Novel attack-defense framework for nonlinear complex networks: An important-data-based method

被引:33
|
作者
Wang, Xun [1 ]
Tian, Engang [1 ,3 ]
Wei, Bin [1 ]
Liu, Jinliang [2 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
IDB attack strategy; nonlinear complex networks (CNs); resilient H8 estimator; INFINITY STATE ESTIMATION; DATA INJECTION ATTACKS; DOS ATTACK; SYSTEMS; DELAY;
D O I
10.1002/rnc.6551
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important-data-based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H & INFIN;$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack-defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H & INFIN;$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H & INFIN;$$ {H}_{\infty } $$ estimator, respectively.
引用
收藏
页码:2861 / 2878
页数:18
相关论文
共 50 条
  • [21] Improved Wasserstein Generative Adversarial Networks Defense Method Against Data Integrity Attack on Smart Grid
    Li, Yuancheng
    Wang, Xiao
    Zeng, Jing
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2022, 15 (03) : 243 - 254
  • [22] Sequential Node Attack of Complex Networks based on Q-learning Method
    Ma, Weijun
    Fang, Junyuan
    Wu, Jiajing
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [23] An integrated graph data privacy attack framework based on graph neural networks in IoT
    Zhao, Xiaoran
    Peng, Changgen
    Ding, Hongfa
    Tan, Weijie
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (20):
  • [24] Security defense decision method based on potential differential game for complex networks
    Zhang, Hengwei
    Mi, Yan
    Fu, Yumeng
    Liu, Xiaohu
    Zhang, Yuchen
    Wang, Jindong
    Tan, Jinglei
    COMPUTERS & SECURITY, 2023, 129
  • [25] VFedAD: A Defense Method Based on the Information Mechanism Behind the Vertical Federated Data Poisoning Attack
    Lai, Jinrong
    Wang, Tong
    Chen, Chuan
    Li, Yihao
    Zheng, Zibin
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 1148 - 1157
  • [26] Dynamic identification of important nodes in complex networks based on the KPDN–INCC method
    Jieyong Zhang
    Liang Zhao
    Peng Sun
    Wei Liang
    Scientific Reports, 14
  • [27] A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks
    Ghaznavi, Mahsa
    Jamshidi, Ali
    COMPUTER COMMUNICATIONS, 2019, 138 : 106 - 114
  • [28] A channel hopping based defense method against primary user emulation attack in cognitive radio networks
    Ahmadfard, Arash
    Jamshidi, Ali
    COMPUTER COMMUNICATIONS, 2019, 148 : 1 - 8
  • [29] A novel optimization method based on opinion formation in complex networks
    Rafati, Homayoun Hamed Moghadam
    Jalili, Mandi
    Yu, Xinghuo
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 882 - 885
  • [30] Method for replica creation in data grids based on complex networks
    Chen D.-W.
    Zhou S.-T.
    Ren X.-Y.
    Kong Q.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (04): : 110 - 115