CN113595974A - Security control method and system for attacked discrete random distribution control system - Google Patents

Security control method and system for attacked discrete random distribution control system Download PDF

Info

Publication number
CN113595974A
CN113595974A CN202110655633.6A CN202110655633A CN113595974A CN 113595974 A CN113595974 A CN 113595974A CN 202110655633 A CN202110655633 A CN 202110655633A CN 113595974 A CN113595974 A CN 113595974A
Authority
CN
China
Prior art keywords
weight
control system
vector
random distribution
attacked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110655633.6A
Other languages
Chinese (zh)
Other versions
CN113595974B (en
Inventor
任玉伟
伊晓云
亓利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wanzhida Information Consulting Co ltd
Original Assignee
Shandong Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Normal University filed Critical Shandong Normal University
Priority to CN202110655633.6A priority Critical patent/CN113595974B/en
Publication of CN113595974A publication Critical patent/CN113595974A/en
Application granted granted Critical
Publication of CN113595974B publication Critical patent/CN113595974B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Feedback Control In General (AREA)

Abstract

The present disclosure provides a security control method and system for an attacked discrete random distribution control system, which obtains parameter data of the sparsely attacked discrete random distribution control system of a sensor; according to the obtained parameter data, a Luenberger weight observer with a safety preselector is used for carrying out weight estimation to obtain a system weight estimation vector; obtaining a weight error vector according to a difference value of the system weight estimation vector and a preset reference weight vector; obtaining the input control quantity of the discrete random distribution control system according to the weight error vector, the system weight estimation vector and the controller gain, and carrying out safety control according to the obtained input control quantity; the method and the device enable the closed-loop system to be more stable, and achieve effective tracking of the probability function.

