析主机资源耗损入手,提出了一种防御DoS攻击的一种算法.该算法通过分析系统CPU占用率来判断是否发生DoS攻击和进行DoS攻击的IP数据包,并进一步取缔非法占用的系统资源来保护主机能够正常工作.  相似文献   

5.
对于DoS攻击的防御一直是网络管理人员重点关注的问题,本文首先对两种典型DoS风暴攻击的原理进行了介绍,然后分析了在CISCO路由器中应用CBAC进行DoS风暴攻击防御的技术,并通过配置实例进行具体应用说明,为网络管理人员提出了一种有效的防御DoS风暴攻击的方法。  相似文献   

6.
信任机制最近已建议作为一个无线传感器网络(WSNs)有效的安全机制.文中提出了一种信任机制(EPTM),该机制不仅可以防止被入侵的节点或者恶意节点选举为簇头,而且还设计出一种新型副簇头节点来监察簇头以防止他们的恶意行为.特别介绍了一种基于能量预测的方法来检测拒绝服务攻击(DoS)的节点,选出值得信赖的簇.最后通过仿真验证了机制的可行性,结果表明:EPTM可以有效防御拒绝服务(DoS)攻击.  相似文献   

7.
基于生存性的DoS攻击防御方案   总被引:1,自引:0,他引:1  
拒绝服务攻击(DoS)是Internet中常见的一种攻击形式,提出一种基于覆盖网络的防御DoS攻击的方案。通过覆盖网络中的冗余资源和自恢复功能确保系统在遭到DoS攻击时仍能提供一定性能的服务,并可自动从攻击中恢复正常。  相似文献   

8.
本文研究了DoS攻击下网络化控制系统记忆型事件触发预测补偿控制问题. 首先, 由于网络带宽资源有限 和系统状态不完全可观测性, 引入了记忆型事件触发函数, 为观测器提供离散事件触发传输方案. 然后, 分析了网络 传输通道上发生的DoS攻击. 结合上述记忆型事件触发方案, 在控制节点设计一类新颖的预测控制算法, 节省网络 带宽资源并主动补偿DoS攻击. 同时, 建立了基于观测器的记忆型事件触发预测控制的闭环系统, 并且分析稳定性. 通过线性矩阵不等式(LMI)和Lyapunov稳定性理论, 建立了控制器、观测器和记忆型事件触发矩阵的联合设计方案, 并验证了该方案的可行性. 仿真结果表明, 该方案结合记忆型事件触发机制可以有效补偿DoS攻击, 节约网络带宽 资源.  相似文献   

9.
汪慕峰  胥布工 《控制与决策》2019,34(8):1681-1687
基于网络的工业控制系统作为信息物理系统(CPSs)的一种重要应用正迅猛发展.然而,近年来针对工业控制系统的恶意网络攻击引起了人们对CPS安全问题的广泛关注.拒绝服务(DoS)干扰攻击作为CPS中最容易发生的攻击方式得到了深入研究.对此,提出一种能量受限的、周期的DoS干扰攻击模型,攻击的目的是增大无线信道发生数据包随机丢包的概率.基于一类CPS简化模型,考虑CPS中传感器与控制器(S-C)之间无线信道同时存在DoS干扰攻击和固有随机数据包丢失的情况,采用状态反馈,基于随机Lyapunov函数和线性矩阵不等式方法得到可以保证系统稳定的充分条件,并利用系统稳定的充分条件和锥补线性化算法设计控制器.最后,通过两个数值仿真例子验证所提出控制策略的有效性.  相似文献   

10.
DoS攻击是威胁IPv4网络安全的重要问题之一.随着IPv6的发展,相关安全问题也逐步体现并影响IPv6网络的正常运行.该文指出利用IPv6和隧道主机的多地址性,攻击者可获得大量合法IPv6地址,通过伪装成多个虚拟主机实施对目标设备的DoS攻击.这种攻击具有大量的可用地址范围,且受控于同一真实主机,通过不断使用新地址和多地址间配合,可避开以IP为单位的传统检测与防御策略,并可有效放大攻击节点数目或减少实际攻击节点数量.为此提出了基于地址特征分类的防御框架(defense framework based on addresses classification,DFAC).通过分类不同地址特征,构造特征子集,在特征子集基础上实施对虚拟主机攻击的检测和防御,解决虚拟主机引发的放大问题.原型系统实验结果表明,DFAC有效地降低了上述DoS攻击对系统负载的影响.  相似文献   

