Novel attack-defense framework for nonlinear complex networks: An important-data-based method

被引:33
|
作者
Wang, Xun [1 ]
Tian, Engang [1 ,3 ]
Wei, Bin [1 ]
Liu, Jinliang [2 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
IDB attack strategy; nonlinear complex networks (CNs); resilient H8 estimator; INFINITY STATE ESTIMATION; DATA INJECTION ATTACKS; DOS ATTACK; SYSTEMS; DELAY;
D O I
10.1002/rnc.6551
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important-data-based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H & INFIN;$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack-defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H & INFIN;$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H & INFIN;$$ {H}_{\infty } $$ estimator, respectively.
引用
收藏
页码:2861 / 2878
页数:18
相关论文
共 50 条
  • [1] Stochastic important-data-based attack model and defense strategies for cyber-physical system: A data-driven method
    Zhang, Chunting
    Zhao, Xia
    Tian, Engang
    Zou, Yi
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024, 34 (08) : 5384 - 5398
  • [2] Important-data-based attack design and resilient remote estimation for recurrent neural networks
    Zhao, Xia
    Wang, Xun
    Wu, Jiancun
    Chen, Hongtian
    Tian, Engang
    INFORMATION SCIENCES, 2024, 675
  • [3] A Novel Dynamic Method in Distributed Network Attack-Defense Game
    Liu Xiaojian
    Yuan Yuyu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [4] NETWORKS ATTACK-DEFENSE MODEL BASED ON THE IMPROVED LANCHESTER EQUATION
    Liu, Jin-Xing
    Zhao, Dong-Mei
    Wang, Fang
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1083 - 1086
  • [5] Analysis Method based on Rough Attack-defense Bayes Game Model
    Zhang, Kai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 109 - 118
  • [6] An attack-defense game based reliability analysis approach for wireless sensor networks
    Jiang, Wen
    Ma, Zeyu
    Deng, Xinyang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [7] Cybersecurity risk assessment method of ICS based on attack-defense tree model
    Wang, Shuang
    Ding, Lei
    Sui, He
    Gu, Zhaojun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (06) : 10475 - 10488
  • [8] Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack-Defense Game Model
    Liu, Guiyun
    Peng, Baihao
    Zhong, Xiaojing
    SENSORS, 2021, 21 (02) : 1 - 25
  • [9] Tree-Based Attack-Defense Model for Risk Assessment in Multi-UAV Networks
    Garg, Sahil
    Aujla, Gagangeet Singh
    Kumar, Neeraj
    Batra, Shalini
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (06) : 35 - 41
  • [10] Joint Attack-Defense Strategy Based on Game Theory for Cognitive Devices in Covert Communication Networks
    Van-Hiep Vu
    Koo, Insoo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (02) : 544 - 548