Description

Security control method and system for attacked discrete random distribution control system
Technical Field
The present disclosure relates to the field of network security technologies, and in particular, to a security control method and system for an attacked discrete randomly distributed control system.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
With the rapid spread of networking technologies, more and more industrial control systems are connected through different, open public networks, which increases the risk of the control systems being subjected to cyber attacks. In the face of the increasingly complex structure and huge scale of the network, particularly with the increasing popularity of network attack and destruction behaviors and the gradual diversification of attack tools, the traditional network security protection and research thereof cannot meet the actual requirements of network development, and new basic theories and research methods are urgently needed.
To date, many different types of attacks have emerged. Such as spoofing attacks, which in turn include spurious data injection attacks and replay attacks, which refer to attackers attempting to prevent sensors from measuring and controlling incoming information transmissions, and denial of service (DoS) attacks, which refer to attackers injecting or tampering with information in a transmission channel by data to affect the integrity and correctness of the data. Recently, the study of sparse attack on sensors has attracted extensive attention. Sparse attacks refer to a limited number of sensors under attack, where the measurements of the sensors are altered by a sparse attack vector, deviating from the true measurements.
On the other hand, the main purpose of random distribution control is to design the control input such that the output Probability Density Function (PDF) of the system tracks as much as possible a desired output PDF. The traditional Gaussian random system taking the mean value and the variance as control targets cannot meet the condition that most practical systems are nonlinear and uncertain. And is inevitably affected by human factors, disturbed by random noise and threatened and damaged by attacks in the process of modeling a random system. With regard to the research results of the random distribution control system, in addition to the research on some control algorithms, Fault Diagnosis (FD), fault estimation, fault isolation and Fault Tolerant Control (FTC) methods have been developed.
The inventor finds that no similar scheme has been proposed before for modeling, estimating and controlling the attacked randomly distributed control system; in addition, in the prior art, an effective solution is not yet available for the problems of weight estimation and security control of an attacked random distribution control system.
Disclosure of Invention
In order to solve the defects of the prior art, the present disclosure provides a security control method and system of an attacked discrete random distribution control system, so that a closed-loop system is more stable, and effective tracking of a probability function is realized.
In order to achieve the purpose, the following technical scheme is adopted in the disclosure:
a first aspect of the present disclosure provides a security control method for an attacked discrete randomly distributed control system.
A security control method of an attacked discrete random distribution control system comprises the following processes:
acquiring parameter data of a discrete random distribution control system of a sensor under sparse attack;
according to the obtained parameter data, a Luenberger weight observer with a safety preselector is used for carrying out weight estimation to obtain a system weight estimation vector;
obtaining a weight error vector according to a difference value of the system weight estimation vector and a preset reference weight vector;
and obtaining the input control quantity of the discrete random distribution control system according to the weight error vector, the system weight estimation vector and the controller gain, and carrying out safety control according to the obtained input control quantity.
Furthermore, a dynamic relation between the probability density functions of control input and output is described through a B-spline approximation method, and a discrete random distribution control system of the sensor under sparse attack is obtained.
Further, establishing a sufficient condition that the safety weight estimation can be solved, and constructing a Luenberger weight observer with a safety preselector under the sufficient condition.
Furthermore, for the random distribution control system under the s-sparse attack, the following conditions are met:
Figure BDA0003112646020000031
where s is the number of sensors under attack and q is the total number of sensors.
Further, a controller is constructed according to the weight error vector, the system weight vector and the controller gain, and the output quantity of the controller is used as the input control quantity of the discrete random distribution control system to carry out system safety control, so that the difference between the output probability density function of the closed-loop system and the expected tracking target is within a preset range.
