Malicious software spread modeling and control in cyber-physical systems

被引:3
|
作者
Yang, Bo [1 ]
Yu, Zhenhua [2 ]
Cai, Yuanli [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Automat Sci & Engn, Xian 710049, Peoples R China
[2] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Inst Syst Secur & Control, Xian 710054, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical system; Malicious software; Hopf bifurcation; Hybrid control; SEIR EPIDEMIC MODEL; RESILIENT CONTROL; GLOBAL-STABILITY; SECURITY; ATTACKS; BIFURCATION; HYBRID; SUBJECT;
D O I
10.1016/j.knosys.2022.108913
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber-physical systems are interactive intelligent systems integrating computing units and physical objects through information networks. They have been widely used in critical infrastructures, and are increasingly vulnerable to malicious software attacks. To explore the spread mechanism of malicious software in cyber-physical systems from a macroscopic perspective, this work proposes a new malicious software spread model with time delay, and analyzes its complex dynamic behavior by using the stability theory and bifurcation theorem. A hybrid bifurcation control method is presented to control adverse bifurcations that cause harmful behavior of cyber-physical systems, and the influence of control parameters on the Hopf bifurcation threshold is revealed. Cyber-physical systems with the proposed method can be stabilized, which behave as expected during malicious software spread. The simulations show that the proposed control method can advance or postpone the threshold of Hopf bifurcation, thus making cyber-physical systems achieve a stable state. Consequently, damage and disruption to cyber-physical systems caused by malicious software are effectively reduced. (C) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Goal Modeling Method for Autonomic Control Of Cyber-Physical Systems (CPS)
    Park, Jeongmin
    Kang, Sungjoo
    Chun, Ingeol
    Kim, Wontae
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 295 - +
  • [42] Modeling of Future Cyber-Physical Energy Systems for Distributed Sensing and Control
    Ilic, Marija D.
    Xie, Le
    Khan, Usman A.
    Moura, Jose M. F.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2010, 40 (04): : 825 - 838
  • [43] Impact Evaluation of Malicious Control Commands in Cyber-Physical Smart Grids
    Saxena, Neetesh
    Xiong, Leilei
    Chukwuka, Victor
    Grijalva, Santiago
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2021, 6 (02): : 208 - 220
  • [44] Almost sure detection of the presence of malicious components in cyber-physical systems
    Das, Souvik
    Dey, Priyanka
    Chatterjee, Debasish
    AUTOMATICA, 2024, 167
  • [45] A comprehensive survey on modeling of cyber-physical systems
    Graja, Imen
    Kallel, Slim
    Guermouche, Nawal
    Cheikhrouhou, Saoussen
    Kacem, Ahmed Hadj
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15):
  • [46] Modeling and Specifying Requirements for Cyber-Physical Systems
    Ordinez, L.
    Alimenti, O.
    Rinland, E.
    Gomez, M.
    Marchetti, J.
    IEEE LATIN AMERICA TRANSACTIONS, 2013, 11 (01) : 625 - 632
  • [47] Modeling Methodology for Autonomous Cyber-Physical Systems
    Pinto, Alessandro
    2ND INTERNATIONAL WORKSHOP ON COMPUTATION-AWARE ALGORITHMIC DESIGN FOR CYBER-PHYSICAL SYSTEMS (CAADCPS 2022), 2022, : 1 - 2
  • [48] Threat Modeling of Cyber-Physical Systems in Practice
    Jamil, Ameerah-Muhsinah
    Ben Othmane, Lotfi
    Valani, Altaz
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 3 - 19
  • [49] Control Software Engineering Approaches for Cyber-Physical Systems: A Systematic Mapping Study
    Banerjee, Amar
    Choppella, Venkatesh
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2025, 9 (01)
  • [50] Modeling and Simulation of Attacks on Cyber-physical Systems
    Bernardeschi, Cinzia
    Domenici, Andrea
    Palmieri, Maurizio
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 700 - 708