Unlock instant, AI-driven research and patent intelligence for your innovation.

A data injection attack detection method based on chi-square distance knn

A chi-square distance, data injection technology, applied in the field of network security, can solve the problems of system out of control, ignoring important information, etc., to achieve the effect of high accuracy

Active Publication Date: 2021-08-03
ZHEJIANG UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the software level, traditional IT protection networks focus on data security at the network layer, ignoring important information about the physical state of the system
In the industrial control network, once the transmission of control data is attacked, the entire system will be out of control and even have irreversible effects.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data injection attack detection method based on chi-square distance knn
  • A data injection attack detection method based on chi-square distance knn
  • A data injection attack detection method based on chi-square distance knn

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the technical scheme and design idea of ​​the present invention clearer, a detailed description will be given below in conjunction with the accompanying drawings.

[0048] refer to figure 1 , a data injection attack detection method based on chi-square distance KNN, comprising the following steps: comprising the following steps:

[0049] Step 1: Data extraction: the experimental platform is a network-controlled trajectory tracking system, the client is directly connected to the robot, the router is the server, and the communication is carried out through TCP / IP. The control method is predictive control;

[0050] The intended trajectory for trajectory tracking is:

[0051]

[0052] Where x, y are the coordinates of the horizontal and vertical axes, θ is the angle, and v r with ω r is the linear velocity and angular velocity, the control period is T=50ms, some of the collected data are as follows figure 2 As shown, they are horizontal axis error, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data injection attack detection method based on chi-square distance KNN, comprising the following steps: step 1, extract feature data, and collect required feature data from the robot trajectory tracking system; step 2, obtain false data; step 3, establish training The sample set and the test sample set; step 4, classify the test sample set through the KNN detection algorithm based on the chi-square distance; step 5, evaluate the classification accuracy C according to the detection results, and adjust the K value to obtain the optimal value under reasonable conditions Good classification effect. After the present invention collects system feature data, it preprocesses the data, adopts the KNN algorithm based on chi-square distance for data detection, has high classification accuracy, and is suitable for multi-classification problems. The measurement method of chi-square distance considers each The relative distance between feature quantities has more practical significance, and it well solves the impact of data injection of network attacks on industrial control systems.

Description

technical field [0001] The invention belongs to the field of network security and relates to a chi-square distance KNN data injection attack detection method. Background technique [0002] Industrial control systems require large data volumes and high-speed transmissions such as images and voice signals, which has led to the combination of Ethernet and control networks that are currently popular in the commercial field. Real-time processing, reliability, and advanced distributed intelligence are some of the core features of ICS, which incorporate state-of-the-art Internet communication and computing technologies]. Complex embedded couplings of hardware and software components such as actuators, sensors, and physical processes are all monitored and operated by controllers based on communication and network protocols, such as Supervisory Control and Data Acquisition (SCADA) systems, Programmable Logic Controllers ( PLC), Distributed Control System (DCS), etc.]. The integrati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
Inventor 俞立周奇荣徐彬彬洪榛陈旭廖义辉
Owner ZHEJIANG UNIV OF TECH