Further, the controller is:
Figure BDA0003112646020000032
wherein,
Figure BDA0003112646020000033
and
Figure BDA0003112646020000034
for the controller gain to be obtained based on the linear matrix inequality,
Figure BDA0003112646020000035
is the weight value of the observer at the moment k, T0=t0I,t0>0 represents the sample interval, ξ (k) represents the correlation integral term, and W (k-1) represents the weight error vector at the moment k-1.
Furthermore, after the sensor is subjected to sparse attack, extracting the signals which are not attacked by using a sequencing method and a median operator, and designing the Luenberger weight observer with the safety preselector by combining the extracted signals which are not attacked.
A second aspect of the disclosure provides a security control system for an attacked discrete randomly distributed control system.
A security control system for a hacked discrete randomly distributed control system, comprising:
a data acquisition module configured to: acquiring parameter data of a discrete random distribution control system of a sensor under sparse attack;
a system weight estimation module configured to: according to the obtained parameter data, a Luenberger weight observer with a safety preselector is used for carrying out weight estimation to obtain a system weight estimation vector;
a weight error vector calculation module configured to: obtaining a weight error vector according to a difference value of the system weight estimation vector and a preset reference weight vector;
a security control module configured to: and obtaining the input control quantity of the discrete random distribution control system according to the weight error vector, the system weight estimation vector and the controller gain, and carrying out safety control according to the obtained input control quantity.
A third aspect of the present disclosure provides a computer-readable storage medium, on which a program is stored, which when executed by a processor implements the steps in the security control method of the attacked discrete randomly distributed control system according to the first aspect of the present disclosure.
A fourth aspect of the present disclosure provides an electronic device, including a memory, a processor, and a program stored in the memory and executable on the processor, where the processor implements the steps in the security control method of the attacked discrete randomly distributed control system according to the first aspect of the present disclosure when executing the program.
Compared with the prior art, the beneficial effect of this disclosure is:
according to the method, the system, the medium or the electronic equipment, after a system sensor is subjected to sparse attack, signals which are not attacked in the middle are extracted by utilizing a sequencing method and a middle value operator; carrying out weight estimation of the system by a Luenberger observer with a safety preselector; and designing an augmented proportional-integral (PI) tracking control strategy according to the obtained weight estimated value, and searching PI control gain to enable a closed-loop system to be more stable and realize effective tracking of a probability function.
Advantages of additional aspects of the disclosure will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure and are not to limit the disclosure.
Fig. 1 is a schematic flow chart of a security control method of an attacked discrete randomly distributed control system provided in embodiment 1 of the present disclosure.
Fig. 2 is a schematic flow chart of weight observation and controller design provided in embodiment 1 of the present disclosure.
Detailed Description
The present disclosure is further described with reference to the following drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
Example 1:
as described in the background art, in the prior art, there are weight estimation and security control problems of an attacked random distribution control system, and in order to solve the above technical problems, this embodiment proposes a security control method of an attacked discrete random distribution control system, as shown in fig. 1 and fig. 2, which includes the following processes:
s1: constructing a dynamics model of a randomly distributed control system
A discrete time linear system with a sensor under sparse attack is described as follows:
Figure BDA0003112646020000061
wherein V (k) e Rn-1Is the weight vector of the system, u (k) e RmFor the control input vector of the system, a and B represent known parameter matrices, C (y) ═ C1(y),C2(y)...Cn-1(y)]∈Rq×n-1Is a vector of basis functions that is pre-specified by the system,
Figure BDA0003112646020000062
is determined by a neural network B-spline basis function, η (k) [. eta. ]1(k),η2(k)...ηq(k)]T∈RqRepresents an attack signal injected by an attacker under the sensor, and gamma (y, k) is the interval [ a, b ] of y]The measurement output probability density function which can be damaged is obtained, and y is an independent variable of a B spline basis function of the neural network.
