Characterization of multi-channel denial-of-service

被引:0
|
作者
Basu, Anindya [1 ]
Kar, Indrani [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Elect & Elect Engn, North Guwahati 781039, Assam, India
关键词
Cyber-physical systems; Denial-of-service; Resilient control; Switched systems; Optimization; MULTIPLE TRANSMISSION CHANNELS; NETWORKED CONTROL-SYSTEMS; EVENT-TRIGGERED CONTROL; CYBER-PHYSICAL SYSTEMS; STABILIZING CONTROL; NONLINEAR-SYSTEMS; ATTACKS; INPUT; STATE;
D O I
10.1016/j.ejcon.2024.101001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The embedded closed -loop in integrated systems can be compromised when attackers execute a successful malicious attack. Hence, over the past decade, interest in enhancing the safety of Cyber -Physical Systems (CPSs) has risen. This article examines the resilient control problem for CPSs with numerous transmission channels under Denial -of -Service (DoS). To begin with, a partial observer technique is developed in response to the Multi -Channel DoS (MCDoS) condition. Secondly, the changing frequency of MCDoS is characterized while maintaining the Input -to -State Stability (ISS) of the closed -loop system. Next, an event -based control strategy is developed to address Full -Scale DoS (FSDoS). Finally, the optimal control parameters are designed to make the system resilient against maximum MCDoS changing frequency.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [22] Denial-of-service attacks rip the Internet
    Garber, L
    COMPUTER, 2000, 33 (04) : 12 - 17
  • [23] Optimizing the pulsing denial-of-service attacks
    Luo, XP
    Chang, RKC
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 582 - 591
  • [24] Denial-of-Service Attack Detection System
    Thakare, Supriya S.
    Kaur, Parminder
    2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 281 - 285
  • [25] Keeping denial-of-service attackers in the dark
    Badishi, G
    Herzberg, A
    Keidar, I
    DISTRIBUTED COMPUTING, PROCEEDINGS, 2005, 3724 : 18 - 32
  • [26] Denial-of-Service: Plugging the legal loopholes?
    Partner
    不详
    Comput Law Secur Rep, 2007, 2 (194-198):
  • [27] Inferring Internet denial-of-service activity
    Moore, D
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 9 - 22
  • [28] Speculative Denial-of-Service Attacks in Ethereum
    Yaish, Aviv
    Qin, Kaihua
    Zhou, Liyi
    Zohar, Aviv
    Gervais, Arthur
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3531 - 3548
  • [29] Handling Distributed Denial-of-Service Attacks
    Janczewski, Lech J.
    Information Security Technical Report, 2001, 6 (03): : 37 - 44
  • [30] Combating channel eviction triggering denial-of-service attacks in cognitive radio networks
    Sodagari, Shabnam
    Attar, Alireza
    Leung, Victor C. M.
    Bilen, Sven G.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (05): : 454 - 465