An internal attack detection method based on a weighting rule and consistency in a CPS system

An internal attack and detection method technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as rough methods, not practical enough, and insufficient consideration of the closed-loop structure of the CPS system control system

Pending Publication Date: 2019-06-07
ZHEJIANG GONGSHANG UNIVERSITY
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing literature does not fully consider the physical environment of the CPS system and the closed-loop structure of the control system
In addition, Mitchell et al. designed a series of rule-based internal attack detection systems, but only considered the high-level requirements of specific research fields, and their methods were too rough and not practical enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An internal attack detection method based on a weighting rule and consistency in a CPS system
  • An internal attack detection method based on a weighting rule and consistency in a CPS system
  • An internal attack detection method based on a weighting rule and consistency in a CPS system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] The present invention will be further described in detail below in conjunction with the accompanying drawings, and specific implementation methods will be given.

[0087] The present invention is based on a typical CPS system application scenario, and the overall structure of the system is as follows figure 1 As shown, it includes the following four participants: (1) Trusted authority: responsible for managing the entire system, and no longer participates in subsequent specific operations after system initialization; (2) Control center: responsible for collecting and integrating the global data of the system, and Centralized monitoring, analysis and decision-making of system operation status; (3) Gateway: responsible for aggregating the data of each autonomous area network node of the CPS system, and forwarding the report data of each node to the control center; (4) Network node: CPS system There are a total of n nodes at the sensing end N={N 1 ,N 2 ,...,N n} (or use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the internal attack detection method based on the weighting rule and the consistency in the CPS system, the method is based on a CPS system application scene and comprises four participants, namely credible authority; A control center; A gateway; and a network node. The method comprises the following specific steps: (1) a network node data reporting stage; (2) a behavior rule identification stage; (3) a state machine generation stage according to a rule; (4) a consistency data collection stage; (5) a fitting consistency distribution stage; And (6) an internal attack detection stage. By adjusting and optimizing related configuration parameters such as the rule weight and the normal / abnormal node distinguishing threshold, the detection method has the characteristics of simplicity, flexibility and accuracy.

Description

technical field [0001] The invention relates to an internal attack detection method, in particular to an internal attack detection method based on weighting rules and consistency in a CPS system. Background technique [0002] So far, the research on internal attack detection systems can be roughly divided into three categories: template-based, abnormal behavior-based and rule-based. Template-based detection systems utilize data mining algorithms to detect possible insider attacks, which completely rely on known attack template information. Although this type of method is very effective for known attack types, it is powerless for unknown attack templates. On the contrary, the abnormal behavior-based detection method can well solve the problem of unknown attack templates by defining some malicious or abnormal behaviors and detecting whether the node state deviates beyond the range of normal behaviors. Related research work uses different techniques, such as statistics, devia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/24H04L29/06
Inventor 鲍海勇陆荣幸
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products