s-sparse attack definition: suppose that the attack signal eta (k) belongs to RqIn (1) is an s-sparse attack (s ≦ q) and satisfies | | | | η (k) | ≦ D, where D is a known normal number. If there are q sensors, sensor/e {1,2.. q } is attacked, then ηl(k) Is a non-zero constant, otherwise sensor l is not attacked, s ∈ N is the number of attacked sensors, and a set exists
Figure BDA0003112646020000063
And in the set
Figure BDA0003112646020000064
Q-s is the number of non-attacked sensors. For all k, etaj(k) 0, j ∈ l, and the other s elements of η (k) can be arbitrarily operated.
S2: distributed discrete time security weight estimation
In order to solve the problem of the security weight estimation of the randomly distributed control system in equation (1), a sufficient condition is proposed as shown below.
Condition 1: for a random distribution control system which is subjected to s-sparse attack in the formula (1), the following conditions are met:
Figure BDA0003112646020000065
based on condition 1, this embodiment designs a distributed strategy to obtain an attack-free sensor in the system, where given is an output probability density function γ (y, k) instead of using the output y (k), and arranges its elements by size to obtain a new vector x ═ x1,x2...xq]Satisfy x1≤x2≤...≤xqThe median operator for the output γ (y, k) is as follows:
Figure BDA0003112646020000071
wherein, if q is an odd number, ω is 1/2(q +1), if q is an even number, ω is 1/2q, and when condition 1 is established, the distributed safety measurement preselector of the random distribution control system is designed as follows:
ηj(k)=Med[γ(y,k)] (4)
by analyzing the above, when condition 1 is satisfied, the "middle" non-attacked signal is extracted by analyzing the difference of the multiplexed signals by using the sorting method and the median operator, so that ηj(k)=0。
By utilizing the Luenberger observability, aiming at the attacked random distribution control system, a discrete Luenberger weight observer is designed:
Figure BDA0003112646020000072
wherein,
Figure BDA0003112646020000073
is the weight of the observer and is,
Figure BDA0003112646020000074
is the output of an observerOut of wherein
Figure BDA0003112646020000075
Residual error
Figure BDA0003112646020000076
σ(y)∈RPIs defined in [ a, b]The above pre-specified weight vector, ηj(k) Representing an "intermediate" non-attacked signal, i.e. eta, resolved when condition 1 holdsj(k)=0,L0Is to make (A-L)0Σ) parameters of the stable design.
The tracking error can be described as:
Figure BDA0003112646020000077
then the
Δe(k)=e(k+1)-e(k) (7)
Substituting equation (1) and equation (5) into equation (7) yields:
Figure BDA0003112646020000078
wherein
Figure BDA0003112646020000081
Constructing a Lyapunov function:
Φ(k)=eT(k)Pe(k) (9)
according to the formula (9):
Figure BDA0003112646020000082
using the Young inequality, 2bTd≤1/ε1bTb+ε1dTd, wherein epsilon1>0 is any scalar, b and d are real vectors, so,
Figure BDA0003112646020000083
then, further from the formula (10):
Figure BDA0003112646020000084
wherein (A-L)0Σ)T(P-1/ε1PTP)(A-L0Σ)-P=-I,
Figure BDA0003112646020000085
Because | | | eta (k) | | is less than or equal to D, therefore,
Figure BDA0003112646020000086
thus, from the above it can be demonstrated that:
when | | e (k) | non-woven2>φ,ΔΦ(k)<-||e(k)||2
Wherein e (k) converges to a small set of | | e (k) | tory cells according to the Lyapunov theory of stability2Phi is less than or equal to phi, therefore, the weight estimation error e (k) is consistently bounded, and the weight V (k) approximation is obtained through the above demonstration
Figure BDA0003112646020000087
S3: and according to the obtained weight estimation, subtracting the reference weight vector by using the weight vector to obtain a weight error vector, and designing an augmented PI controller.
The weight dynamic model can be known from (1):
Figure BDA0003112646020000091
about
Figure BDA0003112646020000092
The desired tracking objective may be defined as:
g(y)=C(y)Vg+L(y)+η(k) (12)
wherein VgIs as desiredAnd (5) weight vectors.
The dynamic reference system is designed as follows:
Figure BDA0003112646020000093
wherein A ism∈R(n-1)×(n-1),Bm∈R(n-1)×m,Cm∈R(n-1)×(n-1)Is a pre-specified matrix, R ∈ RmIs a pre-specified constant vector. To ensure
Figure BDA0003112646020000094
It is assumed here that AmIs a stable matrix, Vg=Cm(I-Am)-1Bmr。
The probability density function tracking control error can be described as:
e(y,k)=γ(y,k)-g(y) (14)
the weight error vector is defined as:
Figure BDA0003112646020000095
the probability density function tracking control problem is converted into a weight error
Figure BDA0003112646020000096
Based on the above analysis, the following controller was constructed in order to simplify the design procedure and provide a strict control theory:
Figure BDA0003112646020000097
wherein T is0=t0I,t0>0 denotes the sample interval and ξ (k) denotes the correlation integral term.
Substituting equation (16) into equations (1) and (5) results in the following closed loop system:
Figure BDA0003112646020000098
Figure BDA0003112646020000101
Figure BDA0003112646020000102
Figure BDA0003112646020000103
wherein
Figure BDA0003112646020000104
V (k), ξ (k) and z (k) have the same dimensionality, CmIs reversible, defining:
