Tytuł artykułu
Wybrane pełne teksty z tego czasopisma
Identyfikatory
DOI
Warianty tytułu
Konferencja
Federated Conference on Computer Science and Information Systems (16 ; 02-05.09.2021 ; online)
Języki publikacji
Abstrakty
This paper examines the decentralized controller for a software interconnected system subject to malicious attack. The security of software interconnected system (SIS) subject to malicious attacks is discussed using Event-Triggered Mechanism (ETM). We design a novel ETM with decentralized feedback for managing resources and keeping system stable during attacks. We use Numenta-Hierarchical Temporal Memory (N-HTM) for monitoring the ETM values. Numerical simulation of service provider system is considered for illustrating our model's effectiveness. Experiments reveal that our model stabilizes system after an average of 2s from the launch of last attack. Average consumption of the resources is reduced by 70%.
Rocznik
Tom
Strony
211--218
Opis fizyczny
Bibliogr. 14 poz., wz., tab., wykr.
Twórcy
autor
- Dept. of C.S.E. NIT Rourkela Odisha, India
autor
- Dept. of C.S.E., NIT Rourkela
- S‘O’A Deemed to be University, Odisha, India
autor
- Dept. of C.S.E. NIT Rourkela Odisha, India
Bibliografia
- 1. B. Niu, H. Li, Z. Zhang, J. Li, T. Hayat, and F. E. Alsaadi, “Adaptive neural-network-based dynamic surface control for stochastic interconnected nonlinear nonstrict-feedback systems with dead zone,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 7, pp. 1386-1398, 2018. http://dx.doi.org/10.1109/TSMC.2018.2866519
- 2. J. Liu, W. Suo, L. Zha, E. Tian, and X. Xie, “Security distributed state estimation for nonlinear networked systems against dos attacks,” International Journal of Robust and Nonlinear Control, vol. 30, no. 3, pp. 1156-1180, 2020. http://dx.doi.org/10.1002/rnc.4815
- 3. D. Ye and T.-Y. Zhang, “Summation detector for false data-injection attack in cyber-physical systems,” IEEE transactions on cybernetics, vol. 50, no. 6, pp. 2338-2345, 2019. http://dx.doi.org/10.1109/tcyb.2019.2915124
- 4. L. An and G.-H. Yang, “Secure state estimation against sparse sensor attacks with adaptive switching mechanism,” IEEE Transactions on Automatic Control, vol. 63, no. 8, pp. 2596-2603, 2017. http://dx.doi.org/10.1109/tac.2017.2766759
- 5. K. Wang, E. Tian, J. Liu, L. Wei, and D. Yue, “Resilient control of networked control systems under deception attacks: a memory-event-triggered communication scheme,” International Journal of Robust and Nonlinear Control, vol. 30, no. 4, pp. 1534-1548, 2020. http://dx.doi.org/10.1002/rnc.4837
- 6. D. Ding, Z. Wang, D. W. Ho, and G. Wei, “Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks,” Automatica, vol. 78, pp. 231-240, 2017. http://dx.doi.org/10.1201/9780429465901-16
- 7. J. Xu, Y. Tang, W. Yang, F. Li, and L. Shi, “Event-triggered minimax state estimation with a relative entropy constraint,” Automatica, vol. 110, p. 108592, 2019. http://dx.doi.org/10.1016/j.automatica.2019.108592
- 8. Z. Fei, X. Wang, M. Liu, and J. Yu, “Reliable control for vehicle active suspension systems under event-triggered scheme with frequency range limitation,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019. http://dx.doi.org/10.1109/tsmc.2019.2899942
- 9. E. Tian, Z. Wang, L. Zou, and D. Yue, “Probabilistic-constrained filtering for a class of nonlinear systems with improved static event-triggered communication,” International Journal of Robust and Nonlinear Control, vol. 29, no. 5, pp. 1484-1498, 2019. http://dx.doi.org/10.1002/rnc.4447
- 10. S. Ahmad, A. Lavin, S. Purdy, and Z. Agha, “Unsupervised real-time anomaly detection for streaming data,” Neurocomputing, vol. 262, pp. 134-147, 2017. [Online]. Available: https://doi.org/10.1016/j.neucom.2017.04.070
- 11. Z. Gu, J. H. Park, D. Yue, Z.-G. Wu, and X. Xie, “Event-triggered security output feedback control for networked interconnected systems subject to cyber-attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020. http://dx.doi.org/10.1109/tsmc.2019.2960115
- 12. H. Liang, Y. Zhang, T. Huang, and H. Ma, “Prescribed performance cooperative control for multiagent systems with input quantization,” IEEE Transactions on cybernetics, vol. 50, no. 5, pp. 1810-1819, 2019. http://dx.doi.org/10.1109/tcyb.2019.2893645
- 13. Y. Tang, D. Zhang, D. W. Ho, W. Yang, and B. Wang, “Event-based tracking control of mobile robot with denial-of-service attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, no. 9, pp. 3300-3310, 2018. http://dx.doi.org/10.1109/tsmc.2018.2875793
- 14. P. Kishore, S. K. Barisal, and D. P. Mohapatra, “An incremental malware detection model for meta-feature api and system call sequence,” in 2020 15th Conference on Computer Science and Information Systems (FedCSIS). IEEE, 2020. http://dx.doi.org/10.15439/2020f73 pp. 629-638.
Uwagi
1. Track 4: Software, System and Service Engineering
2. Session: Joint 41st IEEE Software Engineering Workshop and 8th International Workshop on Cyber-Physical Systems
3. Communication papers
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-f2395c69-d3e3-4916-b41f-c6a2aa08f42d