11.
This paper studies event-triggered containment control problem of multi-agent systems (MASs) under deception attacks and denial-of-service (DoS) attacks. First, to save limited network resources, an event-triggered mechanism is proposed for MASs under hybrid cyber attacks. Different from the existing event-triggered mechanisms, the negative influences of deception attacks and DoS attacks are considered in the proposed triggering function. The communication frequencies between agents are reduced. Then, based on the proposed event-triggered mechanism, a corresponding control protocol is proposed to ensure that the followers will converge to the convex hull formed by the leaders under deception attacks and DoS attacks. Compared with the previous researches about containment control, in addition to hybrid cyber attacks being considered, the nonlinear functions related to the states of the agents are applied to describe the deception attack signals in the MAS. By orthogonal transformation of deception attack signals, the containment control problem under deception attacks and DoS attacks is reformulated as a stability problem. Then, the sufficient conditions on containment control can be obtained. Finally, a set of simulation example is used to verify the effectiveness of the proposed method.  相似文献   

12.
Cyber‐Physical Systems (CPSs) are vulnerable to malicious network attacks due to tight combination of cyber‐system and physical system through a more open network communication. In this paper, a guaranteed cost control problem for a CPS under DoS jamming attacks is solved via both state feedback and output feedback methods. Specifically, an energy constraint DoS jammer with clear periodic attack strategy is proposed to attack wireless channel and to degrade the system performance. Without knowing the DoS jammer's attack strategy, a passive attack‐tolerant mechanism is established, and the corresponding state feedback and output feedback controllers are designed to achieve guaranteed cost control for the CPS with inherent packet dropouts under DoS jamming attacks. Finally, numerical examples are presented to demonstrate the effectiveness of the guaranteed cost controllers.  相似文献   

13.
Owing to the deep integration of control, computation, and communication, cyber‐physical systems (CPSs) play an important role in wide real‐world applications. In this paper, we investigate the problem of resilient filter design of CPSs under malicious denial‐of‐service (DoS) attacks launched by adversaries. Firstly, based on two standard assumptions concerning with the frequency and duration of DoS attacks, we state the H filtering problem for the CPSs under DoS attacks. Then, sufficient conditions are developed to ensure that, when there are DoS attacks, the filtering error dynamics of the underlying CPSs is mean square exponential stable with a prescribed H disturbance attenuation performance. Furthermore, a switched filter is designed for CPSs under DoS attacks. Examples are given to illustrate the effectiveness and potential of the proposed new design techniques.  相似文献   

14.
This paper investigates the resilient control problem for constrained continuous‐time cyber‐physical systems subject to bounded disturbances and denial‐of‐service (DoS) attacks. A sampled‐data robust model predictive control law with a packet‐based transmission scheduling is taken advantage to compensate for the loss of the control data during the intermittent DoS intervals, and an event‐triggered control strategy is designed to save communication and computation resources. The robust constraint satisfaction and the stability of the closed‐loop system under DoS attacks are proved. In contrast to the existing studies that guarantee the system under DoS attacks is input‐to‐state stable, the predicted input error caused by the system constraints can be dealt with by the input‐to‐state practical stability framework. Finally, a simulation example is performed to verify the feasibility and efficiency of the proposed strategy.  相似文献   

15.
This paper presents an overview on the recent advances in the research of security of cyber–physical systems. We place particular emphases on consensus problems for multi-agent systems in hostile environments and their analyses on the resiliency against two types of attacks. First, we discuss a class of data injection attacks by focusing on the approach based on mean subsequence reduced (MSR) algorithms and their variants. Agents equipped with such algorithms will ignore their neighbors taking extreme state values. Characterizations on the properties necessary for network topologies and moreover a number of extensions with enhanced resiliency will be established. As the second class of attacks, the effects of denial-of-service (DoS) attacks will be examined in the context of multi-agent consensus. By employing a DoS model based on the energy constraints of the attacker, we will observe that robustness against such attacks may depend on system properties such as dynamics of the individual agents and network structures. Applications of the algorithms will be further discussed for clock synchronization in wireless sensor networks and control of a group of mobile robots.  相似文献   

16.
This paper establishes a new framework for modeling electrical cyber-physical systems (ECPSs), integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model, the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service (DoS) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks.  相似文献   

17.
王悦  贾新春  游秀  吕腾 《控制理论与应用》2022,39(10):1890-1897
本 文 研 究 了 一 类 带 有 多 率 采 样 的 线 性 多 智 能 体 系 统(Multiagent Systems, MASs)在 拒 绝 服 务(Denial-of-Service, DoS)攻击下的安全一致性控制问题, 其中DoS攻击通常阻断智能体之间的信息传输. 本文将多 率采样在网络化控制系统中的结果推广到了多智能体系统, 并考虑了非理想通信网络环境. 首先, 通过引入一个匹 配机制来同步由多率采样引起的智能体不同状态分量的采样数据. 然后, 在DoS攻击下, 针对带有多率采样的线 性MAS提出了一个基于多率采样的安全一致性控制器. 通过使用李雅普诺夫稳定性理论和切换系统方法, 获得了 包含DoS 攻击持续时间以及攻击频率的安全一致性充分条件. 最后, 给出了一个仿真例子来验证所提方法的有效 性, 并给出了多率采样与单率采样机制的性能对比分析.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号