Figure BDA0003112646020000105
solving the matrix inequality psi to obtain Qi>0(i ═ 1,2) and M, the algebraic matrix inequality satisfies:
Figure BDA0003112646020000106
wherein
Figure BDA0003112646020000107
Figure BDA0003112646020000108
Figure BDA0003112646020000111
Definition of Q1=diag{Q11,Q12,Q13},
Figure BDA0003112646020000112
β12Is a matrix with suitable dimensions.
Stability: to prove that condition (20) holds, Schur's theorem can be used to obtain if Ψ<Proof of 0
Figure BDA0003112646020000113
Solving Linear Matrix Inequality (LMI) Ψ by MATLAB<0, Q can be obtainedi(i ═ 1,2) and M, and further using M to obtain the controller gain
Figure BDA0003112646020000114
And
Figure BDA0003112646020000115
definition Q ═ diag { Q1,Q2On the basis of Schur's theorem, if Ψ1<0, then
Figure BDA0003112646020000116
This is true. Here, a sufficiently small normal number delta is first defined, which satisfies
Figure BDA00031126460200001110
Under system (17), the appropriate Lipapp stability theorem was applied. The Lyapunov function was chosen as:
Ξ(Π(k),k)=ΠT(k)Q-1Π(k) (22)
then the
Figure BDA0003112646020000117
Inequality (23), which may be further converted to a polynomial in the form of a sum of perfect squares on | | | | Π (k) | |, so:
Figure BDA0003112646020000118
wherein
Figure BDA0003112646020000119
Therefore, Δ Π (k) <0, proving that the system (17) is stable.
Tracking performance: considering two tracking performances theta of the system (17)1(k) And theta2(k)。
Definition of θ (k +1) ═ Anθ(k),θ(k)=θ1(k)-θ2(k);
Designing a Lyapunov function:
S(θ(k),k)=θT(k)Q-1θ(k) (24)
the same can prove that:
Figure BDA0003112646020000121
the above results demonstrate that
Figure BDA0003112646020000122
So Δ S (k)<-δ||θ(k)||2<0, as can be seen from the Lyapunov stability criterion, there must be a stable equilibrium point for the system (17):
Figure BDA0003112646020000123
thus can be easily verified
Figure BDA0003112646020000124
In fact, the output probability density function γ (y, k) can be as close as possible to the given distribution function g (y), thus achieving tracking performance.
Obtaining controller gain by solving linear matrix inequality through MATLAB
Figure BDA0003112646020000125
And
Figure BDA0003112646020000126
gain the controller
Figure BDA0003112646020000127
And
Figure BDA0003112646020000128
substituting the controller u (k) into the system model, and further calculating a weight and a probability density function, so that the design of the random distribution control system modeling, the observer and the PI controller is completed.
At present, no similar scheme is proposed for modeling, estimating and controlling an attacked random distribution control system, but after a sensor is sparsely attacked, an attacked signal can be detected, a weight of the system is estimated through an observer, a weight error vector and a system control law are constructed, an augmented PI controller is constructed, and the system is stable and tracking performance is realized by searching PI control gain.
Example 2:
an embodiment 2 of the present disclosure provides a security control system of an attacked discrete randomly distributed control system, including:
a data acquisition module configured to: acquiring parameter data of a discrete random distribution control system of a sensor under sparse attack;
a system weight estimation module configured to: according to the obtained parameter data, a Luenberger weight observer with a safety preselector is used for carrying out weight estimation to obtain a system weight estimation vector;
a weight error vector calculation module configured to: obtaining a weight error vector according to a difference value of the system weight estimation vector and a preset reference weight vector;
a security control module configured to: and obtaining the input control quantity of the discrete random distribution control system according to the weight error vector, the system weight estimation vector and the controller gain, and carrying out safety control according to the obtained input control quantity.
The working method of the system is the same as the security control method of the attacked discrete random distribution control system provided in embodiment 1, and details are not repeated here.
Example 3:
the embodiment 3 of the present disclosure provides a computer-readable storage medium, on which a program is stored, which when executed by a processor, implements the steps in the security control method of the attacked discrete random distribution control system according to the embodiment 1 of the present disclosure.
Example 4:
the embodiment 4 of the present disclosure provides an electronic device, which includes a memory, a processor, and a program stored in the memory and capable of running on the processor, where the processor implements the steps in the security control method of the attacked discrete random distribution control system according to embodiment 1 of the present disclosure when executing the program.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only a preferred embodiment of the present disclosure and is not intended to limit the present disclosure, and various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (10)

1. A security control method of an attacked discrete random distribution control system is characterized in that: the method comprises the following steps:
acquiring parameter data of a discrete random distribution control system of a sensor under sparse attack;
according to the obtained parameter data, a Luenberger weight observer with a safety preselector is used for carrying out weight estimation to obtain a system weight estimation vector;
obtaining a weight error vector according to a difference value of the system weight estimation vector and a preset reference weight vector;
and obtaining the input control quantity of the discrete random distribution control system according to the weight error vector, the system weight estimation vector and the controller gain, and carrying out safety control according to the obtained input control quantity.
2. The security control method of an attacked discrete randomly distributed control system of claim 1, characterized by:
and describing the dynamic relation between the probability density functions of control input and output by a B-spline approximation method to obtain the discrete random distribution control system of the sensor under sparse attack.
3. The security control method of an attacked discrete randomly distributed control system of claim 1, characterized by: and establishing a sufficient condition that the safety weight estimation can be solved, and constructing a Luenberger weight observer with a safety preselector under the sufficient condition.
4. A security control method of a hacked discrete random distribution control system as claimed in claim 3, wherein:
for a random distribution control system under s-sparse attack, the following conditions are met:
Figure FDA0003112646010000011
where s is the number of sensors under attack and q is the total number of sensors.
5. The security control method of an attacked discrete randomly distributed control system of claim 1, characterized by:
and constructing a controller according to the weight error vector, the system weight vector and the controller gain, and performing system safety control by taking the output quantity of the controller as the input control quantity of the discrete random distribution control system so as to enable the difference between the output probability density function of the closed-loop system and the expected tracking target to be within a preset range.
6. The security control method of an attacked discrete randomly distributed control system of claim 1, characterized by:
the controller is as follows:
Figure FDA0003112646010000021
wherein
Figure FDA0003112646010000022
And
Figure FDA0003112646010000023
for the controller gain to be obtained based on the linear matrix inequality,
Figure FDA0003112646010000024
is the weight value of the observer at the moment k, T0=t0I,t0>0 represents the sample interval, ξ (k) represents the correlation integral term, and W (k-1) represents the weight error vector at the moment k-1.
7. The security control method of an attacked discrete randomly distributed control system of claim 1, characterized by:
after the sensor is subjected to sparse attack, extracting the signals which are not attacked by utilizing a sequencing method and a middle value operator, and designing the Luenberger weight observer with the safety preselector by combining the extracted signals which are not attacked.
8. A security control system for a hacked discrete randomly distributed control system, comprising: the method comprises the following steps:
a data acquisition module configured to: acquiring parameter data of a discrete random distribution control system of a sensor under sparse attack;
a system weight estimation module configured to: according to the obtained parameter data, a Luenberger weight observer with a safety preselector is used for carrying out weight estimation to obtain a system weight estimation vector;
a weight error vector calculation module configured to: obtaining a weight error vector according to a difference value of the system weight estimation vector and a preset reference weight vector;
a security control module configured to: and obtaining the input control quantity of the discrete random distribution control system according to the weight error vector, the system weight estimation vector and the controller gain, and carrying out safety control according to the obtained input control quantity.
9. A computer-readable storage medium, on which a program is stored, which program, when being executed by a processor, is adapted to carry out the steps of the method for security control of a hacked discrete random distribution control system according to any one of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, characterized in that the processor implements the steps in the method for security control of a hacked discrete randomly distributed control system according to any one of claims 1 to 7 when executing the program.
CN202110655633.6A 2021-06-11 2021-06-11 Security control method and system of attacked discrete random distribution control system Active CN113595974B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110655633.6A CN113595974B (en) 2021-06-11 2021-06-11 Security control method and system of attacked discrete random distribution control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110655633.6A CN113595974B (en) 2021-06-11 2021-06-11 Security control method and system of attacked discrete random distribution control system

Publications (2)

Publication Number Publication Date
CN113595974A true CN113595974A (en) 2021-11-02
CN113595974B CN113595974B (en) 2023-06-16

Family

ID=78243740

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110655633.6A Active CN113595974B (en) 2021-06-11 2021-06-11 Security control method and system of attacked discrete random distribution control system

Country Status (1)

Country Link
CN (1) CN113595974B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117240561A (en) * 2023-09-25 2023-12-15 深圳市拓普泰克技术股份有限公司 Intelligent control system and method based on network security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536017A (en) * 2018-05-03 2018-09-14 山东师范大学 Random distribution interacted system cooperation fault tolerant control method based on dynamic feedback control
CN110579963A (en) * 2019-09-03 2019-12-17 浙江工业大学 Networked motion control system state estimation method based on adaptive state observer
CN110647033A (en) * 2019-09-02 2020-01-03 浙江工业大学 Networked motion control system attack identification method based on class-Longberger observer
CN110865616A (en) * 2019-11-07 2020-03-06 河南农业大学 Design method of event trigger zone memory DOF controller under random FDI attack

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536017A (en) * 2018-05-03 2018-09-14 山东师范大学 Random distribution interacted system cooperation fault tolerant control method based on dynamic feedback control
CN110647033A (en) * 2019-09-02 2020-01-03 浙江工业大学 Networked motion control system attack identification method based on class-Longberger observer
CN110579963A (en) * 2019-09-03 2019-12-17 浙江工业大学 Networked motion control system state estimation method based on adaptive state observer
CN110865616A (en) * 2019-11-07 2020-03-06 河南农业大学 Design method of event trigger zone memory DOF controller under random FDI attack

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
AN-YANG LU.ET: ""Secure Luenberger-like observers for cyber–physical systems under sparse actuator and sensor attacks"", 《ELSEVIER》 *
AN-YANG LU.ET: ""Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer"", 《ELSEVIER》 *
YASSER SHOUKRY.ET: ""Event-Triggered State Observers for Sparse Sensor Noise/Attacks"", 《IEEE》 *
YASSER SHOUKRY.ET: ""SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks"", 《ACM》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117240561A (en) * 2023-09-25 2023-12-15 深圳市拓普泰克技术股份有限公司 Intelligent control system and method based on network security

Also Published As

Publication number Publication date
CN113595974B (en) 2023-06-16

Similar Documents

Publication Publication Date Title
Barford et al. Cyber SA: Situational awareness for cyber defense
CN111698257B (en) Industrial information physical system security detection method for multi-class malicious attacks
Oozeer et al. Cognitive dynamic system for control and cyber-attack detection in smart grid
CN110989552A (en) Fault estimation method of continuous stirred tank reactor system under network attack
Jithish et al. Securing networked control systems: Modeling attacks and defenses
Rath et al. Behind closed doors: Process-level rootkit attacks in cyber-physical microgrid systems
CN113595974A (en) Security control method and system for attacked discrete random distribution control system
Giraldo et al. The more the merrier: adding hidden measurements to secure industrial control systems
Phillips et al. A covert system identification attack on constant setpoint control systems
Li et al. An online approach to covert attack detection and identification in power systems
CN113156821B (en) Self-adaptive tracking method of nonlinear system under false data injection attack
Ma et al. Event‐triggered adaptive finite‐time secure control for nonlinear cyber‐physical systems against unknown deception attacks
Mboweni et al. A machine learning approach to intrusion detection in water distribution systems–A review
Yao et al. Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy
Feng et al. Stochastic games for power grid coordinated defence against coordinated attacks
Akbari et al. Resilient backstepping control for a class of switched nonlinear time-delay systems under hybrid cyber-attacks
CN114006744B (en) LSTM-based power monitoring system network security situation prediction method and system
Fan et al. Improved interval estimation method for cyber-physical systems under stealthy deception attacks
Tahir et al. Attack detection and identification in cyber physical systems: An example on three tank system
Zhao Attack-defense game model: Research on dynamic defense mechanism of network security
Lin et al. The Dynamic Watermarking Method for the Cybersecurity of the Tennessee Eastman Process Control System
Zhao et al. Fuzzy adaptive resilient control against unknown false data injection attacks for high-order nonlinear systems with actuator failures
Do et al. Adversarial Manipulation of Learning in Linear-Quadratic Zero-Sum Differential Games via Cost Poisoning
Ali et al. Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review
Yi et al. Weight estimation and secure control for discrete stochastic distribution control systems under sparse sensor attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240228

Address after: 1002, Building A, Zhiyun Industrial Park, No. 13 Huaxing Road, Tongsheng Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province, 518000

Patentee after: Shenzhen Wanzhida Information Consulting Co.,Ltd.

Country or region after: China

Address before: 250014 No. 88, Wenhua East Road, Lixia District, Shandong, Ji'nan

Patentee before: SHANDONG NORMAL University

Country or region before: China